搜索结果
找到约 7 项符合
inherently 的查询结果
单片机开发 A major goal of this book is to show to make devices that are inherently reliable by design. While a
A major goal of this book is to show to make devices that are inherently reliable by design. While a lot of attention has been given to “quality improvement,” the majority of the emphasis has been placed on the processes that occur after the design of a product is complete. Design deficiencies are ...
VC书籍 Far too many programmers and software designers consider efficient C++ to be an oxymoron. They rega
Far too many programmers and software designers consider efficient C++ to be an
oxymoron. They regard C++ as inherently slow and inappropriate for performancecritical
applications. Consequently, C++ has had little success penetrating domains such
as networking, operating system kernels, device drive ...
Linux/Unix编程 Pegasus is an open-source implementationof the DMTF CIM and WBEM standards. It is designed to be por
Pegasus is an open-source implementationof the DMTF CIM and WBEM standards. It is designed to be portable and highly modular. It is coded in C++ so that it effectively translates the object concepts of the CIM objects into a programming model but still retains the speed and efficiency of a compiled ...
其他 Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a
Introduction
Computer security is undeniably important, and as new vulnerabilities are discovered and
exploited, the perceived need for new security solutions grows. "Trusted computing"
initiatives propose to solve some of today s security problems through hardware changes
to the personal computer. ...
DSP编程 The TMS320VC5506/C5507/C5509A USB peripherals can be clocked from either the USB APLL or the USB DP
The TMS320VC5506/C5507/C5509A USB peripherals can be clocked from either the USB APLL or the
USB DPLL. Since the APLL is inherently more noise tolerant and has less long-term jitter than the DPLL,
it is recommended that you switch to it for any USB operations.
文章/文档 It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electrom
It was proposed that perfect invisibility cloaks can be constructed for hiding objects from electromagnetic
illumination (Pendry et al., Science 312, p. 1780). The cylindrical cloaks experimentally
demonstrated (Schurig et al., Science 314, p. 997) and theoretically proposed (Cai et al., Nat. Photon ...
VC书籍 Far too many programmers and software designers consider efficient C++ to be an oxymoron. They rega
Far too many programmers and software designers consider efficient C++ to be an
oxymoron. They regard C++ as inherently slow and inappropriate for performancecritical
applications. Consequently, C++ has had little success penetrating domains such
as networking, operating system kernels, device drive ...