搜索:inherently
找到约 7 项符合「inherently」的查询结果
结果 7
https://www.eeworm.com/dl/648/326591.html
单片机开发
A major goal of this book is to show to make devices that are inherently reliable by design. While a
A major goal of this book is to show to make devices that are inherently reliable by design. While a lot of attention has been given to “quality improvement,” the majority of the emphasis has been placed on the processes that occur after the design of a product is complete. Des ...
https://www.eeworm.com/dl/686/156913.html
VC书籍
Far too many programmers and software designers consider efficient C++ to be an oxymoron. They rega
Far too many programmers and software designers consider efficient C++ to be an
oxymoron. They regard C++ as inherently slow and inappropriate for performancecritical
applications. Consequently, C++ has had little success penetrating domains such
as networking, operating system k ...
https://www.eeworm.com/dl/686/441631.html
VC书籍
Far too many programmers and software designers consider efficient C++ to be an oxymoron. They rega
Far too many programmers and software designers consider efficient C++ to be an
oxymoron. They regard C++ as inherently slow and inappropriate for performancecritical
applications. Consequently, C++ has had little success penetrating domains such
as networking, operating system k ...
https://www.eeworm.com/dl/516/403312.html
DSP编程
The TMS320VC5506/C5507/C5509A USB peripherals can be clocked from either the USB APLL or the USB DP
The TMS320VC5506/C5507/C5509A USB peripherals can be clocked from either the USB APLL or the
USB DPLL. Since the APLL is inherently more noise tolerant and has less long-term jitter than the DPLL,
it is recommended that you switch to it for any USB operations.
https://www.eeworm.com/dl/619/327360.html
Linux/Unix编程
Pegasus is an open-source implementationof the DMTF CIM and WBEM standards. It is designed to be por
Pegasus is an open-source implementationof the DMTF CIM and WBEM standards. It is designed to be portable and highly modular. It is coded in C++ so that it effectively translates the object concepts of the CIM objects into a programming model but still retains the speed and effic ...
https://www.eeworm.com/dl/534/391049.html
其他
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a
Introduction
Computer security is undeniably important, and as new vulnerabilities are discovered and
exploited, the perceived need for new security solutions grows. "Trusted computing"
initiatives propose to solve some of today s security problems through hardware changes
to the ...
https://www.eeworm.com/dl/652/421399.html
文章/文档
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic
illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally
demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai ...