亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

INsights

  • 軟件工程方法Prefactoring Prefactoring, in essence, is the art of applying the INsights gleaned from previ

    軟件工程方法Prefactoring Prefactoring, in essence, is the art of applying the INsights gleaned from previous experience (whether yours or someone else s) when developing software to new projects. Doing so will likely save you from making costly design changes midstream--and maybe even save your job!

    標(biāo)簽: Prefactoring the applying INsights

    上傳時間: 2013-12-22

    上傳用戶:wangchong

  • 優(yōu)美源碼的絕好參考書籍!Beautiful code was conceived by greg wilson in 2006 as a way to elicit INsights from lea

    優(yōu)美源碼的絕好參考書籍!Beautiful code was conceived by greg wilson in 2006 as a way to elicit INsights from leading software developers and computer scientists

    標(biāo)簽: Beautiful conceived INsights elicit

    上傳時間: 2016-03-20

    上傳用戶:xzt

  • contains documents about new INsights into the recursive least squares algorithm and a sample matlab

    contains documents about new INsights into the recursive least squares algorithm and a sample matlab code for rls algorithm

    標(biāo)簽: algorithm documents recursive contains

    上傳時間: 2017-04-13

    上傳用戶:我干你啊

  • State Machine Coding Styles for Synthesis

      本文論述了狀態(tài)機的verilog編碼風(fēng)格,以及不同編碼風(fēng)格的優(yōu)缺點,Steve Golson's 1994 paper, "State Machine Design Techniques for Verilog and VHDL" [1], is agreat paper on state machine design using Verilog, VHDL and Synopsys tools. Steve's paper alsooffers in-depth background concerning the origin of specific state machine types.This paper, "State Machine Coding Styles for Synthesis," details additional INsights into statemachine design including coding style approaches and a few additional tricks.

    標(biāo)簽: Synthesis Machine Coding Styles

    上傳時間: 2013-10-15

    上傳用戶:dancnc

  • 音頻數(shù)模轉(zhuǎn)換器DAC抖動的靈敏度分析

    Abstract: This application note describes how sampling clock jitter (time interval error or "TIE jitter") affectsthe performance of delta-sigma digital-to-analog converters (DACs). New INsights explain the importanceof separately specifying low-frequency (< 2x passband frequency) and high-frequency or wideband (> 2xpassband frequency) jitter tolerance in these devices. The article also provides an application example ofa simple highly jittered cycle-skipped sampling clock and describes a method for generating a properbroadband jittered clock. The document then goes on to compare Maxim's audio DAC jitter tolerance tocompetitor audio DACs. Maxim's exceptionally high jitter tolerance allows very simple and low-cost sampleclock implementations.

    標(biāo)簽: DAC 音頻 數(shù)模轉(zhuǎn)換器 抖動

    上傳時間: 2013-10-25

    上傳用戶:banyou

  • State Machine Coding Styles for Synthesis

      本文論述了狀態(tài)機的verilog編碼風(fēng)格,以及不同編碼風(fēng)格的優(yōu)缺點,Steve Golson's 1994 paper, "State Machine Design Techniques for Verilog and VHDL" [1], is agreat paper on state machine design using Verilog, VHDL and Synopsys tools. Steve's paper alsooffers in-depth background concerning the origin of specific state machine types.This paper, "State Machine Coding Styles for Synthesis," details additional INsights into statemachine design including coding style approaches and a few additional tricks.

    標(biāo)簽: Synthesis Machine Coding Styles

    上傳時間: 2013-10-12

    上傳用戶:sardinescn

  • 《為Windows Vista編寫安全的代碼》

    《為Windows Vista編寫安全的代碼》,2007年出版 Providing developers with first-hand INsights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars

    標(biāo)簽: Windows Vista 編寫 代碼

    上傳時間: 2016-01-07

    上傳用戶:zxc23456789

  • The world s bestselling computer security book--fully expanded and updated is one of the most succes

    The world s bestselling computer security book--fully expanded and updated is one of the most successful security books ever written. Leverage the valuable INsights Hacking Exposed 6 provides to help yourself, your company to fight cyber-crime.

    標(biāo)簽: bestselling computer security expanded

    上傳時間: 2017-05-14

    上傳用戶:thuyenvinh

  • C programming is a craft that takes years to perfect. A reasonably sharp person can learn the basics

    C programming is a craft that takes years to perfect. A reasonably sharp person can learn the basics of C quite quickly. But it takes much longer to master the nuances of the language and to write enough programs, and enough different programs, to become an expert. In natural language terms, this is the difference between being able to order a cup of coffee in Paris, and (on the Metro) being able to tell anative Parisienne where to get off. This book is an advanced text on the ANSI C programming language. It is intended for people who are already writing C programs, and who want to quickly pick up some of the INsights and techniques of experts.

    標(biāo)簽: programming reasonably perfect basics

    上傳時間: 2013-12-20

    上傳用戶:ls530720646

  • Python Machine Learning

    Unlock deeper INsights into machine learning with this vital guide to cutting-edge predictive analytics

    標(biāo)簽: Learning Machine Python

    上傳時間: 2017-10-27

    上傳用戶:shawnleaves

主站蜘蛛池模板: 普安县| 五台县| 彭州市| 云阳县| 余干县| 新民市| 宜丰县| 宿迁市| 金平| 化州市| 宁国市| 和平区| 灵宝市| 丹凤县| 崇信县| 阿鲁科尔沁旗| 曲松县| 安西县| 施秉县| 洛阳市| 福州市| 芮城县| 壶关县| 宁强县| 宜宾市| 灵宝市| 台北市| 盐池县| 米易县| 英吉沙县| 陇西县| 始兴县| 多伦县| 资源县| 临泉县| 焉耆| 永川市| 岱山县| 巫山县| 墨竹工卡县| 绥江县|