代码搜索:Text
找到约 10,000 项符合「Text」的源代码
代码结果 10,000
www.eeworm.com/read/126430/6017533
dat text.dat
This is a file of text, for use in testing programs.
Visible characters on the typewriter keyboard:
~!@#$%^&*()_+
`1234567890-=
QWERTYUIOP{}|
qwertyuiop[]\
ASDFGHJKL:"
asdfghjkl;'
ZXCVBNM
www.eeworm.com/read/125133/6032780
text notes.text
what's a good app to demo? ideally, it's:
- easy to implement
- something some significant number of hackers will want to use
- embarrassingly parallel
so:
- trivial factoring example
- cryptanal
www.eeworm.com/read/125133/6032904
text specification.text
The Idel specification, version 0.1.7.
We start with an abstract syntax for Idel code that we'll later
relate to the several different concrete representations. We give it
here in a Haskell-like not
www.eeworm.com/read/125133/6032907
text tutorial.text
I'm assuming you've already built and installed the system:
$ ./configure && make && make install
(I'll show shell command lines indented with a $ prompt, and code
snippets indented without the pro
www.eeworm.com/read/125133/6032910
text overview.text
Here's a quick summary of what I'm doing -- a virtual machine for safe
portable code that leaves most of the work of optimization to
whoever's producing the VM code, rather than to the VM implementati
www.eeworm.com/read/125133/6032911
text ofmt.text
should we use DIME?
http://www.ietf.org/internet-drafts/draft-nielsen-dime-00.txt
the below is out of date.
Here's the object-file format. Its design goals:
- Simple, compact, and quick to read i
www.eeworm.com/read/125133/6032912
text stacks.text
pickle trouble in stack-land:
program = [form] # a list of 0 or more forms
form = Bytes [i8] # a data block
| Ints [i32] # also a data blo
www.eeworm.com/read/125133/6032913
text roadmap.text
- make a vm-runner that's defanged (no input, no save).
To support this, implement just enough of the capability model:
- Change current i/o instructions to work on blocks.
- Fix all the tes
www.eeworm.com/read/125133/6032914
text todo.text
external api to interpreter
external function access (review how mite & glulx do it) (& omniware?)
tracking source-file positions
ensure source syntax can express everything in object file
api for obj
www.eeworm.com/read/125133/6032954
text notes.text
what's a good app to demo? ideally, it's:
- easy to implement
- something some significant number of hackers will want to use
- embarrassingly parallel
so:
- trivial factoring example
- cryptanal