亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Described

  • Generating Fractals with SSE/SSE2 You probably have heard about fractals before. They are beautiful

    Generating Fractals with SSE/SSE2 You probably have heard about fractals before. They are beautiful pictures such as the one shown above. Any fractal can be Described using iterative formulas. So you can generate a fractal by evaluating these formulas and finding the color of each pixel. That is a large computational task, and drawing a fractal needs a fast CPU and a carefully optimized program.

    標簽: Generating SSE beautiful Fractals

    上傳時間: 2016-11-03

    上傳用戶:小鵬

  • This document accompanies a sample co-installer that can be used in conjunction with an INF file to

    This document accompanies a sample co-installer that can be used in conjunction with an INF file to install additional device INF files on the target system during a device installation. The instructions herein apply to the Microsoft Windows 2000 and Windows XP and Windows Server 2003 operating systems. The sample co-installer Described in this article interprets CopyINF directives in a [DDInstall] section in an INF file. The sample demonstrates using a co-installer to perform processing after a device has been installed, parsing the INF section that is being used for the installation, and the use of the SetupCopyOEMInf, SetupGetInfInformation, SetupQueryInfOriginalFileInformation and SetupDiGetActualSectionToInstall APIs.

    標簽: co-installer accompanies conjunction document

    上傳時間: 2014-02-28

    上傳用戶:gououo

  • This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Page

    This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Pages environment, but most of the techniques discussed have equivalents in other database environments. It should be viewed as a "follow up", or perhaps an appendix, to the previous paper, "Advanced SQL Injection". The paper covers in more detail some of the points Described in its predecessor, providing examples to clarify areas where the previous paper was perhaps unclear. An effective method for privilege escalation is Described that makes use of the openrowset function to scan a network. A novel method for extracting information in the absence of helpful error messages is Described the use of time delays as a transmission channel. Finally, a number of miscellaneous observations and useful hints are provided, collated from responses to the original paper, and various conversations around the subject of SQL injection in a SQL Server environment.

    標簽: Server SQL Injection Microsoft

    上傳時間: 2014-07-28

    上傳用戶:xhz1993

  • In term project, we will take the baseline JPEG codec in ARM-based platform system as an example to

    In term project, we will take the baseline JPEG codec in ARM-based platform system as an example to practice the design flow in SoC. We divide the project into three parts, and the goal of each part is Described as follow. Part I: Design a baseline JPEG software codec in C/C++ and port it to ARM core,(ARM7TDMI, ARM720T, or ARM922T.) Part II: Make use of virtual prototype to integrate/verify the hardware and software. Part III: Verify your soft IP in target environment.

    標簽: ARM-based baseline platform project

    上傳時間: 2017-02-15

    上傳用戶:363186

  • 數(shù)據(jù)異常處理。The main source file is "dabort.s": with suitable -PreDefines or a corresponding "options-s

    數(shù)據(jù)異常處理。The main source file is "dabort.s": with suitable -PreDefines or a corresponding "options-setting" file, it assembles to the data abort veneer. This is Described in detail in the documentation. The "dabort.h" file contains definitions of some constants used in the data abort veneer s interface to the rest of the system - again, this is Described in the documentation. The "option.s" file is an example "options-setting" file.

    標簽: corresponding PreDefines options-s suitable

    上傳時間: 2013-12-03

    上傳用戶:星仔

  • The concept of the Altera Nios II embedded processor implementation inside Field Programmable Gate A

    The concept of the Altera Nios II embedded processor implementation inside Field Programmable Gate Array [FPGA] of the CCD camera for the “Pi of the Sky” experiment is presented. The digital board of the CCD camera, its most important components, current implementation of firmware [VHDL] inside the FPGA and the role of external 8051 microcontroller is briefly Described. The main goal of the presented work is to get rid of the external microcontroller and to design new system with Nios II processor built inside FPGA chip. Constraints for implementing the design into the existing camera boards are discussed. New possibilities offered by a larger FPGA for next generation of cameras are considered.

    標簽: implementation Programmable processor embedded

    上傳時間: 2014-01-02

    上傳用戶:dyctj

  • 介紹計算機上實現(xiàn)gsm modem短消息收發(fā)的模式

    介紹計算機上實現(xiàn)gsm modem短消息收發(fā)的模式,描述gsm modem PDU 模式,包括PDU 模式下的gsm modem模塊UCS2 編碼、解碼原理,以及gsm modem發(fā)送與接收PDU 串的編制方式, VB 中的MSCOMM 控件,實現(xiàn)gsm modem短消息收發(fā)的核心內(nèi)容。-briefed on computer modem gsm SMS transceiver model, Described GSM modem PDU models, including the PDU mode GSM modem module UCS2 encoding, decoding principle, and GSM modems send and receive PDU Series presentation, the VB MSCOMM Control and achieve short GSM modem news transceiver core content

    標簽: modem gsm 計算機 收發(fā)

    上傳時間: 2017-03-10

    上傳用戶:cxl274287265

  • Measuring Frequency Content in Signals I this section we will study some non parametric methods fo

    Measuring Frequency Content in Signals I this section we will study some non parametric methods for spectrum estimation of a stochastic process. These methods are Described in the literature. All methods are based on the Periodogram which is defined for a sequence x[n] with length N according to

    標簽: parametric Measuring Frequency Content

    上傳時間: 2017-03-20

    上傳用戶:秦莞爾w

  • this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryp

    this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are Described here.

    標簽: i.e. CRYPTOGRAPHY information the

    上傳時間: 2014-01-27

    上傳用戶:ls530720646

  • This application note describes the three methods that can be used to program the Flash code memory

    This application note describes the three methods that can be used to program the Flash code memory of the 89C51Rx+/Rx2/66x families of microcontrollers. It discusses in detail the operation of the In-System Programming (ISP) capability which allows these microcontrollers to be programmed while mounted in the end product. These microcontrollers also have an In-Application Programming (IAP) capability which allows them to be programmed under firmware control of the embedded application. This capability is also Described

    標簽: application describes the methods

    上傳時間: 2014-01-16

    上傳用戶:woshiayin

主站蜘蛛池模板: 土默特右旗| 上思县| 大渡口区| 姜堰市| 志丹县| 华容县| 双辽市| 儋州市| 利津县| 邵东县| 古交市| 新和县| 天等县| 尚义县| 绥棱县| 敖汉旗| 图们市| 柳江县| 临猗县| 河池市| 临安市| 景洪市| 汉源县| 西盟| 于田县| 竹北市| 青海省| 邵武市| 水富县| 竹溪县| 德令哈市| 澳门| 克东县| 汉阴县| 额济纳旗| 太白县| 交口县| 承德县| 福鼎市| 铁力市| 建湖县|