亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

enhancements

  • Xilinx UltraScale:新一代架構滿足您的新一代架構需求(EN)

      中文版詳情瀏覽:http://www.elecfans.com/emb/fpga/20130715324029.html   Xilinx UltraScale:The Next-Generation Architecture for Your Next-Generation Architecture    The Xilinx® UltraScale™ architecture delivers unprecedented levels of integration and capability with ASIC-class system- level performance for the most demanding applications.   The UltraScale architecture is the industr y's f irst application of leading-edge ASIC architectural enhancements in an All Programmable architecture that scales from 20 nm planar through 16 nm FinFET technologies and beyond, in addition to scaling from monolithic through 3D ICs. Through analytical co-optimization with the X ilinx V ivado® Design Suite, the UltraScale architecture provides massive routing capacity while intelligently resolving typical bottlenecks in ways never before possible. This design synergy achieves greater than 90% utilization with no performance degradation.   Some of the UltraScale architecture breakthroughs include:   • Strategic placement (virtually anywhere on the die) of ASIC-like system clocks, reducing clock skew by up to 50%    • Latency-producing pipelining is virtually unnecessary in systems with massively parallel bus architecture, increasing system speed and capability   • Potential timing-closure problems and interconnect bottlenecks are eliminated, even in systems requiring 90% or more resource utilization   • 3D IC integration makes it possible to build larger devices one process generation ahead of the current industr y standard    • Greatly increased system performance, including multi-gigabit serial transceivers, I/O, and memor y bandwidth is available within even smaller system power budgets   • Greatly enhanced DSP and packet handling   The Xilinx UltraScale architecture opens up whole new dimensions for designers of ultra-high-capacity solutions.

    標簽: UltraScale Xilinx 架構

    上傳時間: 2013-11-21

    上傳用戶:wxqman

  • VHDL,Verilog,System verilog比較

      本文簡單討論并總結了VHDL、Verilog,System verilog 這三中語言的各自特點和區別As the number of enhancements to variousHardware Description Languages (HDLs) hasincreased over the past year, so too has the complexityof determining which language is best fora particular design. Many designers and organizationsare contemplating whether they shouldswitch from one HDL to another.

    標簽: Verilog verilog System VHDL

    上傳時間: 2014-03-03

    上傳用戶:zhtzht

  • Texas Instruments Incorporated and its subsidiaries (TI) reserve the right to make corrections, modi

    Texas Instruments Incorporated and its subsidiaries (TI) reserve the right to make corrections, modifications, enhancements, improvements, and other changes to its products and services at any time and to discontinue any product or service without notice. Customers should obtain the latest relevant information before placing orders and should verify that such information is current and complete. All products are sold subject to TI’s terms and conditions of sale supplied at the time of order acknowledgment.

    標簽: Incorporated subsidiaries Instruments corrections

    上傳時間: 2013-12-24

    上傳用戶:haohaoxuexi

  • About: hamsterdb is a database engine written in ANSI C. It supports a B+Tree index structure, uses

    About: hamsterdb is a database engine written in ANSI C. It supports a B+Tree index structure, uses memory mapped I/O (if available), supports cursors, and can create in-memory databases. Release focus: Major feature enhancements Changes: This release comes with many changes and new features. It can manage multiple databases in one file. A new flag (HAM_LOCK_EXCLUSIVE) places an exclusive lock on the file. hamsterdb was ported to Windows CE, and the Solution file for Visual Studio 2005 now supports builds for x64. Several minor bugs were fixed, performance was improved, and small API changes occurred. Pre-built libraries for Windows (32-bit and 64-bit) are available for download. Author: cruppstahl

    標簽: C. hamsterdb structure database

    上傳時間: 2013-12-11

    上傳用戶:LouieWu

  • xl2tpd a Layer 2 Tunneling Protocol (L2TP) daemon. It supports IPsec SA reference tracking, which en

    xl2tpd a Layer 2 Tunneling Protocol (L2TP) daemon. It supports IPsec SA reference tracking, which enables the IPsec stacks to support multiple l2tp clients behind the same NAT router and multiple l2tp clients on the same internal IP address. It is a fork of "l2tpd". Release focus: Minor feature enhancements Changes: Support for passwordfd, a workaround for some Cisco routers, and extended logging.

