虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

same

  • A small tool to change the default source control provider client, so you can use SourceSafe, Source

    A small tool to change the default source control provider client, so you can use SourceSafe, SourceOffsite, Workspaces etc, on the same machine

    标签: SourceSafe provider default control

    上传时间: 2015-10-17

    上传用户:ggwz258

  • HDOJ ACM input:The input consists of T test cases. The number of test cases ) (T is given in the fi

    HDOJ ACM input:The input consists of T test cases. The number of test cases ) (T is given in the first line of the input. Each test case begins with a line containing an integer N , 1<=N<=200 , that represents the number of tables to move. Each of the following N lines contains two positive integers s and t, representing that a table is to move from room number s to room number t (each room number appears at most once in the N lines). From the N+3-rd line, the remaining test cases are listed in the same manner as above.

    标签: input cases test The

    上传时间: 2015-10-18

    上传用户:三人用菜

  • 蓝牙跳频系统的simulink仿真程序(This is a MATLAB simulation (SIMULINK) for the hop selection scheme in Bluetooth

    蓝牙跳频系统的simulink仿真程序(This is a MATLAB simulation (SIMULINK) for the hop selection scheme in Bluetooth. Since nearly the same scheme is used for 79 and 23-hop system. Only the 79-hop system in simulated in the CONNECTION state.)

    标签: simulation Bluetooth selection simulink

    上传时间: 2013-12-19

    上传用户:wanqunsheng

  • %CHECKBOUNDS Move the initial point within the (valid) bounds. % [X,LB,UB,X,FLAG] = CHECKBOUNDS(X0,

    %CHECKBOUNDS Move the initial point within the (valid) bounds. % [X,LB,UB,X,FLAG] = CHECKBOUNDS(X0,LB,UB,nvars) % checks that the upper and lower % bounds are valid (LB <= UB) and the same length as X (pad with -inf/inf % if necessary) warn if too long. Also make LB and UB vectors if not % already. % Finally, inf in LB or -inf in UB throws an error.

    标签: CHECKBOUNDS the initial bounds

    上传时间: 2015-10-26

    上传用户:caiiicc

  • The purpose of this application note is to describe the main elements of an RS-422 and RS-485 syste

    The purpose of this application note is to describe the main elements of an RS-422 and RS-485 system. This application note attempts to cover enough technical details so that the system designer will have considered all the important aspects in his data system design. Since both RS-422 and RS- 485 are data transmission systems that use balanced differential signals, it is appropriate to discuss both systems in the same application note. Throughout this application note the generic terms of RS-422 and RS-485 will be used to represent the EIA/TIA-422 and EIA/TIA-485 Standards.

    标签: application describe elements purpose

    上传时间: 2013-12-29

    上传用户:sxdtlqqjl

  • xl2tpd a Layer 2 Tunneling Protocol (L2TP) daemon. It supports IPsec SA reference tracking, which en

    xl2tpd a Layer 2 Tunneling Protocol (L2TP) daemon. It supports IPsec SA reference tracking, which enables the IPsec stacks to support multiple l2tp clients behind the same NAT router and multiple l2tp clients on the same internal IP address. It is a fork of "l2tpd". Release focus: Minor feature enhancements Changes: Support for passwordfd, a workaround for some Cisco routers, and extended logging.

    标签: Tunneling reference Protocol supports

    上传时间: 2014-01-20

    上传用户:541657925

  • What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the poss

    What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Binary Access Read(Say Source File) * Open a temparory file where encrypted data is stored for Binary Access Write(Say Destination File) * Loop through the Source File Byte by Byte * For each byte read from the file, Complement the data. (Using Not operator (in C we have to use "~" operator) * Write Complemented Data to Destination File * Delete the Source File * Rename Destination file as Source File(Now Encryption is over)

    标签: Sometimes the contents desire

    上传时间: 2013-12-25

    上传用户:playboys0

  • The Microsoft® Cryptographic Application Programming Interface (CryptoAPI) provides services that

    The Microsoft® Cryptographic Application Programming Interface (CryptoAPI) provides services that enable application developers to add authentication, encoding, and encryption to their Microsoft Win32® -based applications. Application developers can use the functions in the CryptoAPI without knowing anything about the underlying implementation, in much the same way as they can use a graphics library without knowing anything about the particular graphics hardware configuration.

    标签: Cryptographic Application Programming Microsoft

    上传时间: 2013-12-27

    上传用户:pinksun9

  • In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadl

    In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’t support priority inheritance protocol since it does not allow kernel to have multiple tasks at the same priority. Although it has different ways to avoid priority inversion such as priority ceiling protocol, developers still have some difficulties in programming real time applications with it. In this paper, we redesign the uC/OS kernel to provide the ability to support round robin scheduling and implement priority inheritance semaphore on the modified kernel. As result, we port new kernel with priority inheritance semaphore to evaluation board, and evaluate the execution time of each of the kernel service as well as verify the operations of our implementation.

    标签: priority preemptive inversion problem

    上传时间: 2015-12-14

    上传用户:气温达上千万的

  • It may analyze the window structure, the advancement and the window news, has the very greatly auxil

    It may analyze the window structure, the advancement and the window news, has the very greatly auxiliary function to the development work. When we need to study some object, so long as assigns out its search window, drives the detector the indicator to assign the window/to control on to release then. Under, the author on and everybody same place, makes with VC to belong to own Spy++.

    标签: the window advancement structure

    上传时间: 2013-12-31

    上传用户:ghostparker