taken
共 69 篇文章
taken 相关的电子技术资料,包括技术文档、应用笔记、电路设计、代码示例等,共 69 篇文章,持续更新中。
亚定方程组求解:If serial correlation is found, you may have misspecified your model and should return to y
亚定方程组求解:If serial correlation is found, you may have misspecified your model and
should return to your theory for a better representation of the data generating
process. This possibility is quite li
Intel/DVI ADPCM coder/decoder. The algorithm for this coder was taken from the IMA Compatability Pr
Intel/DVI ADPCM coder/decoder.
The algorithm for this coder was taken from the IMA Compatability Project
proceedings
工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com /
工具分类:攻击程序 运行平台:Windows 工具大小:7577 Bytes 文件MD5 :28f6d5f4d818438522a3d0dc8a3fa46b 工具来源:securiteam.com // GDI+ buffer overrun exploit by FoToZ // NB: the headers here are only sample headers taken from a
LTP5900 Hardware Integration Guide
<div>
The LTP5900 includes sufficient power supply filtering and decoupling capacitancesuch that additional filtering should not be necessary for most battery-powereddesigns. Care must be taken to av
介绍C16x系列微控制器的输入信号升降时序图及特性
All inputs of the C16x family have Schmitt-Trigger input characteristics. These Schmitt-<BR>Triggers are intended to always provide proper internal low and high levels, even if an<BR>undefined voltage
自己写的robocup-2d程序
自己写的robocup-2d程序,从UVA改编
This method is the first complete simple team and defines the actions taken
by all the players on the field (excluding the goalie). It is based on the
high-level actio
Taken from other people, LEACH routing protocol source code using Matlab
Taken from other people, LEACH routing protocol source code using Matlab
this is a file taken from my computer
this is a file taken from my computer
"Readers can pick up this book and become familiar with C++ in a short time. Stan has taken a very b
"Readers can pick up this book and become familiar with C++ in a short time. Stan has taken a very broad and complicated topic and reduced it to the essentials that budding C++ programmers need to kno
This getting started exercise will guide you through the step-by-step process of transforming a MATL
This getting started exercise will guide you through the step-by-step process of transforming a MATLAB floating-point model into a hardware module that can be implemented in silicon (FPGA or ASIC). Th
In this paper we describe a control methodology for catching a fast moving object with a robot mani
In this paper we describe a control methodology for
catching a fast moving object with a robot manipulator,
where visual information is employed to track the
trajectory of the target. Sensing, plan
Perl and XML XML is a text-based markup language that has taken the programming world by storm. Mor
Perl and XML
XML is a text-based markup language that has taken the programming world by storm. More
powerful than HTML yet less demanding than SGML, XML has proven itself to be flexible and
resili
This book is the culmination of more than 20 years of building, studying, and teaching real-time sys
This book is the culmination of more than 20 years of building, studying, and teaching real-time systems. The author’s travels have taken him to NASA, UPS, Lockheed Martin, the Canadian and Australian
After the successful global introduction during the past decade of the second generation (2G) digita
After the successful global introduction during the past decade of the second generation (2G) digital
mobile communications systems, it seems that the third generation (3G) Universal Mobile Communica
funambol windows mobile plugin source code, the source code is taken from the funambol site
funambol windows mobile plugin source code, the source code is taken from the funambol site
SensorSimII is the framework of a simulator that I have been working on to study how future sensor n
SensorSimII is the framework of a simulator that I have been working on to study how future sensor networks should operate. the simulator is written in a modular fashion so that it can be adapted to s
MSP430-JTAG-Adapter:MSP430-JTAG doesn’t need external power supply, as MSP430 microcontrollers requi
MSP430-JTAG-Adapter:MSP430-JTAG doesn’t need external power supply, as MSP430 microcontrollers require only 3-5 mA while programming and all necessary
power supply is taken from the LPT port.
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlyin
c pgm to find redundant paths in a graph.Many fault-tolerant network algorithms rely on an underlying assumption that there are possibly distinct network paths between a source-destination pair. Given
ardware sensors monitor 4.4.2.2 (June 2008) (Shareware, trial period is two weeks) The most univ
ardware sensors monitor 4.4.2.2 (June 2008)
(Shareware, trial period is two weeks)
The most universal hardware monitoring program
for Windows 9X/ME/NT/2000/XP/2003/VISTA x86/x64 editions
This pr
As a general rule, PhD students and their supervisors tend to focus primarily, or even exclusively,
As a general rule, PhD students and their supervisors tend to focus
primarily, or even exclusively, on the content of the research that will
go into the doctoral thesis. Other issues are often taken