代码搜索:Two

找到约 10,000 项符合「Two」的源代码

代码结果 10,000
www.eeworm.com/read/160303/5572920

txt files.txt

- Overview of the Openswan commands and configuration files Implementation Openswan consists of two subsystems. The userland subsystem consists of the IKE keying daemon, called pluto, and various h
www.eeworm.com/read/475710/6775956

m twologons.m

% create a movie (or play it) showing the interferences % between two logons % F. Auger, oct 1999 % Copyright (c) CNRS - France 1999. % % ------------------- CONFIDENTIAL PROGRAM ------------
www.eeworm.com/read/474588/6813232

m eegsim.m

% eegsim.m % Generates a simulated eeg signal and leaves it in the workspace % Does time-frequency analysis and creates two figures % This program is distributed as a supplement to the book % "
www.eeworm.com/read/242775/6828353

txt readme.txt

Introduction ------------ This example implements a simple HID mouse device. It demonstrates how to use the HID library and HID streams. Setup ----- The application supports two types of
www.eeworm.com/read/295630/8149597

c fet140_ta_pwm01.c

//******************************************************************************* // MSP-FET430P140 Demo - Timer_a PWM TA1-2 upmode, DCO SMCLK // // Description; This program will generate a two
www.eeworm.com/read/195283/8166390

txt readme.txt

==================================================== 4/2/98 * Instrumentation: Read Pentium cycle counter * PC configuration: DCOM/TCP, Windows NT Server 4.0, between two 300MHz
www.eeworm.com/read/194702/8188134

install

Installation ------------ There is no need to configure. Only type `make all'. Usage ----- Use scripts to start the team. It is preferred to run it on two independent machines and run the ser
www.eeworm.com/read/294870/8196527

m twologons.m

% create a movie (or play it) showing the interferences % between two logons % F. Auger, oct 1999 % Copyright (c) CNRS - France 1999. % % ------------------- CONFIDENTIAL PROGRAM ------------
www.eeworm.com/read/293608/8283177

txt readme.txt

Introduction ------------ This example implements a simple HID keyboard device. It demonstrates how to use the HID library and HID streams. Setup ----- The application supports two ways
www.eeworm.com/read/393447/8287169

c panes.c

/* Paned Widgets * * The GtkHPaned and GtkVPaned Widgets divide their content * area into two panes with a divider in between that the * user can adjust. A separate child is placed into each * pa