uC/OS-II,The Real-Time Kernel, CORE Functions, 80x86/80x88 Specific code (LARGE MEMORY MODEL)
標簽: Functions Real-Time Specific Kernel
上傳時間: 2014-01-23
上傳用戶:小草123
FileEdit can edit file ,save file ,open file ,have basic simple Functions for file .INSERT, BACKSPACE ,TAB,PGUP,PGDOWN,UP,DOWN,LEFT,RIGHT AND SO ON
標簽: file Functions FileEdit BACKSPAC
上傳時間: 2017-01-02
上傳用戶:風之驕子
fast lua plugin indexing module, can cache lua bytecode Functions for c programs. useful for building plugin index trees
標簽: lua Functions for bytecode
上傳時間: 2014-01-06
上傳用戶:wfeel
Unmanaged_API_Reference for windows Kernel Functions.
標簽: Unmanaged_API_Reference Functions windows Kernel
上傳時間: 2017-01-18
上傳用戶:變形金剛
CodeVisionAVR C Library Functions Reference CodeVisionAVR C 庫函數介紹
標簽: CodeVisionAVR Functions Reference Library
上傳時間: 2017-02-06
上傳用戶:LIKE
#ifdef INTEGER #include "ibp.h" #else #include "rbp.h" #endif /* built-in C Functions */
標簽: include Functions built-in INTEGER
上傳時間: 2014-01-16
上傳用戶:13188549192
The BNL toolbox is a set of Matlab Functions for defining and estimating the parameters of a Bayesian network for discrete variables in which the conditional probability tables are specified by logistic regression models. Logistic regression can be used to incorporate restrictions on the conditional probabilities and to account for the effect of covariates. Nominal variables are modeled with multinomial logistic regression, whereas the category probabilities of ordered variables are modeled through a cumulative or adjacent-categories response function. Variables can be observed, partially observed, or hidden.
標簽: estimating parameters Functions defining
上傳時間: 2014-12-05
上傳用戶:天誠24
The description of Functions WinApi in Russian
標簽: description Functions Russian WinApi
上傳時間: 2017-03-07
上傳用戶:凌云御清風
This project demonstrates the use of secure hash Functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
標簽: demonstrates encryption Functions implement
上傳時間: 2017-03-08
上傳用戶:xuanchangri
This project demonstrates the use of secure hash Functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
標簽: demonstrates encryption Functions implement
上傳時間: 2014-01-10
上傳用戶:yyq123456789