lex and yacc, trying to identify the different words
標簽: different identify trying words
上傳時間: 2013-12-23
上傳用戶:manking0408
優秀的內網子機及端口嗅探器(附java代碼).JMap is a Java network port scanner, a security tool to identify open ports on any host or network subnet.
標簽: identify security network scanner
上傳時間: 2014-01-03
上傳用戶:hn891122
An Efficient and Effective Detailed Placement Algorithm Global Swap To identify a pair of cells that can be swapped to reduce wirelength (others are fixed). 2. Vertical Swap Swap a cell with a nearby cell in the segment above or below. 3. Local Re-ordering Re-order consecutive cells locally to reduce wirelength. 4. Single-Segment Clustering Place cells optimally within a segment.
標簽: Algorithm Efficient Effective Placement
上傳時間: 2013-12-18
上傳用戶:ukuk
The authors show to identify, design, implement, test, and refactor use-case modules, as well as extend them. They also demonstrate how to design use-case modules with the Unified Modeling Language (UML)emphasizing enhancements made in UML 2.0and how to achieve use-case modularity using aspect technologies, notably AspectJ. Key topics include Making the case for use cases and aspects Capturing and modeling concerns with use cases Keeping concerns separate with use-case modules Modeling use-cases slices and aspects using the newest extensions to the UML notation Applying use cases and aspects in projects
標簽: implement identify refactor use-case
上傳時間: 2016-10-06
上傳用戶:dsgkjgkjg
Synplify.Premier.v9.6.2.with.identify.3.0.2 crack
標簽: Synplify identify Premier crack
上傳時間: 2014-01-06
上傳用戶:日光微瀾
Tool to identify your USB controller chip
標簽: controller identify Tool chip
上傳時間: 2017-03-03
上傳用戶:ddddddos
To identify distinguishable clusters of data in an n-dimensional pixel value image. Given: Samples of multi-spectral satellite images
標簽: distinguishable n-dimensional identify clusters
上傳時間: 2017-08-08
上傳用戶:it男一枚
·詳細說明:用VISUAL C++編程實現指紋圖像的特征提取以及對指紋圖像的識別-Utilising VISUAL C++ to make programs, we can get the characters of image and identify the image of finger mark 文件列表: fvs.ncb fvs.sln fvs.v
上傳時間: 2013-04-24
上傳用戶:kaka
Power over Ethernet (PoE) is a new development thatallows for the delivery of power to Ethernet-based devicesvia standard Ethernet CAT5 cable, precluding the need forwall adapters or other external power sources. The PoEspecification defines a hardware detection protocol wherePower Sourcing Equipment (PSE) is able to identify PoEPowered Devices (PDs), thus allowing full backwardscompatibility with non-PoE-aware (legacy) Ethernetdevices.
上傳時間: 2013-11-11
上傳用戶:daoyue
Radio Frequency Identifi cation (RFID) technology usesradiated and refl ected RF power to identify and track avariety of objects. A typical RFID system consists of areader and a transponder (or tag). An RFID reader containsan RF transmitter, one or more antennas and an RFreceiver. An RFID tag is simply an uniquely identifi ed ICwith an antenna.
上傳時間: 2013-10-17
上傳用戶:lepoke