uC/OS-II,The Real-Time Kernel, CORE functiONs, 80x86/80x88 Specific code (LARGE MEMORY MODEL)
标签: functiONs Real-Time Specific Kernel
上传时间: 2014-01-23
上传用户:小草123
FileEdit can edit file ,save file ,open file ,have basic simple functiONs for file .INSERT, BACKSPACE ,TAB,PGUP,PGDOWN,UP,DOWN,LEFT,RIGHT AND SO ON
标签: file functiONs FileEdit BACKSPAC
上传时间: 2017-01-02
上传用户:风之骄子
fast lua plugin indexing module, can cache lua bytecode functiONs for c programs. useful for building plugin index trees
标签: lua functiONs for bytecode
上传时间: 2014-01-06
上传用户:wfeel
Unmanaged_API_Reference for windows Kernel functiONs.
标签: Unmanaged_API_Reference functiONs windows Kernel
上传时间: 2017-01-18
上传用户:变形金刚
CodeVisionAVR C Library functiONs Reference CodeVisionAVR C 库函数介绍
标签: CodeVisionAVR functiONs Reference Library
上传时间: 2017-02-06
上传用户:LIKE
#ifdef INTEGER #include "ibp.h" #else #include "rbp.h" #endif /* built-in C functiONs */
标签: include functiONs built-in INTEGER
上传时间: 2014-01-16
上传用户:13188549192
The BNL toolbox is a set of Matlab functiONs for defining and estimating the parameters of a Bayesian network for discrete variables in which the conditional probability tables are specified by logistic regression models. Logistic regression can be used to incorporate restrictions on the conditional probabilities and to account for the effect of covariates. Nominal variables are modeled with multinomial logistic regression, whereas the category probabilities of ordered variables are modeled through a cumulative or adjacent-categories response function. Variables can be observed, partially observed, or hidden.
标签: estimating parameters functiONs defining
上传时间: 2014-12-05
上传用户:天诚24
The description of functiONs WinApi in Russian
标签: description functiONs Russian WinApi
上传时间: 2017-03-07
上传用户:凌云御清风
This project demonstrates the use of secure hash functiONs technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functiONs implement
上传时间: 2017-03-08
上传用户:xuanchangri
This project demonstrates the use of secure hash functiONs technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functiONs implement
上传时间: 2014-01-10
上传用户:yyq123456789