亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

Support

  • This book is concerned with the description and analysis of the global second generation (2G) mobil

    This book is concerned with the description and analysis of the global second generation (2G) mobile radio systems: the Global System of Mobile Communications (GSM) and cdmaOne. A subsidiary goal is to examine how these two systems will evolve into third generation (3G) ones with their requirement to Support multimedia mobile radio communications.

    標簽: description generation concerned the

    上傳時間: 2014-01-14

    上傳用戶:2467478207

  • java寫的一個小播放器程序

    java寫的一個小播放器程序,- MP3 streaming Support for Shoutcast/Icecast added. - Ogg Vorbis Support added. - Playlist implementation and M3U Support added.

    標簽: java 播放器 程序

    上傳時間: 2014-01-03

    上傳用戶:qwe1234

  • The data files included are .MAT or *.dat (ASCII)files. The m-files and the data may be distributed

    The data files included are .MAT or *.dat (ASCII)files. The m-files and the data may be distributed, provided that the source is acknowledged in any publication and the data are not sold. Since this software is being distributed free of charge, the authors are not offering any technical Support. Students who have any questions or difficulties using this software, or require the additional functions from the Signal Processing Toolbox should contact their professor.

    標簽: files data distributed The

    上傳時間: 2014-12-06

    上傳用戶:wuyuying

  • 《為Windows Vista編寫安全的代碼》

    《為Windows Vista編寫安全的代碼》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to Support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars

    標簽: Windows Vista 編寫 代碼

    上傳時間: 2016-01-07

    上傳用戶:zxc23456789

  • TI warrants performance of its products to the specifications applicable at the time of sale in acc

    TI warrants performance of its products to the specifications applicable at the time of sale in accordance with TI’s standard warranty. Testing and other quality control techniques are utilized to the extent TI deems necessary to Support this warranty. Specific testing of all parameters of each device is not necessarily performed, except those mandated by government requirements.

    標簽: specifications performance applicable the

    上傳時間: 2016-01-16

    上傳用戶:weixiao99

  • This article describes a sniffer for Windows. WinSniff is an application for capturing packets on th

    This article describes a sniffer for Windows. WinSniff is an application for capturing packets on the network. It displays all the packets that are transmitted on the local network and gives detailed information about each header in the packet. In order to keep it simple, I am not dealing with application level protocols. If you are interested, you can add features to Support various application level protocols such as SMTP, FTP, NETBIOS etc

    標簽: application describes capturing for

    上傳時間: 2016-01-22

    上傳用戶:lijianyu172

  • 『embedded systems building blocks, complete and ready-to-use modules in C, second edition』 - This

    『embedded systems building blocks, complete and ready-to-use modules in C, second edition』 - This second edition features revisions that Support the latest version of the author s popular operating system and book, MicroC/OS-II - Complete and ready-to-use modules in C Get a clear explanation of functional code modules and microcontroller theory

    標簽: ready-to-use embedded building complete

    上傳時間: 2014-12-04

    上傳用戶:阿四AIR

  • TinyLogin is a suite of tiny Unix utilities for handling logging into, being authenticated by, chan

    TinyLogin is a suite of tiny Unix utilities for handling logging into, being authenticated by, changing one s password for, and otherwise maintaining users and groups on an embedded system. It also provides shadow password Support to enhance system security. TinyLogin is, as the name implies, very small, and makes an excellent complement to BusyBox on an embedded System. It can be used without BusyBox, of course, but I envision them being used together most of the time.

    標簽: authenticated TinyLogin utilities handling

    上傳時間: 2016-01-30

    上傳用戶:253189838

  • OpenSVM was developped under Visual C++ 6.0 SP6, You can open the workspace file(*.dsw) in the ope

    OpenSVM was developped under Visual C++ 6.0 SP6, You can open the workspace file(*.dsw) in the opensvm-src folder. The folder include the svm.h and svm.cpp which in the libsvm (Copyright (c) 2000-2007 Chih-Chung Chang and Chih-Jen Lin All rights reserved) in the opensvm-src\libsvm. However, the files svm.h and svm.cpp codes were copied/merged into stdafx.h and stdafx.cpp in order to Support the development, and OpenSVM still use other codes of libsvm. So you can see the libsvm package in the source package. You can open and build it with Visual C++ 6.0. Note: the problems must be in LIBSVM format. OpenSVM project page: http://sourceforge.net/projects/opensvm If you had any question, please mail to: cloudbyron@gmail.com

    標簽: developped the workspace OpenSVM

    上傳時間: 2016-01-30

    上傳用戶:asdfasdfd

  • Foreword The four case studies that follow each have a number of common features. They each illustr

    Foreword The four case studies that follow each have a number of common features. They each illustrate the birth of an idea and show how that idea can be realised into a marketable product. Each case study deals with engineering design and development issues and each highlights the importance of developing sound marketing strategies including market research. The importance of appropriate Support mechanisms for young entrepreneurs is also covered. The case studies illustrate how successful entrepreneurs deploy a range of entrepreneurial skills and know-how. Above all, the entrepreneurs are seen to have the capacity to innovate and exercise vision. We are grateful to Liz Read, Development Manager for Enterprise and Entrepreneurship (Students) at Coventry University for providing these case studies.

    標簽: each Foreword features studies

    上傳時間: 2016-02-17

    上傳用戶:熊少鋒

主站蜘蛛池模板: 揭东县| 赤壁市| 太湖县| 柘荣县| 长岭县| 英超| 临城县| 平舆县| 湖北省| 叶城县| 沅陵县| 吉首市| 齐河县| 东方市| 伊春市| 玛沁县| 绥中县| 清丰县| 封开县| 普陀区| 枞阳县| 桃江县| 和田县| 曲松县| 富蕴县| 峨眉山市| 古交市| 沁源县| 镇远县| 中牟县| 大埔区| 武宣县| 宝应县| 万荣县| 淮南市| 金山区| 阜南县| 蓬莱市| 伊宁市| 视频| 内丘县|