虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

Identify

  • This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end

    This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end of program execution it will display in the debug window if there were any memory leaks and how the memory looks so you can Identify where your memory leak occurred. It will display in the debug window a message saying no memory leaks detected if there are no memory leaks. Similar to what crtdbg.h does in VC++. The code detects memory leaks generated with calls to new and delete operators in C++. The code doesn t detect memory leaks generated with C functions: malloc, calloc, free, but that can be done in the future. Let me know and I will program it.

    标签: the embedded detects almost

    上传时间: 2015-05-07

    上传用户:comua

  • Windows下读写硬件的工具. RW - Read & Write utility, for hardware engineers, firmware (BIOS) engineers, driv

    Windows下读写硬件的工具. RW - Read & Write utility, for hardware engineers, firmware (BIOS) engineers, driver developers, QA engineers, performance test engineers, diagnostic engineers, etc., This utility access almost all the computer hardware, including PCI (PCI Express), PCI Index/Data, Memory, Memory Index/Data, I/O Space, I/O Index/Data, Super I/O, Clock Generator, DIMM SPD, SMBus Device, CPU MSR Registers, ATA/ATAPI Identify Data, ACPI Tables Dump (include AML decode), Embedded Controller, USB Information and LPT Remote Access. And also an Command Window is provided to access hardware manually.

    标签: engineers firmware hardware Windows

    上传时间: 2015-07-01

    上传用户:xc216

  • 红外线遥控器读码软件

    红外线遥控器读码软件,显示红外线波型,读取并保存码 IR Remote Control Unit Code Read System 产品详细描述: 能够像显示器一样显示红外线码的波型 可以读多达150种格式的红外线码 显示红外线码的时间非常准确,误差只有几个微秒。 具有错误检测功能 保存红外线码功能 自动识别码的格式 比较样机与所写的新软件的遥控器码的异同 具体情况请访问本网站:http://www.crzman.com/IR_Reader.htm Display the Infrared wave on the software like oscillograph. Can read more than 150 kinds of infrared code format Display the Infrared time and the tolerance no more than many us. Have error detect function Save Infrared code function Auto Identify code s format Compare the code from sample and new Remote Control Unit code) Detail instance please visit address: http://www.crzman.com/IR_Reader.htm

    标签: 红外线遥控器 软件

    上传时间: 2015-07-03

    上传用户:ccclll

  • RW - Read & Write utility, for hardware engineers, firmware (BIOS) engineers, driver developers, QA

    RW - Read & Write utility, for hardware engineers, firmware (BIOS) engineers, driver developers, QA engineers, performance test engineers, diagnostic engineers, etc., This utility access almost all the computer hardware, including PCI (PCI Express), PCI Index/Data, Memory, Memory Index/Data, I/O Space, I/O Index/Data, Super I/O, Clock Generator, DIMM SPD, SMBus Device, CPU MSR Registers, ATA/ATAPI Identify Data, ACPI Tables Dump (include AML decode), Embedded Controller, USB Information and LPT Remote Access. And also an Command Window is provided to access hardware manually. Website1: http://rw.net-forces.com/ Website2: http://home.kimo.com.tw/ckimchan.tw/ Website3: http://jacky5488.myweb.hinet.net/ For best view, please change the screen resolution to 1024 x 768 (or above) pixels.

    标签: engineers developers firmware hardware

    上传时间: 2013-12-22

    上传用户:王楚楚

  • Recent work by Petricoin and Liotta and co-workers (Petricoin et al. Use of proteomic patterns in se

    Recent work by Petricoin and Liotta and co-workers (Petricoin et al. Use of proteomic patterns in serum to Identify ovarian cancer. Lancet. 2002 Feb 16 359(9306):572-7. PMID: 11867112) has generated a lot of excitement and controversy. This example shows some ways that MATLAB can be used to read, visualize, pre-process (base-line correction, resample) and classify the data. The data can be downloaded from http://home.ccr.cancer.gov/ncifdaproteomics/ppatterns.asp

    标签: Petricoin co-workers and proteomic

    上传时间: 2016-04-28

    上传用户:hewenzhi

  • A major goal of this book is to show to make devices that are inherently reliable by design. While a

    A major goal of this book is to show to make devices that are inherently reliable by design. While a lot of attention has been given to “quality improvement,” the majority of the emphasis has been placed on the processes that occur after the design of a product is complete. Design deficiencies are a significant problem, and can be exceedingly difficult to Identify in the field. These types of quality problems can be addressed in the design phase with relatively little effort, and with far less expense than will be incurred later in the process. Unfortunately, there are many hardware designers and organizations that, for various reasons, do not understand the significance and expense of an unreliable design. The design methodology presented in this text is intended to address this problem.

    标签: inherently reliable devices design

    上传时间: 2016-07-30

    上传用户:xiaodu1124

  • UML指南An important part of the Unified Modeling Language (UML) is the facilities for drawing use case

    UML指南An important part of the Unified Modeling Language (UML) is the facilities for drawing use case diagrams. Use cases are used during the analysis phase of a project to Identify and partition system functionality. They separate the system into actors and use cases.

    标签: facilities UML important the

    上传时间: 2013-12-23

    上传用户:417313137

  • You may read code because you have to-to fix it, inspect it, or improve it. You may read code the wa

    You may read code because you have to-to fix it, inspect it, or improve it. You may read code the way an engineer examines a machine--to discover what makes it tick. Or you may read code because you are scavenging--looking for material to reuse. Code-reading requires its own set of skills, and the ability to determine which technique you use when is crucial. In this indispensable book, Diomidis Spinellis uses more than 600 real-world examples to show you how to Identify good (and bad) code: how to read it, what to look for, and how to use this knowledge to improve your own code. Fact: If you make a habit of reading good code, you will write better code yourself.

    标签: code read You may

    上传时间: 2017-08-13

    上传用户:jyycc

  • 实现复杂的数字公式识别

    实现复杂的数字公式识别,The number of complex formulas to Identify

    标签: 数字 识别

    上传时间: 2013-12-20

    上传用户:thesk123

  • 卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章

    卡耐基.梅隆大学的牛发写的关于孤立点和数据清洗的文章,全英文,2003年完成,Probabilistic Noise Identification and Data Cleaning,Real world data is never as perfect as we would like it to be and can often suffer from corruptions that may impact interpretations of the data, models created from the data, and decisions made based on the data. One approach to this problem is to Identify and remove records that contain corruptions. Unfortunately, if only certain fields in a record have been corrupted then usable, uncorrupted data will be lost. In this paper we present LENS, an approach for Identifying corrupted fields and using the remaining noncorrupted fields for subsequent modeling and analysis.

    标签: 大学 数据

    上传时间: 2017-08-29

    上传用户:thinode