代码搜索:awk
找到约 3,459 项符合「awk」的源代码
代码结果 3,459
www.eeworm.com/read/384760/2597600
h ex_apprec_auto.h
/* Do not edit: automatically built by gen_rec.awk. */
#ifndef ex_apprec_AUTO_H
#define ex_apprec_AUTO_H
#define DB_ex_apprec_mkdir 10000
typedef struct _ex_apprec_mkdir_args {
u_int32_t type;
DB_T
www.eeworm.com/read/380709/2652915
com flowallc1.v2.com
# To run this: "csh FlowAllC1.v2.com".
#
set randomseed=0
set filename=fairflow.xgr
set run=21
rm -f Dist.data
set num = 0
while ($num < 100)
../../ns Flow4C.v2.tcl combined $randomseed
awk '{pri
www.eeworm.com/read/380709/2652940
com flowallb1.v2.com
# To run this: "csh FlowAllB1.v2.com".
#
set randomseed=0
set filename=fairflow.xgr
set run=20
rm -f Dist.data
set num = 0
while ($num < 100)
../../ns Flow4B.v2.tcl combined $randomseed
awk '{pri
www.eeworm.com/read/362432/2933837
charmap2enc
#!/usr/bin/awk -f
# only for mostly 2-byte encodings like euc-kr
$2~"^/x..$" {
c = substr($2, 3, 2)
if (c
www.eeworm.com/read/259059/4346455
nmandsize
#!/bin/bash
nm -a -m $1
DATA_START=`size -x -m -l $1 | grep "Section __data: 0x" | awk '{print $5}'`
echo DATA SECTION START: $DATA_START
DATA_SIZE=`size -x -m -l $1 | grep "Section __data: 0x" | a
www.eeworm.com/read/473980/6828061
sh lab6_4.sh
#ch="Y"
#while [ $ch = "Y" -o $ch = "y" ]
#do
clear
sort lab6_1.txt > abc
cp abc lab6_1.txt
awk -F ":" 'BEGIN{ printf("Roll\t" "Name\t" "Branch\t" "Sem\t" "Total Mraks\n") }
{ print $1"\t",
www.eeworm.com/read/473980/6828080
sh lab6_2.sh
#ch="Y"
#while [ $ch = "Y" -o $ch = "y" ]
#do
clear
echo enter a roll no
read roll
grep -v ^$roll lab6_1.txt > abc
sort abc > xz
cp xz lab6_1.txt
awk -F":" '
BEGIN{ printf("Roll\t" "Name\t" "Br
www.eeworm.com/read/100018/15888079
config-solaris
find_pid_command=ps -ef | grep NAME | grep -v grep | awk '{ print $2 }'
path=/bin:/usr/bin:/sbin:/usr/sbin:/usr/local/bin
ld_path=/lib:/usr/lib:/usr/openwin/lib:/usr/dt/lib
ld_env=LD_LIBRARY_PATH
www.eeworm.com/read/100018/15889286
config-osf1
show_empty=1
rpc_inetd=1
inetd_conf_file=/etc/inetd.conf
rpc_protocols=tcp udp
restart_command=ps -ef | grep inetd | head -1 | awk '{ print $2 }' | xargs kill -HUP
services_file=/etc/services
protocol
www.eeworm.com/read/413439/11156139
txt ns.txt
一,延时分析。包的延时就是指包的接收时间与包的发送时间差。下面给出<mark>awk</mark>程序,相关的说明看程序里面的注释。
#BEGIN表明这是程序开头执行的一段语句,且只执行一次。
BEGIN {
#程序初始化,设定一变量以记录目前处理的封包的最大ID号码。在<mark>awk</mark>环境下变量的使用不需要声明,直接赋值。
highest_uid = 0;
}
#下面大括号里面的内容会针对要进行处理 ...