This version of malloc for VxWorks contains two different algorithms. One is the BSD based Kingsley "bucket" allocator which has some unique fragmentation behavior. The other is Doug Lea s well tested allocator that tries to minimize fragmentation while keeping the speed/space requirements.
非常實(shí)用,可移植用作實(shí)現(xiàn)跨平臺(tái)的嵌入式的內(nèi)存分配機(jī)制.
The project Adventure is a simple text-based adventure game. The game, as given, involves the hero trying to find his way from a deep dark forest to home and his true love. There s very little else the player can do apart from moving from place to place. It s not really very interesting.
This project can be of use beyond the given, rather boring forest adventure though. You can use it as a basis for developing your own adventure game with different, more interesting commands, areas, items, people and so on.
The package ope.adventure contains classes to describe the game world.
A new blind adaptive multiuser detection scheme based on a hybrid of Kalman filter and
subspace estimation is proposed. It is shown that the detector can be expressed as an anchored
signal in the signal subspace and the coefficients can be estimated by the Kalman filter using only
the signature waveform and the timing of the desired user.
A Java web application, based on Struts and Hibernate, that serves as an online running log. Users may enter information about workouts, and can track historical performance and data using web-based charts.
This documentation is based on the following versions:- pre-release of the wimax model developed by NIST (file patch-wimax-prerelease-092206)- ns-2.29
此程序是NS2下用C、C++編寫的,主要對(duì)Wimax 802.16d和802.16e的MAC層協(xié)議的仿真,壓縮文件內(nèi)部有詳細(xì)的說(shuō)明。
由于NS2運(yùn)行在Linux下而且是對(duì)網(wǎng)絡(luò)的模擬,因此把它歸在Linux/網(wǎng)絡(luò)類中
"poco" (Spanish & Italian for "little") OLAP provides a web-based, crosstab reporting tool for your datawarehouse. While it s not an OLAP server or full fledged data mining solution, pocOLAP makes your data easy to use and understand ... for free!
Intrusion Detection:Host-based Network
Intrusion Detection
• At each host, monitor all incoming and
outgoing network traffic – for each packet:
– Analyze 4-tuple and protocol
– Examine contents