Virtual com port source core
上传时间: 2014-08-25
上传用户:lhw888
UC Library Extensions UnderC comes with a pocket implementation of the standard C++ libraries, which is a reasonably faithful subset. This documentation describes those UnderC functions and classes which are not part of the C++ standard. UC Library Builtin functions: Most of these are standard C functions, but there are a few unique to the UnderC system which give you runtime access to the compiler. You may evaluate expressions, execute commands, compile code, etc. * Expands the text in expr using the UnderC preprocessor, putting the result into buff. void uc_macro_subst(const char* expr, char* buff, int buffsize) * Executes a UC #-command, like #l or #help. uc_cmd() expects the name of the command, _without_ the hash, e.g. uc_cmd("l fred.cpp") or uc_cmd("help"). void uc_cmd(const char* cmd) * Evaluates any C++ expression or statement will return non-zero if unsuccessful.
标签: implementation Extensions libraries standard
上传时间: 2013-12-14
上传用户:leehom61
The Stanford IBE library is a C implementation of the Boneh-Franklin identity-based encryption scheme. (See Boneh and Franklin, "Identity-Based Encryption from the Weil Pairing", CRYPTO 2001.) There are a few modifications and additions. The Boneh-Franklin scheme is used as a Key Encapsulation Mechanism, and off-the-shelf ciphers and HMACs are used for the actual encryption. (See Lynn, "Authenticated Identity-Based Encryption", available on eprint.
标签: Boneh-Franklin implementation identity-based encryption
上传时间: 2013-12-20
上传用户:yan2267246
With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator and maintainer of User Mode Linux shows how to put it to work hands-on. Jeff Dike covers everything from getting started through running enterprise-class User Mode Linux servers. You ll find authoritative advice on bootup, compilation, administration, specialized configurations, and much more.
标签: Linux computer machines virtual
上传时间: 2013-12-19
上传用户:xinzhch
The Description Logic Handbook The Description Logic Handbook: Theory, Implementation and Applications 【Author】Franz Baader, Diego Calvanese, Deborah McGuinness The Description Logic Handbook
标签: Description Handbook Logic Implementation
上传时间: 2015-12-31
上传用户:youmo81
Implementation guidelines for Data Broadcasting
标签: Implementation Broadcasting guidelines Data
上传时间: 2014-08-09
上传用户:plsee
See Hanoi.cpp for the implementation of this cla
标签: implementation Hanoi this See
上传时间: 2016-01-05
上传用户:开怀常笑
/* This a simple genetic algorithm implementation where the */ /* evaluation function takes positive values only and the */ /* fitness of an individual is the same as the value of the */ /* objective function
标签: implementation evaluation algorithm function
上传时间: 2016-01-18
上传用户:wkchong
This a naive implementation of BOOTP/TFTPBOOT, the protocols to use to bootstrap a computer through a TCP/IP network. The goal was to design a small footprint implementation to allow the code to be integrated into a monitor program stored in a ROM/FLASH, the footprint is about 7 KBytes for the test program. This code has not been yet tested in many environment. It should be seen at your starting point to integrate the network boot function to your board.
标签: implementation bootstrap protocols TFTPBOOT
上传时间: 2013-12-18
上传用户:极客
MD5 Source Code This optimized MD5 implementation conforms to RFC 1321
标签: implementation MD5 optimized conforms
上传时间: 2016-01-23
上传用户:咔乐坞