代码搜索:Multiple
找到约 9,501 项符合「Multiple」的源代码
代码结果 9,501
www.eeworm.com/read/165261/5484076
java keyholder.java
/*
* Copyright 2002-2004 the original author or authors.
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
www.eeworm.com/read/161121/5559989
h pci.h
/***********************************************************************
*
* Copyright 2001 MontaVista Software Inc.
* Author: MontaVista Software, Inc.
* ahennessy@mvista.com
www.eeworm.com/read/473927/6822716
txt 2189.txt
Rule:
--
Sid:
2189
--
Summary:
This event is generated when a suspicious packet using an unusual
protocol is sent to a router.
--
Impact:
Denial of Service (DoS).
--
Detailed Information:
A vulne
www.eeworm.com/read/473927/6823941
txt 2186.txt
Rule:
--
Sid:
2186
--
Summary:
This event is generated when a suspicious packet using an unusual
protocol is sent to a router.
--
Impact:
Denial of Service (DoS).
--
Detailed Information:
A vulne
www.eeworm.com/read/473927/6824545
txt 1840.txt
Rule:
--
Sid:
1840
--
Summary:
This event is generated when a client on the protected network has
possibly visited a website containing malicious javascript code.
--
Impact:
Minimal
--
Detailed I
www.eeworm.com/read/473927/6824936
txt 2188.txt
Rule:
--
Sid:
2188
--
Summary:
This event is generated when a suspicious packet using an unusual
protocol is sent to a router.
--
Impact:
Denial of Service (DoS).
--
Detailed Information:
A vulne
www.eeworm.com/read/473927/6825942
txt 2187.txt
Rule:
--
Sid:
2187
--
Summary:
This event is generated when a suspicious packet using an unusual
protocol is sent to a router.
--
Impact:
Denial of Service (DoS).
--
Detailed Information:
A vulne
www.eeworm.com/read/194516/8191499
m zak.m
function dzt=zak(sig,N,M)
%ZAK Zak transform.
% DZT=ZAK(SIG,N,M) computes the Zak transform of signal SIG.
%
% SIG : Signal to be analysed (length(X)=N1).
% N : number of Zak coefficients in time (
www.eeworm.com/read/294589/8217538
m zerohold.m
function Y=zerohold(X,N)
%ZEROHOLD Oversample the input X, by N times, using zero order hold.
% Y=zerohold(X,N)
% If X is a matrix then each row is over sampled
%
% See : SUBSAMP
% Copyr
www.eeworm.com/read/173996/9614109
def keyring.def
application { "Keyring" Gtkr }
multiple code { "code2" }