this a pack include source code for quartus 2. It is an IMPLEMENTATIon of the LC2. The LC-2 computer is described in Introduction to Computing Systems from Bits & Gates to C & Beyond by Yale Patt and Sanjay Patel, McGraw Hill, 2001. The LC2 model can be run as a simulation or downloaded to the UP3 in a larger model, TOP_LC2 that adds video output. Push buttons reset and single step the processor and a video output display of registers is generated. This state machine VHDL-based model of the LC-2 includes all source files. Currently compiled for a Cyclone EP1C6Q240 FPGA.
标签: IMPLEMENTATIon include quartus source
上传时间: 2013-12-25
上传用户:坏坏的华仔
UC Library Extensions UnderC comes with a pocket IMPLEMENTATIon of the standard C++ libraries, which is a reasonably faithful subset. This documentation describes those UnderC functions and classes which are not part of the C++ standard. UC Library Builtin functions: Most of these are standard C functions, but there are a few unique to the UnderC system which give you runtime access to the compiler. You may evaluate expressions, execute commands, compile code, etc. * Expands the text in expr using the UnderC preprocessor, putting the result into buff. void uc_macro_subst(const char* expr, char* buff, int buffsize) * Executes a UC #-command, like #l or #help. uc_cmd() expects the name of the command, _without_ the hash, e.g. uc_cmd("l fred.cpp") or uc_cmd("help"). void uc_cmd(const char* cmd) * Evaluates any C++ expression or statement will return non-zero if unsuccessful.
标签: IMPLEMENTATIon Extensions libraries standard
上传时间: 2013-12-14
上传用户:leehom61
The Stanford IBE library is a C IMPLEMENTATIon of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) There are a few modifications and additions. The Boneh-Franklin scheme is used as a Key Encapsulation Mechanism, and off-the-shelf ciphers and HMACs are used for the actual encryption. (See Lynn, "Authenticated Identity-Based Encryption", available on eprint.
标签: Boneh-Franklin IMPLEMENTATIon identity-based encryption
上传时间: 2013-12-20
上传用户:yan2267246
The Description Logic Handbook The Description Logic Handbook: Theory, IMPLEMENTATIon and Applications 【Author】Franz Baader, Diego Calvanese, Deborah McGuinness The Description Logic Handbook
标签: Description Handbook Logic IMPLEMENTATIon
上传时间: 2015-12-31
上传用户:youmo81
IMPLEMENTATIon guidelines for Data Broadcasting
标签: IMPLEMENTATIon Broadcasting guidelines Data
上传时间: 2014-08-09
上传用户:plsee
See Hanoi.cpp for the IMPLEMENTATIon of this cla
标签: IMPLEMENTATIon Hanoi this See
上传时间: 2016-01-05
上传用户:开怀常笑
radius协议源码÷The Radius Stack will connect to a Radius Server. This stack IMPLEMENTATIon is built upon the UdpStack which is available in the radius{version}/util directory. A minimal set of VSAs (Vendor Specific Attributes are supported by this stack). The Radius Stack should be used as a base class. In order to implement a larger set of VSAs, one will need to subclass from the Radius Stack and implement the functionality within the virtual function processVsa(). The Radius Stack supports mostly accounting messages. The authentcation messages will be supported in a future release. A test program has been provided in the radius directory. This program shows how to subclass from the RadiusStack and how to use the api.
标签: Radius IMPLEMENTATIon connect radius
上传时间: 2013-12-12
上传用户:坏天使kk
/* This a simple genetic algorithm IMPLEMENTATIon where the */ /* evaluation function takes positive values only and the */ /* fitness of an individual is the same as the value of the */ /* objective function
标签: IMPLEMENTATIon evaluation algorithm function
上传时间: 2016-01-18
上传用户:wkchong
This a naive IMPLEMENTATIon of BOOTP/TFTPBOOT, the protocols to use to bootstrap a computer through a TCP/IP network. The goal was to design a small footprint IMPLEMENTATIon to allow the code to be integrated into a monitor program stored in a ROM/FLASH, the footprint is about 7 KBytes for the test program. This code has not been yet tested in many environment. It should be seen at your starting point to integrate the network boot function to your board.
标签: IMPLEMENTATIon bootstrap protocols TFTPBOOT
上传时间: 2013-12-18
上传用户:极客
MD5 Source Code This optimized MD5 IMPLEMENTATIon conforms to RFC 1321
标签: IMPLEMENTATIon MD5 optimized conforms
上传时间: 2016-01-23
上传用户:咔乐坞