虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

supPort

  • This book is concerned with the description and analysis of the global second generation (2G) mobil

    This book is concerned with the description and analysis of the global second generation (2G) mobile radio systems: the Global System of Mobile Communications (GSM) and cdmaOne. A subsidiary goal is to examine how these two systems will evolve into third generation (3G) ones with their requirement to supPort multimedia mobile radio communications.

    标签: description generation concerned the

    上传时间: 2014-01-14

    上传用户:2467478207

  • java写的一个小播放器程序

    java写的一个小播放器程序,- MP3 streaming supPort for Shoutcast/Icecast added. - Ogg Vorbis supPort added. - Playlist implementation and M3U supPort added.

    标签: java 播放器 程序

    上传时间: 2014-01-03

    上传用户:qwe1234

  • The data files included are .MAT or *.dat (ASCII)files. The m-files and the data may be distributed

    The data files included are .MAT or *.dat (ASCII)files. The m-files and the data may be distributed, provided that the source is acknowledged in any publication and the data are not sold. Since this software is being distributed free of charge, the authors are not offering any technical supPort. Students who have any questions or difficulties using this software, or require the additional functions from the Signal Processing Toolbox should contact their professor.

    标签: files data distributed The

    上传时间: 2014-12-06

    上传用户:wuyuying

  • 《为Windows Vista编写安全的代码》

    《为Windows Vista编写安全的代码》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to supPort a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic Enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars

    标签: Windows Vista 编写 代码

    上传时间: 2016-01-07

    上传用户:zxc23456789

  • TI warrants performance of its products to the specifications applicable at the time of sale in acc

    TI warrants performance of its products to the specifications applicable at the time of sale in accordance with TI’s standard warranty. Testing and other quality control techniques are utilized to the extent TI deems necessary to supPort this warranty. Specific testing of all parameters of each device is not necessarily performed, except those mandated by government requirements.

    标签: specifications performance applicable the

    上传时间: 2016-01-16

    上传用户:weixiao99

  • This article describes a sniffer for Windows. WinSniff is an application for capturing packets on th

    This article describes a sniffer for Windows. WinSniff is an application for capturing packets on the network. It displays all the packets that are transmitted on the local network and gives detailed information about each header in the packet. In order to keep it simple, I am not dealing with application level protocols. If you are interested, you can add features to supPort various application level protocols such as SMTP, FTP, NETBIOS etc

    标签: application describes capturing for

    上传时间: 2016-01-22

    上传用户:lijianyu172

  • 『embedded systems building blocks, complete and ready-to-use modules in C, second edition』 - This

    『embedded systems building blocks, complete and ready-to-use modules in C, second edition』 - This second edition features revisions that supPort the latest version of the author s popular operating system and book, MicroC/OS-II - Complete and ready-to-use modules in C Get a clear explanation of functional code modules and microcontroller theory

    标签: ready-to-use embedded building complete

    上传时间: 2014-12-04

    上传用户:阿四AIR

  • TinyLogin is a suite of tiny Unix utilities for handling logging into, being authenticated by, chan

    TinyLogin is a suite of tiny Unix utilities for handling logging into, being authenticated by, changing one s password for, and otherwise maintaining users and groups on an embedded system. It also provides shadow password supPort to enhance system security. TinyLogin is, as the name implies, very small, and makes an excellent complement to BusyBox on an embedded System. It can be used without BusyBox, of course, but I envision them being used together most of the time.

    标签: authenticated TinyLogin utilities handling

    上传时间: 2016-01-30

    上传用户:253189838

  • OpenSVM was developped under Visual C++ 6.0 SP6, You can open the workspace file(*.dsw) in the ope

    OpenSVM was developped under Visual C++ 6.0 SP6, You can open the workspace file(*.dsw) in the opensvm-src folder. The folder include the svm.h and svm.cpp which in the libsvm (Copyright (c) 2000-2007 Chih-Chung Chang and Chih-Jen Lin All rights reserved) in the opensvm-src\libsvm. However, the files svm.h and svm.cpp codes were copied/merged into stdafx.h and stdafx.cpp in order to supPort the development, and OpenSVM still use other codes of libsvm. So you can see the libsvm package in the source package. You can open and build it with Visual C++ 6.0. Note: the problems must be in LIBSVM format. OpenSVM project page: http://sourceforge.net/projects/opensvm If you had any question, please mail to: cloudbyron@gmail.com

    标签: developped the workspace OpenSVM

    上传时间: 2016-01-30

    上传用户:asdfasdfd

  • Foreword The four case studies that follow each have a number of common features. They each illustr

    Foreword The four case studies that follow each have a number of common features. They each illustrate the birth of an idea and show how that idea can be realised into a marketable product. Each case study deals with engineering design and development issues and each highlights the importance of developing sound marketing strategies including market research. The importance of appropriate supPort mechanisms for young entrepreneurs is also covered. The case studies illustrate how successful entrepreneurs deploy a range of entrepreneurial skills and know-how. Above all, the entrepreneurs are seen to have the capacity to innovate and exercise vision. We are grateful to Liz Read, Development Manager for Enterprise and Entrepreneurship (Students) at Coventry University for providing these case studies.

    标签: each Foreword features studies

    上传时间: 2016-02-17

    上传用户:熊少锋