text within noisy code extraction
标签: extraction within noisy text
上传时间: 2015-11-30
上传用户:hongmo
The source code for this package is located in src/gov/nist/sip/proxy. The proxy is a pure JAIN-SIP application: it does not need proprietary nist-sip classes in addition of those defined in JAIN-SIP 1.1, you can substitute the NIST-SIP stack by another JAIN-SIP-1.1 compliant stack and it should interoperate. he proxy can act as presence server and be able to process NOTIFY and SUBSCRIBE requests. If this parameter is disabled, the proxy will simply forward those kind of requests following the appropriate routing decision.
标签: proxy The JAIN-SIP package
上传时间: 2015-11-30
上传用户:ippler8
he source code for this package is located in src/ directory. The JAIN-SIP-SERVICES is a JAIN-SIP application: it does not need proprietary nist-sip classes in addition of those defined in JAIN-SIP 1.1, you can substitute the NIST-SIP stack by another JAIN-SIP-1.1 compliant stack and it should interoperate.
标签: JAIN-SIP-SERVICES directory JAIN-SIP package
上传时间: 2013-12-30
上传用户:caiiicc
Viterbi Decoding Techniques in the TMS320C54x Family code 即是TMS320C54x实现VIterbi译码,是C与汇编混合编程,相信学习通信的又要用DSP来实现的人,一定会惊喜的
标签: 320C Techniques 320 C54
上传时间: 2014-10-27
上传用户:shinesyh
Hey. This some pid code for the atmega88 that I once used to control a heater. It s purpose is pretty specific, and I only wrote it to work on the mega88, so the code itself won t be too useful. It is a good place to start if you re trying to use or figure out pid though.
标签: control purpose atmega heater
上传时间: 2013-12-19
上传用户:天诚24
C procedures commonly used algorithm sets. Common C language code link. Contact enhancement of the C language code capacity.
标签: enhancement procedures algorithm commonly
上传时间: 2013-12-23
上传用户:变形金刚
wimax BS simulation code,implemented under linux.
标签: implemented simulation wimax linux
上传时间: 2014-08-03
上传用户:笨小孩
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)
标签: Sometimes the contents desire
上传时间: 2013-12-25
上传用户:playboys0
8051AD,use keil to program this code.
上传时间: 2015-12-02
上传用户:aa54
51DEVTest use keil to program this code.
上传时间: 2015-12-02
上传用户:jing911003