In software engineering, mostly low-level languages were used for many years, which were closer to the computer machine code than to human language. In the 70s, Brian Kernighan and Dennis Ritchie created the language C. It was quite similar to human
数据结构与算法分析 C语言描述 This book describes data structures, methods of organizing large amounts of data, and algorithm analysis, the estimation of the running time of algorithms. As computers become faster and faster, the need for programs that can handle
The book you hold now, UNIX Filesystems: Evolution, Design, and Implementation, is the first book to cover filesystems from all versions of UNIX and Linux. The author gives you details about the file I/O aspects of UNIX programming, describes the va
The subjects are covered as follows: • Chapter 1 gives you an overview of neural network terminology and nomenclature. You discover that neural nets are capable of solving complex problems with parallel computational architectures. The Hopfield netw
Introduction The Spartan® and the Spartan-XL FPGA families are a high-volume production FPGA solution that delivers all the key requirements for ASIC replacement up to 40,000 gates. These requirements include high performance, on-chip RAM, core solu
wcdma 的一些基本测试流程以及网络配置 The definition of the Conformance Tests for UE in 3G will be a complex task as the complete test suite covers RF, EMC and Protocol aspects of the UE. Each test requires a Test Environment to be defined in which the UE has to op
This book, immediately striking for its conciseness, is one of the most remarkable works ever produced on the subject of algebraic functions and their integrals. The distinguishing feature of the book is its third chapter, on rational functions, whi
深入学习依赖注入原理的好书 Dependency Injection is an in-depth guide to the current best practices for using the Dependency Injection pattern-the key concept in Spring and the rapidly-growing Google Guice. It explores Dependency Injection, sometimes called Inver
The fundamental theorems on the asymptotic behavior of eigenvalues, inverses, and products of banded Toeplitz matrices and Toeplitz matrices with absolutely summable elements are derived in a tutorial manner. Mathematical elegance and generality are
The topology of wireless sensor networks (WSNs) can be controlled through changing the transmission power of each node. We propose an adaptive energy efficient topology (AEET) algorithm where each node adaptively adjusts its transmission radius by l
The Scientist and Engineer Guide to Digital Signal Processing——Second Edition by Steven W. Smith This book was written for scientists and engineers in a wide variety of fields: physics, bioengineering, geology, oceanography, mechanical and electrica
Nonimaging optics is primarily concerned with efficient and controlled transfer of radiation. Nonimaging refers to the fact that image formation is not a fundamental requirement for efficient radiation transfer; however, image formation is not exclu
移动无线智能网介绍好书。 ------目录--------- Foreword by Keijo Palviainen xiii Foreword by Gerry Christensen xv Preface xvii 1 Introduction to GSM Networks 1 1.1 Signalling in GSM 3 1.2 GSM Mobility 3 1.3 Mobile Station 4 1.4 Identifiers in the GSM Network 4 1.4.
Introduction xiii CHAPTER 1 Standard Procedures for SMS in GSM Networks 1 1.1 GSM Network Architecture and Principle of the SMS Procedure 1 1.2 Implementation of SMS Services 3 1.2.1 SMS-MO Implementation 3 1.2.2 The SMS-MT Implementation 6 1.2.3 Se
ASIC(专用集成电路) Application-Specific Integrated Circuit. A piece of custom-designed hardware in a chip. 专用集成电路。一个在一个芯片上定制设计的硬件。 address bus (地址总线) A set of electrical lines connected to the processor and all of the peripherals withwhich itcommunicates.
Gray code Time Limit:2000MS Memory Limit:65536K Total Submit:242 Accepted:121 Descr iption Gray code is an interesting code sequence and has many applications in computer science.No matter you have known it before or not, here are some introductions
ACM Gray code 能accepted Descr iption Gray code is an interesting code sequence and has many applications in computer science.No matter you have known it before or not, here are some introductions about its features: (1) Gray code has 2^n unique elem