虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

major

  • 手机文件浏览器 Here are the sources to SMan v1.2c 1.2 is a major jump from v1.1. You will see this from the

    手机文件浏览器 Here are the sources to SMan v1.2c 1.2 is a major jump from v1.1. You will see this from the way the code has been restructured into multiple files. It also supports flip closed. However, to my chagrin, I made the mistake of assuming there will only be one flip closed view. :( That s changed in v1.3 :) 1.3 supports multiple flip closed views that can be easily added into SMan.

    标签: from 1.2 the sources

    上传时间: 2015-03-31

    上传用户:彭玖华

  • This PNG Delphi version 1.56 documentation (this version is a major rewrite intended to replace the

    This PNG Delphi version 1.56 documentation (this version is a major rewrite intended to replace the previous version, 1.2). Improvements in this new version includes: This new version allows the programmer to not use Delphi heavy units which will greatly reduce the size of the final executable. Read more about this feature here. Most, if not all, Portable Network Graphics features as CRC checking are now fully performed. Error on broken images are now better handled using new exception classes. The images may be saved using interlaced mode also. Transparency information won t be discarted after the image is loaded any more. Most of the images are decoded much faster now. The images will be better encoded using fresh new algorithms. IMPORTANT! Now transparency information is used to display images.

    标签: version documentation intended rewrite

    上传时间: 2015-06-28

    上传用户:qiao8960

  • C++程序设计语言(特别版)This book presents every major C++ language feature and the standard library. It is or

    C++程序设计语言(特别版)This book presents every major C++ language feature and the standard library. It is organized around language and library facilities.

    标签: presents language standard feature

    上传时间: 2014-12-04

    上传用户:GavinNeko

  • In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadl

    In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’t support priority inheritance protocol since it does not allow kernel to have multiple tasks at the same priority. Although it has different ways to avoid priority inversion such as priority ceiling protocol, developers still have some difficulties in programming real time applications with it. In this paper, we redesign the uC/OS kernel to provide the ability to support round robin scheduling and implement priority inheritance semaphore on the modified kernel. As result, we port new kernel with priority inheritance semaphore to evaluation board, and evaluate the execution time of each of the kernel service as well as verify the operations of our implementation.

    标签: priority preemptive inversion problem

    上传时间: 2015-12-14

    上传用户:气温达上千万的

  • Performance Optimization. major in GC

    Performance Optimization. major in GC

    标签: Optimization Performance major GC

    上传时间: 2014-06-15

    上传用户:GavinNeko

  • A major goal of this book is to show to make devices that are inherently reliable by design. While a

    A major goal of this book is to show to make devices that are inherently reliable by design. While a lot of attention has been given to “quality improvement,” the majority of the emphasis has been placed on the processes that occur after the design of a product is complete. Design deficiencies are a significant problem, and can be exceedingly difficult to identify in the field. These types of quality problems can be addressed in the design phase with relatively little effort, and with far less expense than will be incurred later in the process. Unfortunately, there are many hardware designers and organizations that, for various reasons, do not understand the significance and expense of an unreliable design. The design methodology presented in this text is intended to address this problem.

    标签: inherently reliable devices design

    上传时间: 2016-07-30

    上传用户:xiaodu1124

  • The Red Hat Linux and Fedora distributions have become one of the major Linux distributions, bringi

    The Red Hat Linux and Fedora distributions have become one of the major Linux distributions, bringing to the PC all the power and flexibility of a Unix workstation as well as a complete set of Internet applications and a fully functional desktop interface. This book is designed not only to be a complete reference on Linux, but also to provide clear and detailed explanations of Linux features. No prior knowledge of Unix is assumed Linux is an operating system anyone can use

    标签: distributions Linux Fedora become

    上传时间: 2017-02-11

    上传用户:moshushi0009

  • The major functionality added in this release includes: - Rootless mode in X11 - Widget Templt

    The major functionality added in this release includes: - Rootless mode in X11 - Widget Templtes [both compiled and XML] As always, this isn t meant to be a stable release, it is only provided so people can more easily experiment with PicoGUI and possibly help in its development. Some of the more significant known bugs: - The PicoGUI laucher may not work right now, it s undergoing some change. - Several of the apps included here are not finished, not started, or otherwise broken. - There is a redrawing bug that may cause flickering on some platforms

    标签: functionality Rootless includes release

    上传时间: 2014-01-03

    上传用户:gxmm

  • This book gives a quick overview of servlets and JavaServer Pages(JSP), outlining the major advantag

    This book gives a quick overview of servlets and JavaServer Pages(JSP), outlining the major advantages of each.

    标签: JavaServer outlining advantag overview

    上传时间: 2017-04-22

    上传用户:JIUSHICHEN

  • WSNs being energy constrained systems, one major problem is to employ the sensor nodes in such a man

    WSNs being energy constrained systems, one major problem is to employ the sensor nodes in such a manner so as to ensure maximum coverage and connectivity with minimal or optimal number of nodes and furthermore elongate network lifetime with maximum energy utilization. The problem addressed has been tackled for 1-D linear array and further extended to 2-Dimensions as stated in the next slides.

    标签: constrained systems problem energy

    上传时间: 2017-04-28

    上传用户:evil