搜索资源列表
HRT-HOOD A Structured Design Method for Hard Real-
- 这篇论文描述了一种设计Hard Real Time System的结构方法HRT-HOOD,由York大学的两位教授提出,York大学的Real Time System Group是关于实时系统研究的世界领先机构,研究内容具体可以登陆York的网站,或者参考出版书籍:Real Time Systems and Programming Languages.-This paper describes a design Hard Real Time System Structure of HRT -
Using-Two-Independent-Cameras-to-View-a-Scene
- osg中using two independent camera to veiw a scene
A.spur-free.fractional-N.pll
- A new PLL topology and a new simplified linear model are presented. The new fractional-N synthesizer presents no reference spurs and lowers the overall phase noise, thanks to the presence of a SampleJHold block. With a new simulation methodology it i
Addison.Wesley.UML.Distilled.A.Brief.Guide.3rd.Edi
- Addison.Wesley.UML.Distilled.A.Brief.Guide.3rd.Edition,此文英文版,中文版翻译很差,请直接读英文版。
A逐点循环递归法求哈密顿回路
- 此文档是用VC编写的编译原理A逐点循环递归法求哈密顿回路的程序-This document was prepared by the compiler VC Principle A cycle-by-point method for recursive loop Hamiltonian procedures
人工智能中A关算法的程序实现
- 人工智能中A关算法的程序实现
Flash M25P64驱动开发与应用a
- Flash M25P64驱动开发与应用a
VC-USB-HID.常用的Windows+API调用
- 常用的Windows+API调用 怎样编写一个在USB接口读写数据的程序 HID设备的访问,Commonly used Windows+ API call how to prepare a USB interface to read and write data through HID equipment visit
ObjectARX2004
- ARX 2004的帮助文档,是一个不错的学习ARX的好资料,帮助我们提高学习的速度-ARX 2004 with the help documentation, it is a good learning ARX good information to help us to improve the learning speed
A-complete-access-control-system-
- 一 套 完 整 的 门 禁 系 统 ( 原理图 + 源程序 )-A complete access control system (schematic+ source code)
ZEMAX_2005-02-03
- this a crack vision of Zemax -this is a crack vision of Zemax
stereopairs
- 立体图像校准的matlab程序算法讲解。可以直接下载源码-A compact algorithm for rectification of stereo pairs
Garey---Computers-and-Intractability---A-Guide-to
- Garey - Computers and Intractability - A Guide to NP-Completene-Garey - Computers and Intractability - A Guide to NP-Completeness
COMPUTER_NETWORKS
- 英文 网络课件 Computer Networking: A Top Down Approach Featuring the Internet, 3rd edition. Jim Kurose, Keith RossAddison-Wesley, July 2004. -English Courseware Computer Networking: A Top Down Approach Featuring the Internet, 3rd edition. Jim Kurose, Ke
ImageEdgeDetectingMethodBasedonFractalFeature
- 运用分形理论描述图像纹理特征,通过分析不同纹理图像及图像边缘处的分形参数,得 到一种新的边缘检测分形特征,从而提出一种基于分形特征的图像边缘检测方法。自适应阈值的 引入,能够实现不同图像的边缘检测。该算法简单迅速,并具有良好的抗噪性能。-The use of fractal theory to describe the image texture features, through the analysis of different texture image and the ima
VCandDatabase
- Visual C++提供了多种多样的数据库访问技术——ODBC API、MFC ODBC、DAO、OLE DB、ADO等。这些技术各有自己的特点,它们提供了简单、灵活、访问速度快、可扩展性好的开发技术。-Visual C++ provides a variety of database access technology- ODBC API, MFC ODBC, DAO, OLE DB, ADO, etc.. These technologies have their own character
Managing-Humans-Biting-And-Humorous-Tales-Of-A-So
- Managing Humans is a selection of the best essays from Michael Lopps web site, Rands In Repose. Drawing on Lopp s management experiences at Apple, Netscape, Symantec, and Borland, this book is full of stories based on companies in the Silicon Valley
wrls-DYMOUM.tcl.tar
- A 3-node example for ad-hoc simulation with DSDV
Adding-A-System-Call
- This document gives you steps to add a system call in linux kernel.
Boosting-a-weak-learning-algorithm
- Freund在1995年发表的一篇很经典的文章Boosting a weak learning algorithm by majority,是关于弱学习算法的,全英文写的-Freund in 1995 published a classic article Boosting a weak learning algorithm by majority, is on the weak learning algorithm, written in English