embedded-system-design.pdf
上传时间: 2015-05-05
上传用户:上善若水
mining source code written in Verilog
标签: Verilog written mining source
上传时间: 2015-05-06
上传用户:asddsd
parallel cascade identification of nonlinear system
标签: identification nonlinear parallel cascade
上传时间: 2015-05-06
上传用户:希酱大魔王
经典著作。关于设计模式。全名Introduction to Design Patterns in C# Code.zip。探讨C#中的模式问题。
标签: Introduction Patterns Design Code
上传时间: 2015-05-06
上传用户:yepeng139
以上代码保存为.hta文件,可以调用FileSystemObject元件(文件系统对象)。病毒首先得到你的Windows目录和System目录,再修改注册表,把你的启动目录——"C:\WINDOWS\Start Menu\Programs\启动"设置为完全共享,这样就可以被黑客搜到,上传一个“冰河”或者“广外女生”, 然后病毒就把目标对准System目录,往里面灌垃圾文件,都是形如Msvbvm???的Dll文件,而且所有VB编写的程序都不能用了,提示找不到Dll文件——因为Msvbvm50.dll和Msvbvm60.dll被垃圾文件覆盖了。
标签: FileSystemObject Windows System hta
上传时间: 2014-08-03
上传用户:离殇
This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end of program execution it will display in the debug window if there were any memory leaks and how the memory looks so you can identify where your memory leak occurred. It will display in the debug window a message saying no memory leaks detected if there are no memory leaks. Similar to what crtdbg.h does in VC++. The code detects memory leaks generated with calls to new and delete operators in C++. The code doesn t detect memory leaks generated with C functions: malloc, calloc, free, but that can be done in the future. Let me know and I will program it.
标签: the embedded detects almost
上传时间: 2015-05-07
上传用户:comua
ARM System-on-Chip Architecture經典之書。學習ARM架構的好書。
标签: System-on-Chip Architecture ARM
上传时间: 2014-01-17
上传用户:gxmm
thinking in java的第三版,中文版,希望对大家有所帮助
上传时间: 2013-12-06
上传用户:sardinescn
This program configures the external memory interface and CAN to receieve data in a FIFO buffer and store the data in XRAM. Meant to receive data from another CAN device.
标签: configures and interface external
上传时间: 2015-05-07
上传用户:zhangyi99104144
This m-file displays the time waveform for the Gaussian pulse function and the first and second derivatives of the Gaussian pulse function for a 0.5 nanosecond pulse width. Other values of pulse widths may be used by changing fs,t,t1. The program uses the actual first and second derivative equations for the Gaussian pulse waveforms. The first derivative is considered to be the monocycle or monopulse as discussed in most papers. The second derivative is the waveform generated from a dipole antenna used in a UWB system. Other information is contained in the file.
上传时间: 2015-05-08
上传用户:leixinzhuo