how to write testbench,use vhdl
上傳時間: 2017-01-24
上傳用戶:athjac
bison is a GNU parse generator. You can use it to generate source code based on your own rules.
標簽: generator generate source bison
上傳時間: 2017-01-27
上傳用戶:努力努力再努力
Use this resource to teach yourself Visual C# .NET version 2003, start developing Microsoft .NET–connected applications—one step at a time, master language fundamentals at your own pace and use the learn-by-doing exercises to dig in and code!
標簽: developing NET Microsoft resource
上傳時間: 2014-08-09
上傳用戶:jcljkh
use visual c++ to solve math problem ,Chengbihong,people post pre
標簽: Chengbihong problem people visual
上傳時間: 2013-12-20
上傳用戶:hgy9473
This product has been manufactured to your company’s specifications a part for use in your company’s general electronic products. It is guaranteed to perform according to delivery specifications. For any other use apart from general electronic equipment, we cannot take responsibility if the product is used in medical devices, nuclear power control equipment, aerospace equipment, fire and security systems, or any other applications in which there is a direct risk to human life and where extremely high levels of reliability are required. If the product is to be used in any of the above applications, we will need to enter into a separate product liability agreement.
標簽: company your specifications manufactured
上傳時間: 2017-02-19
上傳用戶:haohaoxuexi
it a channel for the wii. We can play game backup with softchip.dol and we can use this channel to load the latest version of softchip
標簽: channel can softchip backup
上傳時間: 2017-03-01
上傳用戶:asdfasdfd
The I2C driver use to control LCD momo that using I2C driver.
上傳時間: 2014-10-14
上傳用戶:gengxiaochao
You use variables in your program to hold data which may be in different type, such as characters, numbers, date and time etc.
標簽: characters different variables program
上傳時間: 2017-03-07
上傳用戶:xaijhqx
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
標簽: demonstrates encryption functions implement
上傳時間: 2017-03-08
上傳用戶:xuanchangri
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
標簽: demonstrates encryption functions implement
上傳時間: 2014-01-10
上傳用戶:yyq123456789