    標簽: Tunneling reference Protocol supports

    上傳時間: 2014-01-20

    上傳用戶:541657925

  • EDB (Evan s Debugger) is a QT4 based binary mode debugger with the goal of having usability on par w

    EDB (Evan s Debugger) is a QT4 based binary mode debugger with the goal of having usability on par with OllyDbg. It uses a plugin architecture, so adding new features can be done with ease. The current release is for Linux, but future releases will target more platforms. Release focus: Major feature enhancements Changes: A new disassembly engine. A bug that could cause crashing was fixed. There is a new flags breakdown in the register view, an environment view plugin, and improved analysis (including a good speed increase). A bug in QT where disabled events could be triggered has been worked around.

    標簽: usability Debugger debugger binary

    上傳時間: 2013-12-21

    上傳用戶:gundamwzc

  • Core Java 2 Volume I - Fundamentals, Seventh Edition Completely revised and up-to-date coverage o

    Core Java 2 Volume I - Fundamentals, Seventh Edition Completely revised and up-to-date coverage of Generic programming, restrictions and limitations, type bounds, wilcard types, and generic reflection Swing GUI development, including input validation and other enhancements Exception handling and debugging, including chained exceptions, stack frames, assertions, and logging Streams and files, the new I/O API, memory-mapped files, file locking, and character set encoders/decoders Regular expressions using the powerful java.util.regex package Inner classes, reflection, and dynamic proxies Application packaging and the Preferences API

    標簽: Fundamentals Completely up-to-date coverage

    上傳時間: 2016-01-02

    上傳用戶:標點符號

  • 《為Windows Vista編寫安全的代碼》

    《為Windows Vista編寫安全的代碼》,2007年出版 Providing developers with first-hand insights into design decisions and practical advice for solving real-world security issues, this authoritative guide urges developers to write more secure code on the Vista platform to support a growing customer base. Table of Contents Writing Secure Code for Windows Vista Foreword Introduction Chapter 1 - Code Quality Chapter 2 - User Account Control, Tokens, and Integrity Levels Chapter 3 - Buffer Overrun Defenses Chapter 4 - Networking Defenses Chapter 5 - Creating Secure and Resilient Chapter 6 - Internet Explorer 7 Defenses Chapter 7 - Cryptographic enhancements Chapter 8 - Authentication and Authorization Chapter 9 - Miscellaneous Defenses and Security-Related Technologies Index List of Figures List of Tables List of Sidebars

    標簽: Windows Vista 編寫 代碼

    上傳時間: 2016-01-07

    上傳用戶:zxc23456789

  • IEEE 802.11e-2005, IEEE Standard for Information technology—Telecommunications and information excha

    IEEE 802.11e-2005, IEEE Standard for Information technology—Telecommunications and information exchange between systems—Local and metropolitan area networks—Specific requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications: Amendment 8: Medium Access Control (MAC) Quality of Service enhancements

    標簽: Telecommunications IEEE Information information

    上傳時間: 2016-10-02

    上傳用戶:rishian

  • IEEE 802.11i-2004 Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003). IEEE Standard for Informa

    IEEE 802.11i-2004 Amendment to IEEE Std 802.11, 1999 Edition (Reaff 2003). IEEE Standard for Information technology--Telecommunications and information exchange between system--Local and metropolitan area networks?Specific requirements--Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications--Amendment 6: Medium Access Control (MAC) Security enhancements

    標簽: IEEE 802.11 Amendment Standard

    上傳時間: 2013-12-21

    上傳用戶:ywqaxiwang

主站蜘蛛池模板: 德昌县| 青阳县| 新平| 襄汾县| 旅游| 旬阳县| 马山县| 岳池县| 视频| 老河口市| 崇仁县| 宁津县| 文昌市| 六安市| 阳春市| 南昌县| 太保市| 淮滨县| 武强县| 新野县| 进贤县| 盐亭县| 黄骅市| 大庆市| 永平县| 盐城市| 青海省| 衡东县| 兰考县| 洪雅县| 泾阳县| 渝北区| 彰化县| 云安县| 时尚| 新乡县| 南郑县| 宜兴市| 忻城县| 满洲里市| 吉安市|