书名为<introduction to digital audio coding and standards>
标签: introduction standards digital coding
上传时间: 2016-11-29
上传用户:66666
Introduction to the SnagIt COM Server
标签: Introduction SnagIt Server COM
上传时间: 2013-12-20
上传用户:1583060504
编译器设计入门 内容 n Introduction n Setting Up the Tutorial n Graphical Interface n The Alarm Clock Design n Setting Design Environment n Setting Design Constraints n Overview of Optimization Phases n Analysis of Report
标签: Introduction Graphical Interface Tutorial
上传时间: 2014-01-15
上传用户:hzy5825468
ResOrg 图形化管理Vc项目的资源ID的工具的源代码。 ResOrg - Manage and Renumber Resource Symbol IDs Introduction The Resource ID Organiser (ResOrg for short) is an Add-in for Visual C++ designed to help overcome one of the most annoying (and unnecessary) chores of developing/maintaining Windows applications - maintaining resource symbol ID values.
标签: ResOrg Introduction Renumber Resource
上传时间: 2013-12-25
上传用户:dsgkjgkjg
OSGi(Open Service Gateway Initiative)指OSGi Alliance组织制定的一个基于Java语言的服务(业务)规范——OSGi服务平台(Service Platform)。 它被广泛应用于嵌入式系统中,大名鼎鼎的eclipse也是基于此框架的,号称2008值得学习的五种java技术之一。
标签: OSGi Service Initiative Alliance
上传时间: 2016-12-15
上传用户:wang5829
VB - Introduction to Visual Basic NET (SAMS)
标签: Introduction Visual Basic SAMS
上传时间: 2016-12-17
上传用户:电子世界
Introduction 2 algorithms exercise and answer.pdf
标签: Introduction algorithms exercise answer
上传时间: 2013-12-19
上传用户:cainaifa
epoll simple introduction.
标签: introduction simple epoll
上传时间: 2013-12-17
上传用户:songnanhua
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211
Memory Management—Algorithms and implementation in C/C++ Introduction Chapter 1 - Memory Management Mechanisms Chapter 2 - Memory Management Policies Chapter 3 - High-Level Services Chapter 4 - Manual Memory Management Chapter 5 - Automatic Memory Management Chapter 6 - Miscellaneous Topics Index List of Figures List of Tables List of Case Studies List of Sidebars
标签: Memory implementation Introduction Management
上传时间: 2013-12-25
上传用户:541657925