搜索结果
找到约 1,432 项符合
short-Time 的查询结果
软件设计/软件工程 In a preemptive priority based RTOS, priority inversion problem is among the major sources of deadl
In a preemptive priority based RTOS, priority inversion
problem is among the major sources of deadline
violations. Priority inheritance protocol is one of the
approaches to reduce priority inversion. Unfortunately,
RTOS like uC/OS can’t support priority inheritance
protocol since it does not allow ...
汇编语言 This application report describes the use of Timer_A3 to decode RC5 and SIRC TV IR remote control si
This application report describes the use of Timer_A3 to decode RC5 and SIRC TV IR remote control signals. The decoder described in this report is interrupt-driven and operates a background function using specific features the Timer_A3. Only a small portion of the MSP430 CPU?s nonreal-time resources ...
软件工程 C++, although a marvelous language, isn t perfect. Matthew Wilson has been working with it for over
C++, although a marvelous language, isn t perfect. Matthew Wilson has been working with it for over a decade, and during that time he has found inherent limitations that require skillful workarounds. In this book, he doesn t just tell you what s wrong with C++, but offers practical techniques and to ...
Delphi控件源码 LCDScreen is a couple of Delphi component which simulate a dot-LCD multilines screen. It is fully c
LCDScreen is a couple of Delphi component which simulate a dot-LCD multilines screen.
It is fully customizable and has animation and special effects capabilities for the displayed text.
TLCDScreen is the display component and TLCDAnimator the animation one.
Both have build-in Property editor making ...
其他 对于单个控件,COMPONET-->INSTALL COMPONENT..-->PAS或DCU文件-->INSTALL。 2.对于带*.DPK文件的控件包,FILE-->OP
对于单个控件,COMPONET-->INSTALL COMPONENT..-->PAS或DCU文件-->INSTALL。
2.对于带*.DPK文件的控件包,FILE-->OPEN(下拉列表框中选*.DPK)-->INSTALL即可。
3.对于带*.BPL文件的控件包,INSTALL PACKAGES-->ADD-->BPL文件名即可。
4.如果以上INSTALL按钮为失效的话,试试COMPILE按钮。
5.是RUN TIME LIB则在OPTION下的PACKAGE ...
其他书籍 With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to s
With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator a ...
Internet/网络编程 JK Proxy Project - Version 0.1 ------------------------------ This was going to be a proxy serve
JK Proxy Project - Version 0.1
------------------------------
This was going to be a proxy server bu I stopped developing this program
(maybe I will go on coding on this application again some time).
The email part with spam filtering already works.
Check out the numerous text files for additiona ...
系统设计方案 This my phd thesis for the WDM optical network optimization, which employs convex optimization techn
This my phd thesis for the WDM optical network optimization, which employs convex optimization techniques to solve the proposed integer problems. The computation complexity of my optimization framework is very low compared with other existing method and a performance bound is provided at the same ti ...
Linux/Unix编程 celestia源代码
celestia源代码,Celestia, a real-time 3D space simulation featuring a database of over 100000 stars, nearly a hundred solar system, objects, and a complete catalog of extrasolar planets.
其他书籍 This document outlines what is necessary to install and run the LEACH protocol on version 2.27 of n
This document outlines what is necessary to install and run the LEACH protocol on version
2.27 of ns2. At the time of this writing, this is the newest version of ns2. The LEACH implementation
was written as a stand-alone application. Thus, in the past a version compiled for LEACH may or may
not work ...