虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Who

  • Here are two newest published articles talking about joint source channel coding, in which source co

    Here are two newest published articles talking about joint source channel coding, in which source coding is invovled scalable video coding. They are very useful for people Who are doing research about it.

    标签: source published articles channel

    上传时间: 2013-12-03

    上传用户:1427796291

  • 用20个示例项目的方式介绍Matlab/Simulink。内容包括: *Contains over 20 hands-on projects in MATLAB(with code) integra

    用20个示例项目的方式介绍Matlab/Simulink。内容包括: *Contains over 20 hands-on projects in MATLAB(with code) integrated throughout the book *Includes a complete introduction to Simulink *Accompanied by a CD-ROM containing MATLAB examples, source code, third party simulations & projects *Suitable for self-study and professional licensing exams *Designed for the reader Who does not have extensive math and programming experience *Contains many practical applications of MATLAB and Simulink

    标签: Contains Simulink hands-on projects

    上传时间: 2014-01-03

    上传用户:hj_18

  • jsp和xml。XML and JSP are two important tools available in producing a web application. This chapter e

    jsp和xml。XML and JSP are two important tools available in producing a web application. This chapter examines the potential of mixing these two technologies in order to enhance the capabilities of JSP. While this chapter will cover many things about XML, this chapter will not attempt to teach XML. Instead it focuses on how JSP and XML can be used together as a highly flexible and powerful tool. In general the usage of XML in these examples will be kept simple and should cause no problems for users Who are starting XML.

    标签: application important available producing

    上传时间: 2013-12-10

    上传用户:1427796291

  • The MIPS32® 4KEm™ core from MIPS® Technologies is a member of the MIPS32 4KE™ proc

    The MIPS32® 4KEm™ core from MIPS® Technologies is a member of the MIPS32 4KE™ processor core family. It is a high-performance, low-power, 32-bit MIPS RISC core designed for custom system-on-silicon applications. The core is designed for semiconductor manufacturing companies, ASIC developers, and system OEMs Who want to rapidly integrate their own custom logic and peripherals with a high-performance RISC processor. It is highly portable across processes, and can be easily integrated into full system-on-silicon designs, allowing developers to focus their attention on end-user products. The 4KEm core is ideally positioned to support new products for emerging segments of the digital consumer, network, systems, and information management markets, enabling new tailored solutions for embedded applications.

    标签: MIPS 8482 Technologies 174

    上传时间: 2014-12-22

    上传用户:semi1981

  • "The GRAPHICS GEMS Series" was started in 1990 by Andrew Glassner. The vision and purpose of the Ser

    "The GRAPHICS GEMS Series" was started in 1990 by Andrew Glassner. The vision and purpose of the Series was - and still is - to provide tips, techniques, and algorithms for graphics programmers. All of the gems are written by programmers Who work in the field and are motivated by a common desire to share interesting ideas and tools with their colleagues. Each volume provides a new set of innovative solutions to a variety of programming problems.

    标签: The GRAPHICS Glassner started

    上传时间: 2016-12-18

    上传用户:firstbyte

  • The documentation folder contains general documentation. It includes an alternative version of Chapt

    The documentation folder contains general documentation. It includes an alternative version of Chapter 1 for those Who want to use the JGrasp IDE.

    标签: documentation alternative contains includes

    上传时间: 2014-01-23

    上传用户:refent

  • Implement a phone book system for employees of a company. Your program will output the following me

    Implement a phone book system for employees of a company. Your program will output the following menu (1) Enter an employee and a phone pair to the system (2) Lookup an employee s phone number (3) Find out Who is/are the person(s) of a given number (4) How many people are currently in the system (5) Delete an employee from the system (6) Output all employees name‐phone pair (7) How many phone numbers total in the current system (8) Quit When

    标签: Implement employees following company

    上传时间: 2013-12-17

    上传用户:zhangliming420

  • Introduction Computer security is undeniably important, and as new vulnerabilities are discovered a

    Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors Who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s

    标签: vulnerabilities Introduction discovered undeniably

    上传时间: 2014-01-05

    上传用户:yph853211

  • The worm will duplicate to WINNT catalogue , put worm shelf adult.exe into C: , in zip file under C:

    The worm will duplicate to WINNT catalogue , put worm shelf adult.exe into C: \, in zip file under C:\WINNT , C:\WINNT\system32 , these three catalogues ,. The worm will falsely use the person Who sends one name and send the addressee for this mail of worm s mail automatically, the worm will open the selfish calculations constantly too.

    标签: worm duplicate catalogue WINNT

    上传时间: 2017-01-13

    上传用户:aig85

  • The worm will produce Arod.exe and " get to C: WINDOWS catalogue . After starting the machine again

    The worm will produce Arod.exe and " get to C: \WINDOWS catalogue . After starting the machine again , will put worm shelf Arod.exe into C: \, C:\WINDOWS,In zip file under WINDOWS \system32 , these three catalogues ,. As the user opens Outlook Express, the worm will search Outlook Express and accept a mail while inserting , and falsely use the person Who sends one name and send the addressee for this mail of worm s mail automatically.

    标签: catalogue starting produce WINDOWS

    上传时间: 2013-12-18

    上传用户:wang5829