搜索:inherently

找到约 7 项符合「inherently」的查询结果

结果 7
https://www.eeworm.com/dl/648/326591.html 单片机开发

A major goal of this book is to show to make devices that are inherently reliable by design. While a

A major goal of this book is to show to make devices that are inherently reliable by design. While a lot of attention has been given to “quality improvement,” the majority of the emphasis has been placed on the processes that occur after the design of a product is complete. Des ...
下载 72
·
查看 1149
https://www.eeworm.com/dl/686/156913.html VC书籍

Far too many programmers and software designers consider efficient C++ to be an oxymoron. They rega

Far too many programmers and software designers consider efficient C++ to be an oxymoron. They regard C++ as inherently slow and inappropriate for performancecritical applications. Consequently, C++ has had little success penetrating domains such as networking, operating system k ...
下载 44
·
查看 1106
https://www.eeworm.com/dl/686/441631.html VC书籍

Far too many programmers and software designers consider efficient C++ to be an oxymoron. They rega

Far too many programmers and software designers consider efficient C++ to be an oxymoron. They regard C++ as inherently slow and inappropriate for performancecritical applications. Consequently, C++ has had little success penetrating domains such as networking, operating system k ...
下载 164
·
查看 1040
https://www.eeworm.com/dl/516/403312.html DSP编程

The TMS320VC5506/C5507/C5509A USB peripherals can be clocked from either the USB APLL or the USB DP

The TMS320VC5506/C5507/C5509A USB peripherals can be clocked from either the USB APLL or the USB DPLL. Since the APLL is inherently more noise tolerant and has less long-term jitter than the DPLL, it is recommended that you switch to it for any USB operations.
下载 166
·
查看 1142
https://www.eeworm.com/dl/619/327360.html Linux/Unix编程

Pegasus is an open-source implementationof the DMTF CIM and WBEM standards. It is designed to be por

Pegasus is an open-source implementationof the DMTF CIM and WBEM standards. It is designed to be portable and highly modular. It is coded in C++ so that it effectively translates the object concepts of the CIM objects into a programming model but still retains the speed and effic ...
下载 158
·
查看 1174
https://www.eeworm.com/dl/534/391049.html 其他

Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the ...
下载 149
·
查看 1074
https://www.eeworm.com/dl/652/421399.html 文章/文档

It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom

It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai ...
下载 42
·
查看 1129