find the first blank and store its addre
上传时间: 2013-12-17
上传用户:lnnn30
first集 与 follow集 编译原理
上传时间: 2014-01-11
上传用户:gengxiaochao
PCI.VHD, THE INTERFACE MODULE WITH PCI AGENT CHIP --v1.0: For CY7C9689, First Version working on L01A chip --V2.0: For simplified PCI Agent, Xilinx and AMD chips
标签: PCI INTERFACE Version working
上传时间: 2014-01-21
上传用户:zwei41
This the first release (version 0.0) of the Peersim high level P2P network simulator. This archive contains the javadoc generated documentation, and a java archive containing the simulator source and bytecode and some examples.
标签: This the simulator Peersim
上传时间: 2013-12-10
上传用户:mikesering
首次适应算法(First Fit): 从空闲分区表的第一个表目起查找该表,把最先能够满足要求的空闲区分配给作业,这种方法目的在于减少查找时间。为适应这种算法,空闲分区表(空闲区链)中的空闲分区要按地址由低到高进行排序。该算法优先使用低址部分空闲区,在低址空间造成许多小的空闲区,在高地址空间保留大的空闲区。
上传时间: 2014-01-08
上传用户:1051290259
face recognition using hmm. first version.
标签: recognition version first using
上传时间: 2016-08-24
上传用户:dbs012280
This the first release of a free TCP/IP/PPP protocol stack for the uC/OS Real-Time Operating System. As a first release it s still rather rough and very much larger than desired however it is working well in an embedded product and therefore may be useful to others. Much of the code is ported from public sources including BDS Lite and KA9Q (and its derivatives) and carries copyright notices from those sources. Essentially TCP is based on KA9Q but with ideas from BSD, IP is a simple implementation supporting BSD structures, ICMP is ported from BSD, and PPP is ported from the BSD version of the distribution common to BSD, Linux, and many other systems
标签: Operating Real-Time the protocol
上传时间: 2016-09-16
上传用户:songyue1991
Magic works first hand source has been preserved for everyone to contribute.Magic hands 3.4 source code
标签: source Magic contribute preserved
上传时间: 2014-11-27
上传用户:guanliya
ARP test mode. According to the idea we design the arithmetic for the key part, first the system sends a message to the target machine, and then system wait for the response. Once system receives a message, it starts to analyze the message, according to the message s parameter system judges whether the message satisfies the conditions. Once the message satisfies all the conditions, the system thinks the machine is sniffing, and adds this machine into the list of sniffing machines. On this basis the detection has done well, and at the same time we insert the result into the log database for inquire and analyze later.
标签: the arithmetic According design
上传时间: 2016-10-06
上传用户:chongcongying
大学里First集和Follow集生成算法 希望对大家有点用
上传时间: 2013-12-18
上传用户:kernaling