虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

benchmarks

  • The DHRY program performs the dhrystone benchmarks on the 8051. Dhrystone is a general-performanc

    The DHRY program performs the dhrystone benchmarks on the 8051. Dhrystone is a general-performance benchmark test originally developed by Reinhold Weicker in 1984. This benchmark is used to measure and compare the performance of different computers or, in this case, the efficiency of the code generated for the same computer by different compilers. The test reports general performance in dhrystones per second. Like most benchmark programs, dhrystone consists of standard code and concentrates on string handling. It uses no floating-point operations. It is heavily influenced by hardware and software design, compiler and linker options, code optimizing, cache memory, wait states, and integer data types. The DHRY program is available in different targets: Simulator: Large Model: DHRY example in LARGE model for Simulation Philips 80C51MX: DHRY example in LARGE model for the Philips 80C51MC

    标签: general-performanc benchmarks Dhrystone dhrystone

    上传时间: 2016-11-30

    上传用户:hphh

  • 嵌入式系统编程的电子书

    ·详细说明:一些嵌入式系统编程的电子书,包括嵌入式的C编程,TI的RTOS以及LINUX文件列表:  DSPBIOS 5.30 Textual Configuration.pdf  DSPBIOS Driver.pdf  DSPBIOS Timing benchmarks for.pdf  dspRTOS.pdf&nbs

    标签: 嵌入式 系统编程 电子书

    上传时间: 2013-05-17

    上传用户:wangchong

  • 加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an

    加密算法 Test Driver for Crypto++, a C++ Class Library of Cryptographic Primitives: - To generate an RSA key cryptest g - To encrypt and decrypt a string using RSA cryptest r - To calculate MD5, SHS, and RIPEMD-160 message digests: cryptest m file - To encrypt and decrypt a string using DES-EDE in CBC mode: cryptest t - To encrypt or decrypt a file cryptest e|d input output - To share a file into shadows: cryptest s <pieces> <pieces-needed> file (make sure file has no extension, if you re running this under DOS) - To reconstruct a file from shadows: cryptest j output file1 file2 [....] - To gzip a file: cryptest z <compression-level> input output - To gunzip a file: cryptest u input output - To run validation tests: cryptest v - To run benchmarks: cryptest b [time for each benchmark in seconds]

    标签: Cryptographic Primitives generate Library

    上传时间: 2015-07-16

    上传用户:wqxstar

  • zlibyou can found an optimized version of Zlib 1.1.4 that you can embed into every Delphi executable

    zlibyou can found an optimized version of Zlib 1.1.4 that you can embed into every Delphi executable without use external dlls. Further I have build a little example hoping to aid "young" Delphi programmers getting in trouble with streams... Please let me know if you ll discover errors. These objects and sources are targeted for executing into P6+ CPU core, and Delphi5-6-7-x software. benchmarks show this zlib 40% average faster than native DLL distribution and 100% reliable.

    标签: executable can optimized zlibyou

    上传时间: 2016-12-19

    上传用户:lili123

  • Stereo-Vision circuit description, Aug 2002, Ahmad Darabiha This design contains four top level ci

    Stereo-Vision circuit description, Aug 2002, Ahmad Darabiha This design contains four top level circuits: sv_chip0.vhd, sv_chip1.vhd, sv_chip2.vhd and sv_chip3.vhd each of them built by one Virtex2000E fpga chip. This design is hierarchical and the sub-circuits can be used as smaller benchmarks.

    标签: Stereo-Vision description Darabiha contains

    上传时间: 2017-03-19

    上传用户:comua

  • This article describes a new efficient implementation of the Cooley-Tukey fast Fourier transform (FF

    This article describes a new efficient implementation of the Cooley-Tukey fast Fourier transform (FFT) algorithm using C++ template metaprogramming. Thank to the recursive nature of the FFT, the source code is more readable and faster than the classical implementation. The efficiency is proved by performance benchmarks on different platforms.

    标签: implementation Cooley-Tukey describes efficient

    上传时间: 2013-12-23

    上传用户:netwolf