代码搜索:Executable
找到约 10,000 项符合「Executable」的源代码
代码结果 10,000
www.eeworm.com/read/425160/10376890
txt readme.txt
The executable in this directory is self-contained:
It does not read any input.
www.eeworm.com/read/354061/10393198
txt 注意:.txt
模板 Thumb Executable Image for lpc2131
和 ARM Executable Image for lpc2131在处理中断方式上的不一样。
Thumb Executable Image for lpc2131采用传统方式,清零CPSR的相应位,
ARMExecutable Image for lpc2131有函数管理。
www.eeworm.com/read/278864/10501814
c loader.c
/*
* loader.c - program loader routines
*
* This file is a part of the SimpleScalar tool suite written by
* Todd M. Austin as a part of the Multiscalar Research Project.
*
* The tool suite is
www.eeworm.com/read/160033/10577964
readme
This directory contains all the source files and makefiles required
to produce the executable `fastcap' and its associated input file generation
programs. Compilation should normally be done in this d
www.eeworm.com/read/351896/10598891
txt readme.txt
The executable in this directory is self-contained:
It does not read any input.
www.eeworm.com/read/349350/10833986
txt 注意:.txt
模板 Thumb Executable Image for lpc2131
和 ARM Executable Image for lpc2131在处理中断方式上的不一样。
Thumb Executable Image for lpc2131采用传统方式,清零CPSR的相应位,
ARMExecutable Image for lpc2131有函数管理。
www.eeworm.com/read/418361/10951114
c check_openpf1.c
/* Check that --sysroot is applied to open(2).
#sim: --sysroot=@exedir@
We assume, with EXE being the name of the executable:
- The simulator executes with cwd the same directory where the exec
www.eeworm.com/read/272242/10965033
cpp cpl_getexecpath.cpp
/**********************************************************************
* $Id: cpl_getexecpath.cpp,v 1.3 2006/02/19 21:54:34 mloskot Exp $
*
* Project: CPL - Common Portability Library
* Purpose:
www.eeworm.com/read/467950/6997152
readme
Blobdetect 1.3b
This is blobdetect-1.3b, an API for extracting blob features from
RGB images. The algorithm for blob feature extraction is described
in the thesis "Channel Representations for Low and