hard disk drive spindle motor control simulink, show you how to keep the speed at a level
標簽: simulink control spindle drive
上傳時間: 2015-11-01
上傳用戶:ikemada
《Debugging with GDB--The GNU Source-Level Debugger》 9th Edition 2004 By Richard Stallman,Roland Pesch,Stan Shebs Free Software Foundation
標簽: Source-Level Debugging Debugger Stallman
上傳時間: 2015-11-10
上傳用戶:lo25643
Advanced Programming in the UNIX® Environment: Second Edition unix環境高級編程第二版
標簽: Programming Environment Advanced Edition
上傳時間: 2015-11-19
上傳用戶:13215175592
I think this the first time every one can look at a PE crypter source in top level language such VC++. So as I promised ... if some one sent me one nice compress source I would publish my source. I dedicate this source to all people who involve in this field. I hope it helps someone. Have good days ashkbiz Check: yodap.cjb.net
標簽: language crypter source think
上傳時間: 2013-12-29
上傳用戶:dianxin61
Software Testing, Second Edition provides practical insight into the world of software testing and quality assurance. Learn how to find problems in any computer program, how to plan an effective test approach and how to tell when software is ready for release. Updated from the previous edition in 2000 to include a chapter that specifically deals with testing software for security bugs, the processes and techniques used throughout the book are timeless. This book is an excellent investment if you want to better understand what your Software Test team does or you want to write better software.
標簽: practical Software provides software
上傳時間: 2014-08-01
上傳用戶:zhaiyanzhong
Multivac 的Level set包,包括 narrow band level set方法和fast marching方法的全部源代碼。
上傳時間: 2015-12-02
上傳用戶:teddysha
Implement the step 2 of two-level logic minimization. Our goal is to find the minimum (exact minimum) sum-of-products expression for a given function.
標簽: minimization Implement the two-level
上傳時間: 2014-01-09
上傳用戶:無聊來刷下
SQL Server Security Distilled, Second Edition by Morris Lewis ISBN:1590592190 Apress © 2004 (352 pages) This book takes an in-depth look at what you can do to secure data in SQL Server, shows how to authenticate access to data on the server, and authorizes what users can and can t do with that data, in versions 6.5, 7.0, and 2000.
標簽: 1590592190 Distilled Security Edition
上傳時間: 2015-12-25
上傳用戶:hj_18
This book is concerned with the description and analysis of the global second generation (2G) mobile radio systems: the Global System of Mobile Communications (GSM) and cdmaOne. A subsidiary goal is to examine how these two systems will evolve into third generation (3G) ones with their requirement to support multimedia mobile radio communications.
標簽: description generation concerned the
上傳時間: 2014-01-14
上傳用戶:2467478207
level set及PDE方法處理圖形圖像 包括三個部分:1、level set理論基礎介紹;2、數值離散化方法 3、應用 每一部分配有詳細的圖表說明,并給出了多篇參考文獻(其中很多涉及到“三維物體修復”)
上傳時間: 2015-12-31
上傳用戶:腳趾頭