This book Introduces embedded systems to C and C++ programmers. Topics include testing memory devices, writing and erasing Flash memory, verifying nonvolatile memory contents, controlling on-chip peripherals, device driver design and implementation, optimizing embedded code for size and speed, and making the most of C++ without a performance penalty. Pages : 336 Slots : 1
标签: programmers Introduces embedded include
上传时间: 2013-12-10
上传用户:shizhanincc
jboss 开发人员 手册 JBoss: A Developer s Notebook also Introduces the management console, the web services messaging features, enhanced monitoring capabilities, and shows you how to improve performance. At the end of each lab, you ll find a section called "What about..." that anticipates and answers likely follow-up questions, along with a section that points you to articles and other resources if you need more information.
标签: Introduces management Developer the
上传时间: 2015-04-17
上传用户:dreamboy36
This book Introduces embedded systems to C and C++ programmers. Topics include testing memory devices, writing and erasing Flash memory, verifying nonvolatile memory contents, controlling on-chip peripherals, device driver design and implementation, optimizing embedded code for size and speed, and making the most of C++ without a performance penalty.
标签: programmers Introduces embedded include
上传时间: 2015-06-22
上传用户:VRMMO
This document is part of H.264 standard and Introduces the prediction of Inter Marcoblocks in P-slices.
标签: Marcoblocks Introduces prediction document
上传时间: 2015-06-30
上传用户:sjyy1001
This application report Introduces and describes an MP3 /AAC audio player for use with the TMS320C54x(TM) digital signal processor (DSP) devices. This audio player is based on Reference Framework Level 3 (RF3). Reference Framework for eXpressDSP(TM) Software is a start-ware for developing applications that use DSP/BIOS(TM) and the TMS320(TM) DSP AlgorithmStandard.
标签: application Introduces describes report
上传时间: 2014-05-25
上传用户:x4587
This text Introduces the spirit and theory of hacking as well as the science behind it all it also provides some core techniques and tricks of hacking so you can think like a hacker, write your own hacks or thwart potential system attacks. 译作:《黑客入侵的艺术》,也是从朋友的宝箱中搜来的,以前层大致浏览过,是难得一件的好资料。
标签: Introduces the hacking science
上传时间: 2013-12-28
上传用户:离殇
Introduces synchronization concepts and practices in multithreaded applications
标签: synchronization multithreaded applications Introduces
上传时间: 2013-12-15
上传用户:sevenbestfei
This paper Introduces a software visualization system that: creates animations of programs without the programmer writing any animation code and provides a window interface that automatically displays program information, explicitly showing the scope and context of its data, and allowing considerable control over animation displays.
标签: visualization Introduces animations software
上传时间: 2015-09-28
上传用户:xsnjzljj
Learning Kernel Classifiers: Theory and Algorithms, Introduction This chapter Introduces the general problem of machine learning and how it relates to statistical inference. 1.1 The Learning Problem and (Statistical) Inference It was only a few years after the introduction of the first computer that one of man’s greatest dreams seemed to be realizable—artificial intelligence. Bearing in mind that in the early days the most powerful computers had much less computational power than a cell phone today, it comes as no surprise that much theoretical research on the potential of machines’ capabilities to learn took place at this time. This becomes a computational problem as soon as the dataset gets larger than a few hundred examples.
标签: Introduction Classifiers Algorithms Introduces
上传时间: 2015-10-20
上传用户:aeiouetla
This paper Introduces an affine invariant of trapezia, and the explicit constraint equation between the intrinsic matrix of a camera and the similarity invariants of a trapezium are established using the affine invariant. By this constraint, the inner parameters, motion parameters of the cameras and the similarity invariants of trapezia can be linearly determined using some prior knowledge on the cameras or the trapezia. The proposed algorithms have wide applicability since parallel lines are not rare in many scenes. Experimental results validate the proposed approaches. This work presents a unifying framework based on the parallelism constraint, and the previous methods based on the parallelograms or the parallelepipeds can be integrated into this framework. Key words: invariant parallelism constraint camera calibration 3D reconstruction
标签: Introduces constraint invariant explicit
上传时间: 2014-01-16
上传用户:6546544