protocols
共 115 篇文章
protocols 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 115 篇文章,持续更新中。
CFE contains the following important features: * Easy to port to new SB1250/BCM1480 designs
CFE contains the following important features:
* Easy to port to new SB1250/BCM1480 designs
* Initializes CPUs, caches, memory controllers, and peripherals
* Built-in device drivers for
The UCL common multimedia library implements a number of algorithms and protocols needed by a number
The UCL common multimedia library implements a number of algorithms and protocols needed by a number of our applications. It compiles standalone on a range of Unix systems (Solaris, Linux, Irix, FreeB
Ekiga (formely known as GnomeMeeting) is an open source VoIP and video conferencing application for
Ekiga (formely known as GnomeMeeting) is an open source VoIP and video conferencing application for GNOME. Ekiga uses both the H.323 and SIP protocols. It supports many audio and video codecs, and is
A Methodology For The Design And Implementation Of Communication Protocols For Embedded Wireless Sys
A Methodology For The Design And Implementation Of Communication Protocols For Embedded Wireless Systems
End-host multicast communication using switch-trees protocols 端组播交换树协议
End-host multicast communication using switch-trees protocols
端组播交换树协议
Adaptive Splitting Protocols for RFID tag Collision Arbitration 防碰撞算法的程序
Adaptive Splitting Protocols for RFID tag Collision Arbitration 防碰撞算法的程序
Java RS232 terminal with graphical interface . Suitable for small RS projects and test protocols for
Java RS232 terminal with graphical interface . Suitable for small RS projects and test protocols for hardware developing. Free for usage ,modifying and redistributing.Also added "javacomm20"-api insta
Auerbach Wireless Mesh Networking Architectures Protocols and Standards,dec 2006
Auerbach Wireless Mesh Networking Architectures Protocols and Standards,dec 2006
Auerbach.Wireless.Mesh.Networking.Architectures.Protocols.and.Standards.Dec.2006 无线Mesh 网络
Auerbach.Wireless.Mesh.Networking.Architectures.Protocols.and.Standards.Dec.2006
无线Mesh 网络
JXTA v2.0 Protocols Specifi cation jxta协议说明书 更新到2.5
JXTA v2.0 Protocols Specifi cation
jxta协议说明书
更新到2.5
It permits simultaneous use of multiple USB Serial protocols.
It permits simultaneous use of multiple USB Serial protocols.
The Library Reference describes the C functions, data types, and protocols that are included as part
The Library Reference describes the C functions, data types, and protocols that are included as part of the QNX Neutrino RTOS.
This package provides a complete http client library. It currently implements most of the relevant p
This package provides a complete http client library. It currently implements most of the relevant parts of the HTTP/1.0 and HTTP/1.1 protocols, including the request methods HEAD, GET, POST and PUT,
JavaMail开发手册.pdf 英文教材 1. Tutorial tips 2 2. Introducing the JavaMail API 3 3. Reviewing related p
JavaMail开发手册.pdf 英文教材
1. Tutorial tips 2
2. Introducing the JavaMail API 3
3. Reviewing related protocols 4
4. Installing JavaMail 6
5. Reviewing the core classes 8
6. Using the JavaMail API 13
a very popular packet of cryptography tools,it encloses the most common used algorithm and protocols
a very popular packet of cryptography tools,it encloses the most common used algorithm and protocols
X-MAC, a low power MAC protocol for wireless sensor networks (WSNs). Standard MAC protocols develo
X-MAC, a low power MAC
protocol for wireless sensor networks (WSNs). Standard
MAC protocols developed for duty-cycled WSNs such as
BMAC, which is the default MAC protocol for TinyOS, employ
an ext
Aodv for NS-2. A mobile ad-hoc network (MANET) is a kind of wireless ad-hoc network, and is a self-c
Aodv for NS-2. A mobile ad-hoc network (MANET) is a kind of wireless ad-hoc network, and is a self-configuring
network of mobile routers connected wirelessly. MANET may operate in a standalone fashio
The goal of this thesis is the development of traffic engineering rules for cellular packet radio n
The goal of this thesis is the development of traffic engineering rules for cellular packet
radio networks based on GPRS and EDGE. They are based on traffic models for typical
mobile applications. L
This document outlines what is necessary to install and run the LEACH protocol on version 2.27 of n
This document outlines what is necessary to install and run the LEACH protocol on version
2.27 of ns2. At the time of this writing, this is the newest version of ns2. The LEACH implementation
was wr
a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded s
a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to