書名為<introduction to digital audio coding and standards>
標簽: introduction standards digital coding
上傳時間: 2016-11-29
上傳用戶:66666
Introduction to the SnagIt COM Server
標簽: Introduction SnagIt Server COM
上傳時間: 2013-12-20
上傳用戶:1583060504
編譯器設計入門 內容 n Introduction n Setting Up the Tutorial n Graphical Interface n The Alarm Clock Design n Setting Design Environment n Setting Design Constraints n Overview of Optimization Phases n Analysis of Report
標簽: Introduction Graphical Interface Tutorial
上傳時間: 2014-01-15
上傳用戶:hzy5825468
ResOrg 圖形化管理Vc項目的資源ID的工具的源代碼。 ResOrg - Manage and Renumber Resource Symbol IDs Introduction The Resource ID Organiser (ResOrg for short) is an Add-in for Visual C++ designed to help overcome one of the most annoying (and unnecessary) chores of developing/maintaining Windows applications - maintaining resource symbol ID values.
標簽: ResOrg Introduction Renumber Resource
上傳時間: 2013-12-25
上傳用戶:dsgkjgkjg
OSGi(Open Service Gateway Initiative)指OSGi Alliance組織制定的一個基于Java語言的服務(業務)規范——OSGi服務平臺(Service Platform)。 它被廣泛應用于嵌入式系統中,大名鼎鼎的eclipse也是基于此框架的,號稱2008值得學習的五種java技術之一。
標簽: OSGi Service Initiative Alliance
上傳時間: 2016-12-15
上傳用戶:wang5829
VB - Introduction to Visual Basic NET (SAMS)
標簽: Introduction Visual Basic SAMS
上傳時間: 2016-12-17
上傳用戶:電子世界
Introduction 2 algorithms exercise and answer.pdf
標簽: Introduction algorithms exercise answer
上傳時間: 2013-12-19
上傳用戶:cainaifa
epoll simple introduction.
標簽: introduction simple epoll
上傳時間: 2013-12-17
上傳用戶:songnanhua
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
標簽: vulnerabilities Introduction discovered undeniably
上傳時間: 2014-01-05
上傳用戶:yph853211
Memory Management—Algorithms and implementation in C/C++ Introduction Chapter 1 - Memory Management Mechanisms Chapter 2 - Memory Management Policies Chapter 3 - High-Level Services Chapter 4 - Manual Memory Management Chapter 5 - Automatic Memory Management Chapter 6 - Miscellaneous Topics Index List of Figures List of Tables List of Case Studies List of Sidebars
標簽: Memory implementation Introduction Management
上傳時間: 2013-12-25
上傳用戶:541657925