虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

techniques

  • Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provi

    Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provides the practical solutions developers need to design powerful and portable Web-based applications. Featuring step-by-step examples, this book focuses on harnessing the power of Java(TM) and XML together to streamline the development process. XML and Java(TM), Second Edition provides new coverage of emerging areas such as document management, databases, messaging, servlets, JDBC, data binding, security, and more. It begins with an overview of XML programming techniques, standard APIs, and tools. Building upon this foundation, the book goes on to cover the latest technologies, including DOM Level 2, SAX2, XSLT, SOAP, WSDL, and UDDI. It explores the role of these major middleware technologies in XML and Java-based Web application development, as well as the limitations and potential pitfalls.

    标签: technologies and standards Edition

    上传时间: 2014-01-05

    上传用户:hj_18

  • Design of Integrated Circuits for Optical Communications deals with the design of high-speed integra

    Design of Integrated Circuits for Optical Communications deals with the design of high-speed integrated circuits for optical communication systems. Written for both students and practicing engineers, the book systematically takes the reader from basic concepts to advanced topics, establishing both rigor and intuition. The text emphasizes analysis and design in modern VLSI technologies, particularly CMOS, and presents numerous broadband circuit techniques. Leading researcher Behzad Razavi is also the author of Design of Analog CMOS Integrated Circuits.

    标签: Communications Integrated high-speed Circuits

    上传时间: 2013-12-21

    上传用户:zhouchang199

  • This text introduces the spirit and theory of hacking as well as the science behind it all it also p

    This text introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 我记得好像的关于缓冲区溢出的

    标签: introduces the hacking science

    上传时间: 2014-08-14

    上传用户:Breathe0125

  • The salience distance transform incorporates edge strength information into the distance transform.

    The salience distance transform incorporates edge strength information into the distance transform. The output is more robust and informative as input for techniques such as snakes

    标签: transform distance incorporates information

    上传时间: 2014-01-11

    上传用户:zjf3110

  • The CSS Cookbook cuts straight through the theory to provide hundreds of useful examples and CSS cod

    The CSS Cookbook cuts straight through the theory to provide hundreds of useful examples and CSS code recipes you can use immediately to format your web pages. Reflecting CSS2 and including topics that range from basic web typography and page layout to techniques for formatting lists, forms, and tables, the CSS Cookbook is a must-have resource for any web author who has even considered using CSS.

    标签: CSS Cookbook straight hundreds

    上传时间: 2013-12-21

    上传用户:sjyy1001

  • cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used

    cordic methods describe essentially the same algorithm that with suitably chosen inputs can be used to calculate a whole range of scientific functions including sin, cos, tan, arctan, arcsin, arccos, sinh, cosh, tanh, arctanh, log, exp, square root and even multiply and divide. the method dates back to volder [1959], and due to its versatility and compactness, it made possible the microcoding of the hp35 pocket scientific calculator in 1972. here is some code to illustrate the techniques. ive split the methods into three parts linear, circular and hyperbolic. in the hp35 microcode these would be unified into one function (for space reasons). because the linear mode can perform multiply and divide, you only need add/subtract and shift to complete the implementation. you can select in the code whether to do the multiples and divides also by cordic means. other multiplies and divides are all powers of 2 (these dont count). to eliminate these too, would involve ieee hackery.

    标签: essentially algorithm describe suitably

    上传时间: 2017-03-02

    上传用户:litianchu

  • this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryp

    this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.

    标签: i.e. CRYPTOGRAPHY information the

    上传时间: 2014-01-27

    上传用户:ls530720646

  • For the practicing programmer with little time to spare, Essential C++ offers a fast-track to learn

    For the practicing programmer with little time to spare, Essential C++ offers a fast-track to learning and working with C++ on the job. This book is specifically designed to bring you up to speed in a short amount of time. It focuses on the elements of C++ programming that you are most likely to encounter and examines features and techniques that help solve real-world programming challenges.

    标签: practicing fast-track programmer Essential

    上传时间: 2017-03-29

    上传用户:洛木卓

  • DESCRIPTION The DCP0105 family is a series of high efficiency, 5V input isolated DC/DC converters.

    DESCRIPTION The DCP0105 family is a series of high efficiency, 5V input isolated DC/DC converters. In addition to 1W nominal galvanically isolated output power capability, the range of DC/DCs are also fully synchronizable. The devices feature thermal shutdown, and overload protection is implemented via watchdog circuitry. Advanced power-on reset techniques give superior reset performance and the devices will start into any capacitive load up to full power output. The DCP0105 family is implemented in standard- molded IC packaging, giving outlines suitable for high volume assembly.

    标签: DESCRIPTION efficiency converters isolated

    上传时间: 2013-11-28

    上传用户:CHENKAI

  • Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems. In this book, Bruce D

    Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems. In this book, Bruce Douglass illustrates for the first time how two important contemporary software engineering advances鈥攑atterns and the UML鈥攃an be applied advantageously to the concepts and techniques traditionally used in mainstream real-time software.

    标签: Real-Time Architecture Patterns Scalable

    上传时间: 2013-12-13

    上传用户:6546544