虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

IF

  • This directory contains the memtest 8051 firmware for the Anchor Chips EZ-USB chip. The purpose

    This directory contains the memtest 8051 firmware for the Anchor Chips EZ-USB chip. The purpose of this software is to test the dIFferent memory segments in the Ez-Usb chip. This example will output the string "good" on the 7 segment LED IF the mem test passes, or it will output the first address where the memtest fails.

    标签: directory the contains firmware

    上传时间: 2015-05-04

    上传用户:zxc23456789

  • For the incomplete methods, we kept the representation of the queens by a table and the method of ca

    For the incomplete methods, we kept the representation of the queens by a table and the method of calculation to determine IF two queens are in conflict, which is much faster for this kind of problems than the representation by a matrix. heuristics: descent. Tests: 100 queens in less than 1 second and 67 iterations. 500 queens in 1 second and 257 iterations. 1000 queens in 11 seconds and 492 iterations. heuristics: Simulated annealing. Tests: 100 queens in less than 1 second and 47 iterations. 500 queens in 5 seconds and 243 iterations. 1000 queens in 13 seconds and 497 iterations. heuristics: based on Simulated Annealing. Tests: 100 queens in less than 1 second and 60 iterations. 500 queens in 1 second and 224 iterations. 1000 queens in 5 seconds and 459 iterations. 10 000 queens in 20 minutes 30 seconds and 4885 iterations.

    标签: the representation incomplete methods

    上传时间: 2015-05-05

    上传用户:1159797854

  • The subject which is to us propos¨¦ is as follows: calculation of the degr¨¦ d¡ &ma

    The subject which is to us propos¨¦ is as follows: calculation of the degr¨¦ d¡ ¯ inconsistance d¡ ¯ un logical program possibilist in C++. We thus work on a logical program possibilist, it be-¨¤-statement a logical program resulting from non-classique logic. The goal first of this project is of d¨¦ terminer IF a logical program is consisting or not of share the calculation of sound degr¨¦ d¡ ¯ inconsistance.

    标签: brvbar calculation subject follows

    上传时间: 2013-12-18

    上传用户:yulg

  • This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end

    This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end of program execution it will display in the debug window IF there were any memory leaks and how the memory looks so you can identIFy where your memory leak occurred. It will display in the debug window a message saying no memory leaks detected IF there are no memory leaks. Similar to what crtdbg.h does in VC++. The code detects memory leaks generated with calls to new and delete operators in C++. The code doesn t detect memory leaks generated with C functions: malloc, calloc, free, but that can be done in the future. Let me know and I will program it.

    标签: the embedded detects almost

    上传时间: 2015-05-07

    上传用户:comua

  • 自制51编程器 I have build my own programmer. This device can program the AT89C51 and works with it. So i

    自制51编程器 I have build my own programmer. This device can program the AT89C51 and works with it. So it can easily be adapted to programming other devices by itself. The Atmel Flash devices are ideal for developing, since they can be reprogrammed easy, often and fast. You need only 1 or 2 devices in low cost plastic case for developing. In contrast you need 10 or more high cost windowed devices IF you must develop with EPROM devices (e.g. Phillips 87C751).

    标签: programmer program device build

    上传时间: 2015-05-11

    上传用户:sdq_123

  • java虚拟机的规范

    java虚拟机的规范,中文版!不错哦~IFq.IF.q

    标签: java 虚拟机

    上传时间: 2013-12-16

    上传用户:caiiicc

  • The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: he

    The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: header file for same ptfsf-demo.c: FDTD code which demonstrates use of perfect TFSF code. Essentially this program used to generate results shown in the paper ptfsf-file-maker.c: code to generate an incident-field file using the "perfect" incident fields ptfsf-demo-file.c: FDTD code which uses the perfect incident fields stored in a file fdtdgen.h: defines macros used in much of my code Makefile: simple make-file to compile programs Also include are some simple script files to run the programs with reasonable values. The code assumes a two-dimensional computational domain with TMz polarization (i.e., non-zero field Ez, Hx, and Hy). The program is currently written so that the incident field always strikes the lower-left corner of the total-field region first. (IF you want a dIFferent corner, that should be a fairly simple tweak to the code, but for now you ll have to make that tweak yourself.)

    标签: ptfsf following the contains

    上传时间: 2013-11-28

    上传用户:风之骄子

  • I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco

    I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> Usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) IF a service is running on its default port you don t have to specIFy both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1

    标签: I. vulnerability Introduction undisclosed

    上传时间: 2015-05-15

    上传用户:xhz1993

  • ARM下 Implement matrix multiplication of 2 square matrices, with data read from an input file and pri

    ARM下 Implement matrix multiplication of 2 square matrices, with data read from an input file and printed both to the console and to an output file. • Assume a file with correct data (no garbage, characters, etc.). • you must check and provide appropriate execution for 2 extra cases, namely when the matrix size given is either “0” , or when the size is greater than the maximum handled of “5” . In these 2 cases you must implement the following behaviour: o IF size = 0, then print a message “Size = 0 is unacceptable” and continue by reading the next size for the next 2 matrices (IF not end of file). o IF size >5, then print two messages: “Size is too big - unacceptable”. Then read and discard the next (size2 ) integers and continue by reading the next size for the next 2 matrices (IF not end of file).

    标签: multiplication Implement matrices matrix

    上传时间: 2014-08-30

    上传用户:dsgkjgkjg

  • abel Tool Sample Requires: Visual Basic 6 and MapObjects 2.x Data: redlands.shp (Redlands sample

    abel Tool Sample Requires: Visual Basic 6 and MapObjects 2.x Data: redlands.shp (Redlands sample data set from MO 2.x) Interactive Labeling Tool IF the check box is checked, then the mouse down location will search for the closest line, and label it with the street name. IF the check box is not checked, then the mouse down will turn into a pan/zoom tool. There is a slider bar to control the search tolerance in screen pixels for the labeling.

    标签: MapObjects Requires Redlands redlands

    上传时间: 2013-12-17

    上传用户:sunjet