搜索结果

找到约 19 项符合 nearly 的查询结果

数据结构 Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to w

Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to work in the random access memory(RAM). Some of them do provide some mechanism for dumping the whole tree into a file and loading it back to the memory in order to make data in that tree persistent. It ...
https://www.eeworm.com/dl/654/154678.html
下载: 115
查看: 1100

电子书籍 nTIM PATRICK has been working professionally as a software architect and developer for nearly 25 ye

nTIM PATRICK has been working professionally as a software architect and developer for nearly 25 years. By day he develops custom business applications in Visual Basic for small to medium- sized organizations. He is a Microsoft Certified Solution Developer (MCSD). In April 2007, Microsoft awarded Ti ...
https://www.eeworm.com/dl/cadence/ebook/440099.html
下载: 125
查看: 1042

书籍源码 Tug of War(A tug of war is to be arranged at the local office picnic. For the tug of war, the picnic

Tug of War(A tug of war is to be arranged at the local office picnic. For the tug of war, the picnickers must be divided into two teams. Each person must be on one team or the other the number of people on the two teams must not differ by more than 1 the total weight of the people on each team shoul ...
https://www.eeworm.com/dl/532/108809.html
下载: 164
查看: 1239

通讯/手机编程 蓝牙跳频系统的simulink仿真程序(This is a MATLAB simulation (SIMULINK) for the hop selection scheme in Bluetooth

蓝牙跳频系统的simulink仿真程序(This is a MATLAB simulation (SIMULINK) for the hop selection scheme in Bluetooth. Since nearly the same scheme is used for 79 and 23-hop system. Only the 79-hop system in simulated in the CONNECTION state.)
https://www.eeworm.com/dl/527/212551.html
下载: 185
查看: 1396

Linux/Unix编程 This book was written to provide a single reference for network administration in a Linux environmen

This book was written to provide a single reference for network administration in a Linux environment. Beginners and experienced users alike should find the information they need to cover nearly all important administration activities required to manage a Linux network configuration.
https://www.eeworm.com/dl/619/228324.html
下载: 196
查看: 1074

Linux/Unix编程 celestia源代码

celestia源代码,Celestia, a real-time 3D space simulation featuring a database of over 100000 stars, nearly a hundred solar system, objects, and a complete catalog of extrasolar planets.
https://www.eeworm.com/dl/619/239879.html
下载: 77
查看: 1014

人工智能/神经网络 This demonstration illustrates the application of adaptive filters to signal separation using a str

This demonstration illustrates the application of adaptive filters to signal separation using a structure called an adaptive line enhancer (ALE). In adaptive line enhancement, a measured signal x(n) contains two signals, an unknown signal of interest v(n), and a nearly-periodic noise signal eta(n). ...
https://www.eeworm.com/dl/650/305230.html
下载: 67
查看: 1108

其他书籍 If you have programming experience and a familiarity with C--the dominant language in embedded syste

If you have programming experience and a familiarity with C--the dominant language in embedded systems--Programming Embedded Systems, Second Edition is exactly what you need to get started with embedded software. This software is ubiquitous, hidden away inside our watches, DVD players, mobile phones ...
https://www.eeworm.com/dl/542/328174.html
下载: 51
查看: 1077

软件工程 Get more out of your legacy systems: more performance, functionality, reliability, and manageability

Get more out of your legacy systems: more performance, functionality, reliability, and manageability Is your code easy to change? Can you get nearly instantaneous feedback when you do change it? Do you understand it? If the answer to any of these questions is no, you have legacy code, and it is dra ...
https://www.eeworm.com/dl/540/351974.html
下载: 115
查看: 1036

电子书籍 The literature of cryptography has a curious history. Secrecy, of course, has always played a centra

The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. A ...
https://www.eeworm.com/dl/cadence/ebook/376273.html
下载: 34
查看: 1051