Securing Apache 2: Step-by-Step When choosing a web server, Apache very often wins against its co
Securing Apache 2: Step-by-Step When choosing a web server, Apache very often wins against its co...
Securing Apache 2: Step-by-Step When choosing a web server, Apache very often wins against its co...
The Bayesian Committee Machine (BCM) is an approximation method for large-scale Gaussian process re...
Demostration of example 6.2: Constrained Receding Horizon Control Example retired from the book: Re...
這是寫給作為軟件工程項目經理的書,原書的書評是: "If you re looking for solid, easy-to-follow advice on estimation, require...
madCollection 2.5.2.6 full source This is not your every day VCL component collection. You won t se...
CF+ and CompactFlash Specification Revision 3.0 Use of this specification for product design re...
In this first-ever paperback edition of his long-time best-seller, motivational speaker Steve Chandl...
quality enhancement of celp coded speech by LBG algorithm, with proposed algorithm and simulation re...
程序針對mcu:cypress 68013,flash:samsung k9f1g08u,MCU運行于48M,對于其它頻率,一些時序常數可能需要修改.程序實現了FLASH的CLEAR,WRITE,RE...
A one-dimensional calibration object consists of three or more collinear points with known relative ...