虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

same

  • This a small hack I wrote to bypass the "No previous installation!" error of Microchip s C18 Upgrade

    This a small hack I wrote to bypass the "No previous installation!" error of Microchip s C18 Upgrade. Simply run C18Fake and select your C18 installation directory (create if necessary) and click Save button. A "fake" file will now be created into that directory, and this will fool the Upgrade into thinking you already have a former legit installation. After that you run the C18 Upgrade setup and select the same directory you created/selected before. Your installation will now begin installing the full C18 package.

    标签: installation Microchip previous Upgrade

    上传时间: 2014-01-21

    上传用户:zhuyibin

  • This my phd thesis for the WDM optical network optimization, which employs convex optimization techn

    This my phd thesis for the WDM optical network optimization, which employs convex optimization techniques to solve the proposed integer problems. The computation complexity of my optimization framework is very low compared with other existing method and a performance bound is provided at the same time.

    标签: optimization employs optical network

    上传时间: 2015-12-27

    上传用户:dongbaobao

  • 转载一个程序。 This zip file contains a example of using C++ language COM in a Visual C++ program (named

    转载一个程序。 This zip file contains a example of using C++ language COM in a Visual C++ program (named example.zip), and a COM component built by comtool of Matlab and used in a Visual C++ program(named mycom.zip). Both projects contain fire_event in COM. But it only works well in the former example. The interface of two COM components looks very similar, and the client program of two projects are almost the same.

    标签: contains language example program

    上传时间: 2014-08-28

    上传用户:爺的气质

  • Contains source to demonstrate how to copy/delete files and folders with HFS+ APIs. It also demonstr

    Contains source to demonstrate how to copy/delete files and folders with HFS+ APIs. It also demonstrates a technique to rename an object if an object of the same name exists in the destination. This sample shows how to perform these operations in an MP-safe way.

    标签: demonstrate Contains demonstr folders

    上传时间: 2016-01-14

    上传用户:我们的船长

  • ARMask.The ARM has six operating modes: • User (unprivileged mode under which most tasks run)

    ARMask.The ARM has six operating modes: • User (unprivileged mode under which most tasks run) • FIQ (entered when a high priority (fast) interrupt is raised) • IRQ (entered when a low priority (normal) interrupt is raised) • Supervisor (entered on reset and when a Software Interrupt instruction is executed) • Abort (used to handle memory access violations) • Undef (used to handle undefined instructions) * ARM Architecture Version 4 adds a seventh mode: • System (privileged mode using the same registers as user mode)

    标签: unprivileged operating ARMask modes

    上传时间: 2013-12-24

    上传用户:bcjtao

  • We have a group of N items (represented by integers from 1 to N), and we know that there is some tot

    We have a group of N items (represented by integers from 1 to N), and we know that there is some total order defined for these items. You may assume that no two elements will be equal (for all a, b: a<b or b<a). However, it is expensive to compare two items. Your task is to make a number of comparisons, and then output the sorted order. The cost of determining if a < b is given by the bth integer of element a of costs (space delimited), which is the same as the ath integer of element b. Naturally, you will be judged on the total cost of the comparisons you make before outputting the sorted order. If your order is incorrect, you will receive a 0. Otherwise, your score will be opt/cost, where opt is the best cost anyone has achieved and cost is the total cost of the comparisons you make (so your score for a test case will be between 0 and 1). Your score for the problem will simply be the sum of your scores for the individual test cases.

    标签: represented integers group items

    上传时间: 2016-01-17

    上传用户:jeffery

  • /* This a simple genetic algorithm implementation where the */ /* evaluation function takes positiv

    /* This a simple genetic algorithm implementation where the */ /* evaluation function takes positive values only and the */ /* fitness of an individual is the same as the value of the */ /* objective function

    标签: implementation evaluation algorithm function

    上传时间: 2016-01-18

    上传用户:wkchong

  • This the second tutorial of the Writing Device Drivers series. There seems to be a lot of interest i

    This the second tutorial of the Writing Device Drivers series. There seems to be a lot of interest in the topic, so this article will pick up where the first left off. The main focus of these articles will be to build up little by little the knowledge needed to write device drivers. In this article, we will be building on the same example source code used in part one. In this article, we will expand on that code to include Read functionality, Handle Input/Ouput Controls also known as IOCTLs, and learn a bit more about IRPs.

    标签: the interest tutorial Drivers

    上传时间: 2016-01-28

    上传用户:lmeeworm

  • Visual Basic Shell Programming ventures where none have gone before by showing how to develop shell

    Visual Basic Shell Programming ventures where none have gone before by showing how to develop shell extensions that more closely integrate an application with the Windows shell, while at the same time providing an advanced tutorial-style treatment of COM programming with Visual Basic. Each major type of shell extension gets attention, including customized context menu handlers, per instance icons, and customized property sheets.

    标签: Programming ventures develop showing

    上传时间: 2016-02-01

    上传用户:tb_6877751

  • Patterns of Enterprise Application Architecture is written in direct response to the stiff challenge

    Patterns of Enterprise Application Architecture is written in direct response to the stiff challenges that face enterprise application developers. The author, noted object-oriented designer Martin Fowler, noticed that despite changes in technology--from Smalltalk to CORBA to Java to .NET--the same basic design ideas can be adapted and applied to solve common problems. With the help of an expert group of contributors, Martin distills over forty recurring solutions into patterns. The result is an indispensable handbook of solutions that are applicable to any enterprise application platform

    标签: Architecture Application Enterprise challenge

    上传时间: 2013-12-12

    上传用户:ywqaxiwang