protocols

共 115 篇文章
protocols 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 115 篇文章,持续更新中。

CFE contains the following important features: * Easy to port to new SB1250/BCM1480 designs

CFE contains the following important features: * Easy to port to new SB1250/BCM1480 designs * Initializes CPUs, caches, memory controllers, and peripherals * Built-in device drivers for

The UCL common multimedia library implements a number of algorithms and protocols needed by a number

The UCL common multimedia library implements a number of algorithms and protocols needed by a number of our applications. It compiles standalone on a range of Unix systems (Solaris, Linux, Irix, FreeB

Ekiga (formely known as GnomeMeeting) is an open source VoIP and video conferencing application for

Ekiga (formely known as GnomeMeeting) is an open source VoIP and video conferencing application for GNOME. Ekiga uses both the H.323 and SIP protocols. It supports many audio and video codecs, and is

A Methodology For The Design And Implementation Of Communication Protocols For Embedded Wireless Sys

A Methodology For The Design And Implementation Of Communication Protocols For Embedded Wireless Systems

End-host multicast communication using switch-trees protocols 端组播交换树协议

End-host multicast communication using switch-trees protocols 端组播交换树协议

Adaptive Splitting Protocols for RFID tag Collision Arbitration 防碰撞算法的程序

Adaptive Splitting Protocols for RFID tag Collision Arbitration 防碰撞算法的程序

Java RS232 terminal with graphical interface . Suitable for small RS projects and test protocols for

Java RS232 terminal with graphical interface . Suitable for small RS projects and test protocols for hardware developing. Free for usage ,modifying and redistributing.Also added "javacomm20"-api insta

Auerbach Wireless Mesh Networking Architectures Protocols and Standards,dec 2006

Auerbach Wireless Mesh Networking Architectures Protocols and Standards,dec 2006

Auerbach.Wireless.Mesh.Networking.Architectures.Protocols.and.Standards.Dec.2006 无线Mesh 网络

Auerbach.Wireless.Mesh.Networking.Architectures.Protocols.and.Standards.Dec.2006 无线Mesh 网络

JXTA v2.0 Protocols Speci&#64257 cation jxta协议说明书 更新到2.5

JXTA v2.0 Protocols Speci&#64257 cation jxta协议说明书 更新到2.5

It permits simultaneous use of multiple USB Serial protocols.

It permits simultaneous use of multiple USB Serial protocols.

The Library Reference describes the C functions, data types, and protocols that are included as part

The Library Reference describes the C functions, data types, and protocols that are included as part of the QNX Neutrino RTOS.

This package provides a complete http client library. It currently implements most of the relevant p

This package provides a complete http client library. It currently implements most of the relevant parts of the HTTP/1.0 and HTTP/1.1 protocols, including the request methods HEAD, GET, POST and PUT,

JavaMail开发手册.pdf 英文教材 1. Tutorial tips 2 2. Introducing the JavaMail API 3 3. Reviewing related p

JavaMail开发手册.pdf 英文教材 1. Tutorial tips 2 2. Introducing the JavaMail API 3 3. Reviewing related protocols 4 4. Installing JavaMail 6 5. Reviewing the core classes 8 6. Using the JavaMail API 13

a very popular packet of cryptography tools,it encloses the most common used algorithm and protocols

a very popular packet of cryptography tools,it encloses the most common used algorithm and protocols

X-MAC, a low power MAC protocol for wireless sensor networks (WSNs). Standard MAC protocols develo

X-MAC, a low power MAC protocol for wireless sensor networks (WSNs). Standard MAC protocols developed for duty-cycled WSNs such as BMAC, which is the default MAC protocol for TinyOS, employ an ext

Aodv for NS-2. A mobile ad-hoc network (MANET) is a kind of wireless ad-hoc network, and is a self-c

Aodv for NS-2. A mobile ad-hoc network (MANET) is a kind of wireless ad-hoc network, and is a self-configuring network of mobile routers connected wirelessly. MANET may operate in a standalone fashio

The goal of this thesis is the development of traffic engineering rules for cellular packet radio n

The goal of this thesis is the development of traffic engineering rules for cellular packet radio networks based on GPRS and EDGE. They are based on traffic models for typical mobile applications. L

This document outlines what is necessary to install and run the LEACH protocol on version 2.27 of n

This document outlines what is necessary to install and run the LEACH protocol on version 2.27 of ns2. At the time of this writing, this is the newest version of ns2. The LEACH implementation was wr

a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded s

a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to