虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

described

  • Generating Fractals with SSE/SSE2 You probably have heard about fractals before. They are beautiful

    Generating Fractals with SSE/SSE2 You probably have heard about fractals before. They are beautiful pictures such as the one shown above. Any fractal can be described using iterative formulas. So you can generate a fractal by evaluating these formulas and finding the color of each pixel. That is a large computational task, and drawing a fractal needs a fast CPU and a carefully optimized program.

    标签: Generating SSE beautiful Fractals

    上传时间: 2016-11-03

    上传用户:小鹏

  • This document accompanies a sample co-installer that can be used in conjunction with an INF file to

    This document accompanies a sample co-installer that can be used in conjunction with an INF file to install additional device INF files on the target system during a device installation. The instructions herein apply to the Microsoft Windows 2000 and Windows XP and Windows Server 2003 operating systems. The sample co-installer described in this article interprets CopyINF directives in a [DDInstall] section in an INF file. The sample demonstrates using a co-installer to perform processing after a device has been installed, parsing the INF section that is being used for the installation, and the use of the SetupCopyOEMInf, SetupGetInfInformation, SetupQueryInfOriginalFileInformation and SetupDiGetActualSectionToInstall APIs.

    标签: co-installer accompanies conjunction document

    上传时间: 2014-02-28

    上传用户:gououo

  • This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Page

    This paper addresses the subject of SQL Injection in a Microsoft SQL Server/IIS/Active Server Pages environment, but most of the techniques discussed have equivalents in other database environments. It should be viewed as a "follow up", or perhaps an appendix, to the previous paper, "Advanced SQL Injection". The paper covers in more detail some of the points described in its predecessor, providing examples to clarify areas where the previous paper was perhaps unclear. An effective method for privilege escalation is described that makes use of the openrowset function to scan a network. A novel method for extracting information in the absence of helpful error messages is described the use of time delays as a transmission channel. Finally, a number of miscellaneous observations and useful hints are provided, collated from responses to the original paper, and various conversations around the subject of SQL injection in a SQL Server environment.

    标签: Server SQL Injection Microsoft

    上传时间: 2014-07-28

    上传用户:xhz1993

  • In term project, we will take the baseline JPEG codec in ARM-based platform system as an example to

    In term project, we will take the baseline JPEG codec in ARM-based platform system as an example to practice the design flow in SoC. We divide the project into three parts, and the goal of each part is described as follow. Part I: Design a baseline JPEG software codec in C/C++ and port it to ARM core,(ARM7TDMI, ARM720T, or ARM922T.) Part II: Make use of virtual prototype to integrate/verify the hardware and software. Part III: Verify your soft IP in target environment.

    标签: ARM-based baseline platform project

    上传时间: 2017-02-15

    上传用户:363186

  • 数据异常处理。The main source file is "dabort.s": with suitable -PreDefines or a corresponding "options-s

    数据异常处理。The main source file is "dabort.s": with suitable -PreDefines or a corresponding "options-setting" file, it assembles to the data abort veneer. This is described in detail in the documentation. The "dabort.h" file contains definitions of some constants used in the data abort veneer s interface to the rest of the system - again, this is described in the documentation. The "option.s" file is an example "options-setting" file.

    标签: corresponding PreDefines options-s suitable

    上传时间: 2013-12-03

    上传用户:星仔

  • The concept of the Altera Nios II embedded processor implementation inside Field Programmable Gate A

    The concept of the Altera Nios II embedded processor implementation inside Field Programmable Gate Array [FPGA] of the CCD camera for the “Pi of the Sky” experiment is presented. The digital board of the CCD camera, its most important components, current implementation of firmware [VHDL] inside the FPGA and the role of external 8051 microcontroller is briefly described. The main goal of the presented work is to get rid of the external microcontroller and to design new system with Nios II processor built inside FPGA chip. Constraints for implementing the design into the existing camera boards are discussed. New possibilities offered by a larger FPGA for next generation of cameras are considered.

    标签: implementation Programmable processor embedded

    上传时间: 2014-01-02

    上传用户:dyctj

  • 介绍计算机上实现gsm modem短消息收发的模式

    介绍计算机上实现gsm modem短消息收发的模式,描述gsm modem PDU 模式,包括PDU 模式下的gsm modem模块UCS2 编码、解码原理,以及gsm modem发送与接收PDU 串的编制方式, VB 中的MSCOMM 控件,实现gsm modem短消息收发的核心内容。-briefed on computer modem gsm SMS transceiver model, described GSM modem PDU models, including the PDU mode GSM modem module UCS2 encoding, decoding principle, and GSM modems send and receive PDU Series presentation, the VB MSCOMM Control and achieve short GSM modem news transceiver core content

    标签: modem gsm 计算机 收发

    上传时间: 2017-03-10

    上传用户:cxl274287265

  • Measuring Frequency Content in Signals I this section we will study some non parametric methods fo

    Measuring Frequency Content in Signals I this section we will study some non parametric methods for spectrum estimation of a stochastic process. These methods are described in the literature. All methods are based on the Periodogram which is defined for a sequence x[n] with length N according to

    标签: parametric Measuring Frequency Content

    上传时间: 2017-03-20

    上传用户:秦莞尔w

  • this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryp

    this is the case study done on the technique in information security i.e. CRYPTOGRAPHY. various cryptographic techniques are described here.

    标签: i.e. CRYPTOGRAPHY information the

    上传时间: 2014-01-27

    上传用户:ls530720646

  • This application note describes the three methods that can be used to program the Flash code memory

    This application note describes the three methods that can be used to program the Flash code memory of the 89C51Rx+/Rx2/66x families of microcontrollers. It discusses in detail the operation of the In-System Programming (ISP) capability which allows these microcontrollers to be programmed while mounted in the end product. These microcontrollers also have an In-Application Programming (IAP) capability which allows them to be programmed under firmware control of the embedded application. This capability is also described

    标签: application describes the methods

    上传时间: 2014-01-16

    上传用户:woshiayin