虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

too

  • Have you ever wanted to copy a file from your Desktop Computer to your handheld Pocket PC? This incl

    Have you ever wanted to copy a file from your Desktop Computer to your handheld Pocket PC? This included any Windows CE version too? Well if so, I will present an easy way to do it here: It s called the Remote Application Programming Interface, or, RAPI in this article. It is touched on in the MSDN but not really explained very well.

    标签: your Computer handheld Desktop

    上传时间: 2013-12-24

    上传用户:15071087253

  • ARM下 Implement matrix multiplication of 2 square matrices, with data read from an input file and pri

    ARM下 Implement matrix multiplication of 2 square matrices, with data read from an input file and printed both to the console and to an output file. • Assume a file with correct data (no garbage, characters, etc.). • you must check and provide appropriate execution for 2 extra cases, namely when the matrix size given is either “0” , or when the size is greater than the maximum handled of “5” . In these 2 cases you must implement the following behaviour: o If size = 0, then print a message “Size = 0 is unacceptable” and continue by reading the next size for the next 2 matrices (if not end of file). o If size >5, then print two messages: “Size is too big - unacceptable”. Then read and discard the next (size2 ) integers and continue by reading the next size for the next 2 matrices (if not end of file).

    标签: multiplication Implement matrices matrix

    上传时间: 2014-08-30

    上传用户:dsgkjgkjg

  • Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to w

    Although there has been a lot of AVL tree libraries available now, nearly all of them are meant to work in the random access memory(RAM). Some of them do provide some mechanism for dumping the whole tree into a file and loading it back to the memory in order to make data in that tree persistent. It serves well when there s just small amount of data. When the tree is somewhat bigger, the dumping/loading process could take a lengthy time and makes your mission-critical program less efficient. How about an AVL tree that can directly use the disk for data storage ? If there s something like that, we won t need to read through the whole tree in order to pick up just a little bit imformation(a node), but read only the sectors that are neccssary for locating a certain node and the sectors in which that node lies. This is my initial motivation for writing a storage-media independent AVL Tree. However, as you step forth, you would find that it not only works fine with disks but also fine with memorys, too.

    标签: available libraries Although nearly

    上传时间: 2014-01-22

    上传用户:zhoujunzhen

  • MFC Black Book Introduction: Are you an MFC programmer? Good. There are two types of MFC programme

    MFC Black Book Introduction: Are you an MFC programmer? Good. There are two types of MFC programmers. What kind are you? The first kind are the good programmers who write programs that conform to the way MFC wants you to do things. The second bunch are wild-eyed anarchists who insist on getting things done their way. Me, I’m in the second group. If you are in the same boat (or would like to be) this book is for you. This book won’t teach you MFC—not in the traditional sense. You should pick it up with a good understanding of basic MFC programming and a desire to do things differently. This isn’t a Scribble tutorial (although I will review some fundamentals in the first chapter). You will learn how to wring every drop from your MFC programs. You’ll discover how to use, abuse, and abandon the document/view architecture. If you’ve ever wanted custom archives, you’ll find that, too.

    标签: MFC Introduction programmer programme

    上传时间: 2015-05-30

    上传用户:youke111

  • Micro In-System Programmer Brief Installation Notes Enter the src directory. If uisp does not

    Micro In-System Programmer Brief Installation Notes Enter the src directory. If uisp does not compile successfully, add switch -DNO_DIRECT_IO in the Makefile to remove support for direct I/O port access (that may be necessary on non-PC architectures). Parallel port access should still work if you have the Linux ppdev driver (patch for 2.2.17 is in the kernel directory, ppdev is standard in 2.4 kernels). Please lobby Alan Cox to include this tiny little driver in 2.2.x too :). To make it type: make and to install it: make install If you have any further doubts, please consult UISP s homepage: http://www.nongnu.org/uisp/

    标签: Installation Programmer In-System directory

    上传时间: 2013-12-23

    上传用户:小儒尼尼奥

  • he AVRcam source files were built using the WinAVR distribution (version 3.3.1 of GCC). I haven t t

    he AVRcam source files were built using the WinAVR distribution (version 3.3.1 of GCC). I haven t tested other versions of GCC, but they should compile without too much difficulty. The makefile used to build the source is included

    标签: distribution version AVRcam WinAVR

    上传时间: 2014-10-26

    上传用户:h886166

  • This serial client in JAVA allows sending, reading and writing of SMS via a serial COM port. The too

    This serial client in JAVA allows sending, reading and writing of SMS via a serial COM port. The tool uses the PDU SMS format. IRDA drivers are included. The functionality can be implemented into applications for remote alerting or SMS authentification.

    标签: serial sending reading writing

    上传时间: 2013-12-17

    上传用户:s363994250

  • %CHECKBOUNDS Move the initial point within the (valid) bounds. % [X,LB,UB,X,FLAG] = CHECKBOUNDS(X0,

    %CHECKBOUNDS Move the initial point within the (valid) bounds. % [X,LB,UB,X,FLAG] = CHECKBOUNDS(X0,LB,UB,nvars) % checks that the upper and lower % bounds are valid (LB <= UB) and the same length as X (pad with -inf/inf % if necessary) warn if too long. Also make LB and UB vectors if not % already. % Finally, inf in LB or -inf in UB throws an error.

    标签: CHECKBOUNDS the initial bounds

    上传时间: 2015-10-26

    上传用户:caiiicc

  • Every day, patches are created to cover up security holes in software applications and operating sys

    Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This innovative book will help you stay one step ahead. It gives you the tools to discover vulnerabilities in C-language-based software, exploit the vulnerabilities you find, and prevent new security holes from occurring.

    标签: applications operating security software

    上传时间: 2015-11-01

    上传用户:fhzm5658

  • Hey. This some pid code for the atmega88 that I once used to control a heater. It s purpose is pre

    Hey. This some pid code for the atmega88 that I once used to control a heater. It s purpose is pretty specific, and I only wrote it to work on the mega88, so the code itself won t be too useful. It is a good place to start if you re trying to use or figure out pid though.

    标签: control purpose atmega heater

    上传时间: 2013-12-19

    上传用户:天诚24