亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

蟲蟲首頁| 資源下載| 資源專輯| 精品軟件
登錄| 注冊

RESULT

  • The ability to write efficient, high-speed arithmetic routines ultimately depends upon your knowled

    The ability to write efficient, high-speed arithmetic routines ultimately depends upon your knowledge of the elements of arithmetic as they exist on a computer. That conclusion and this book are the RESULT of a long and frustrating search for information on writing arithmetic routines for real-time embedded systems. With instruction cycle times coming down and clock rates going up, it would seem that speed is not a problem in writing fast routines. In addition, math coprocessors are becoming more popular and less expensive than ever before and are readily available. These factors make arithmetic easier and faster to use and implement. However, for many of you the systems that you are working on do not include the latest chips or the faster processors. Some of the most widely used microcontrollers used today are not Digital Signal Processors (DSP), but simple eight-bit controllers such as the Intel 8051 or 8048 microprocessors.

    標簽: arithmetic high-speed ultimately efficient

    上傳時間: 2014-11-30

    上傳用戶:lizhen9880

  • In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadl

    In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadline violations. Priority inheritance protocol is one of the approaches to reduce priority inversion. Unfortunately, RTOS like uC/OS can’t support priority inheritance protocol since it does not allow kernel to have multiple tasks at the same priority. Although it has different ways to avoid priority inversion such as priority ceiling protocol, developers still have some difficulties in programming real time applications with it. In this paper, we redesign the uC/OS kernel to provide the ability to support round robin scheduling and implement priority inheritance semaphore on the modified kernel. As RESULT, we port new kernel with priority inheritance semaphore to evaluation board, and evaluate the execution time of each of the kernel service as well as verify the operations of our implementation.

    標簽: priority preemptive inversion problem

    上傳時間: 2015-12-14

    上傳用戶:氣溫達上千萬的

  • UC Library Extensions UnderC comes with a pocket implementation of the standard C++ libraries, wh

    UC Library Extensions UnderC comes with a pocket implementation of the standard C++ libraries, which is a reasonably faithful subset. This documentation describes those UnderC functions and classes which are not part of the C++ standard. UC Library Builtin functions: Most of these are standard C functions, but there are a few unique to the UnderC system which give you runtime access to the compiler. You may evaluate expressions, execute commands, compile code, etc. * Expands the text in expr using the UnderC preprocessor, putting the RESULT into buff. void uc_macro_subst(const char* expr, char* buff, int buffsize) * Executes a UC #-command, like #l or #help. uc_cmd() expects the name of the command, _without_ the hash, e.g. uc_cmd("l fred.cpp") or uc_cmd("help"). void uc_cmd(const char* cmd) * Evaluates any C++ expression or statement will return non-zero if unsuccessful.

    標簽: implementation Extensions libraries standard

    上傳時間: 2013-12-14

    上傳用戶:leehom61

  • 算符優(yōu)先文法分析的c語言實現(xiàn)代碼 需要輸入詞法分析的txt結果文件- The operator first grammar analysis c language realization code n

    算符優(yōu)先文法分析的c語言實現(xiàn)代碼 需要輸入詞法分析的txt結果文件- The operator first grammar analysis c language realization code needs to input the lexical analysis the txt RESULT document

    標簽: realization analysis operator language

    上傳時間: 2015-12-28

    上傳用戶:youlongjian0

  • This program compress and recostruct using wavelets. We can select level of decomposition(here maxim

    This program compress and recostruct using wavelets. We can select level of decomposition(here maximum 4 levels are given) of images using selected wavelet. For eg:-wavelets can be haar, db1, db2,dmey............... Decomposition can be viewed in figure. (Please note that select 256X256 image for better RESULT.) Then compression can performed, PERFL2 give compression score. Then reconstruction can be performed. Each decompsition we can choose different threshold values. For each threshold value we can calculate mse,psnr,pq(picture quality), bit ratio etc. To get pq install pqs function .

    標簽: decomposition recostruct compress wavelets

    上傳時間: 2016-01-22

    上傳用戶:liuchee

  • Patterns of Enterprise Application Architecture is written in direct response to the stiff challenge

    Patterns of Enterprise Application Architecture is written in direct response to the stiff challenges that face enterprise application developers. The author, noted object-oriented designer Martin Fowler, noticed that despite changes in technology--from Smalltalk to CORBA to Java to .NET--the same basic design ideas can be adapted and applied to solve common problems. With the help of an expert group of contributors, Martin distills over forty recurring solutions into patterns. The RESULT is an indispensable handbook of solutions that are applicable to any enterprise application platform

    標簽: Architecture Application Enterprise challenge

    上傳時間: 2013-12-12

    上傳用戶:ywqaxiwang

  • 以查詢方式將數據段中BUFFER開始的16個字節(jié)單元的數據從16550發(fā)送

    以查詢方式將數據段中BUFFER開始的16個字節(jié)單元的數據從16550發(fā)送,再通過16550接收端存入自內存單元RESULT

    標簽: BUFFER 16550 查詢 方式

    上傳時間: 2013-12-25

    上傳用戶:ukuk

  • 這個程序是編譯程序的一部分

    這個程序是編譯程序的一部分,用于閱讀源代碼,并識別其中的標記符、關鍵詞(以字母開頭)、數(以數字開頭)。其中數按其是否以0開頭分為10進制和8/16進制,而16進制的第二位是“x”。將上述所有識別的內容分類顯示在屏幕和文件RESULT.txt中。 函數scan負責整個識別、輸出過程,compare1負責識別單個字符,compare2識別詞。

    標簽: 程序 編譯

    上傳時間: 2013-12-23

    上傳用戶:wweqas

  • 向數組中輸入8、7、6、5、4、3、2、1

    向數組中輸入8、7、6、5、4、3、2、1,對其任一元素都進行1+2+……+N計算,并將結果存入RESULT數組中,結果在屏幕上,按十進制顯示出來。

    標簽: 數組 輸入

    上傳時間: 2016-03-12

    上傳用戶:thesk123

  • key.txt存放密鑰

    key.txt存放密鑰,密鑰只能為數字,text存放明文。 只對明文中的“數字”、“英文大小寫”加密,空格或其它中文字符等不予理睬。 加密方法: 明文分組與密鑰對應字符相加取模,十個數字為一個循環(huán),26個英文大小寫也各為一個循環(huán)。 例: 密鑰為: 012 明文為: Microsoft VC++ 6.0 密文則為:Mjerpuogv VD++ 8.0 加密結果: 將密文生成到RESULT.txt中,手動刪除最后的占位符""即可。

    標簽: key txt 密鑰

    上傳時間: 2013-12-22

    上傳用戶:rishian

主站蜘蛛池模板: 嘉兴市| 黄浦区| 温州市| 大荔县| 克拉玛依市| 保德县| 铜梁县| 循化| 商丘市| 沙湾县| 资讯 | 重庆市| 徐闻县| 新晃| 页游| 晋江市| 紫阳县| 仲巴县| 西宁市| 海宁市| 郧西县| 连云港市| 女性| 西畴县| 正定县| 清河县| 海兴县| 图木舒克市| 贡嘎县| 神池县| 上思县| 米易县| 涟源市| 明星| 锦州市| 巴林右旗| 沂源县| 桓仁| 五原县| 华蓥市| 同心县|