Freetz is a firmware-extension (modification) for the AVM Fritz!Box and devices with identical hardware. The original firmware from the manufacturer is extended with new functions and programs which may be selected by the user
標(biāo)簽: firmware-extension modification identical devices
上傳時間: 2014-12-08
上傳用戶:qw12
自己寫的robocup-2d程序,從UVA改編 This method is the first complete simple team and defines the actions taken by all the players on the field (excluding the goalie). It is based on the high-level actions taken by the simple team FC Portugal that it released in 2000.
上傳時間: 2014-01-27
上傳用戶:上善若水
There are three ways of specifying an immediate dump Immediate dumps can be specified using the ALTER SESSION command ALTER SESSION SET EVENTS immediate trace name dump level level Immediate dumps can be specified in ORADEBUG ORADEBUG DUMP dump level
標(biāo)簽: specifying Immediate immediate specified
上傳時間: 2014-01-17
上傳用戶:mpquest
The Software Engineering Institute’s (SEI) Capability Maturity Model (CMM) provides a well-known benchmark of software process maturity. The CMM has become a popular vehicle for assessing the maturity of an organization’s software process in many domains. This white paper describes how the Rational Unified Process can support an organization that is trying to achieve CMM Level-2, Repeatable, and Level-3, Defined, software process maturity levels.
標(biāo)簽: Engineering Capability well-known Institute
上傳時間: 2017-02-27
上傳用戶:zhichenglu
FDMP the body of the kernel, the Information-Technology Promotion Agency (IPA) adopted by the unexplored themes of Creativity software is one of the "multi-processor system-level development environment for the development of the system" as part of the development Susumu Honda也氏Was responsible.
標(biāo)簽: the Information-Technology Promotion adopted
上傳時間: 2013-12-25
上傳用戶:dengzb84
Murphy 大俠 GPL 的 C++/x86 RTOS, 支持 MMU, 用戶/核心 模式區(qū)隔. http://hpc.ee.ntu.edu.tw/~murphy/me/EKernel.html part 2 of 3: user mode LIB
標(biāo)簽: EKernel Murphy murphy RTOS
上傳時間: 2013-12-23
上傳用戶:小鵬
Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, network-based end-user applications in environments ranging from network-embedded devices to the World-Wide Web and the desktop
標(biāo)簽: programming language Java technology
上傳時間: 2014-01-03
上傳用戶:huangld
Windows Mobile NLED driver proxy. Created for customization of incoming call ring vibration. While original Windows Mobile ring vibration constant vibrating during all ring, this driver help to apply any user vibrating pattern.
標(biāo)簽: customization vibration incoming Windows
上傳時間: 2017-03-07
上傳用戶:498732662
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
標(biāo)簽: demonstrates encryption functions implement
上傳時間: 2017-03-08
上傳用戶:xuanchangri
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
標(biāo)簽: demonstrates encryption functions implement
上傳時間: 2014-01-10
上傳用戶:yyq123456789
蟲蟲下載站版權(quán)所有 京ICP備2021023401號-1