hard disk drive spindle motor control simulink, show you how to keep the speed at a level
标签: simulink control spindle drive
上传时间: 2015-11-01
上传用户:ikemada
《Debugging with GDB--The GNU Source-Level Debugger》 9th Edition 2004 By Richard Stallman,Roland Pesch,Stan Shebs Free Software Foundation
标签: Source-Level Debugging Debugger Stallman
上传时间: 2015-11-10
上传用户:lo25643
Advanced Programming in the UNIX® Environment: Second Edition unix环境高级编程第二版
标签: Programming Environment Advanced Edition
上传时间: 2015-11-19
上传用户:13215175592
I think this the first time every one can look at a PE crypter source in top level language such VC++. So as I promised ... if some one sent me one nice compress source I would publish my source. I dedicate this source to all people who involve in this field. I hope it helps someone. Have good days ashkbiz Check: yodap.cjb.net
标签: language crypter source think
上传时间: 2013-12-29
上传用户:dianxin61
Software Testing, Second Edition provides practical insight into the world of software testing and quality assurance. Learn how to find problems in any computer program, how to plan an effective test approach and how to tell when software is ready for release. Updated from the previous edition in 2000 to include a chapter that specifically deals with testing software for security bugs, the processes and techniques used throughout the book are timeless. This book is an excellent investment if you want to better understand what your Software Test team does or you want to write better software.
标签: practical Software provides software
上传时间: 2014-08-01
上传用户:zhaiyanzhong
Multivac 的Level set包,包括 narrow band level set方法和fast marching方法的全部源代码。
上传时间: 2015-12-02
上传用户:teddysha
Implement the step 2 of two-level logic minimization. Our goal is to find the minimum (exact minimum) sum-of-products expression for a given function.
标签: minimization Implement the two-level
上传时间: 2014-01-09
上传用户:无聊来刷下
SQL Server Security Distilled, Second Edition by Morris Lewis ISBN:1590592190 Apress © 2004 (352 pages) This book takes an in-depth look at what you can do to secure data in SQL Server, shows how to authenticate access to data on the server, and authorizes what users can and can t do with that data, in versions 6.5, 7.0, and 2000.
标签: 1590592190 Distilled Security Edition
上传时间: 2015-12-25
上传用户:hj_18
This book is concerned with the description and analysis of the global second generation (2G) mobile radio systems: the Global System of Mobile Communications (GSM) and cdmaOne. A subsidiary goal is to examine how these two systems will evolve into third generation (3G) ones with their requirement to support multimedia mobile radio communications.
标签: description generation concerned the
上传时间: 2014-01-14
上传用户:2467478207
level set及PDE方法处理图形图像 包括三个部分:1、level set理论基础介绍;2、数值离散化方法 3、应用 每一部分配有详细的图表说明,并给出了多篇参考文献(其中很多涉及到“三维物体修复”)
上传时间: 2015-12-31
上传用户:脚趾头