代码搜索:computers

找到约 1,033 项符合「computers」的源代码

代码结果 1,033
www.eeworm.com/read/155856/5618586

txt abstract.txt

Small Model Sieve Program The Sieve of Erosthostenes is a program that calculates Prime numbers. It is a standard benchmark used to determine the relative speed of different computers or the eff
www.eeworm.com/read/152843/5660527

c prom.c

/* * Procedures for interfacing to the Open Firmware PROM on * Power Macintosh computers. * * In particular, we are interested in the device tree * and in using some of its services (exit, write
www.eeworm.com/read/105103/15677949

txt abstract.txt

Small Model Sieve Program The Sieve of Erosthostenes is a program that calculates Prime numbers. It is a standard benchmark used to determine the relative speed of different computers or the eff
www.eeworm.com/read/288542/8622895

txt config.txt

Configuring your DOS system for use: ------------------------------------ When booting DOS, you will find it only supports a subset of the devices available on many computers. To support additional d
www.eeworm.com/read/288542/8622958

txt config.txt

Configuring your DOS system for use: ------------------------------------ When booting DOS, you will find it only supports a subset of the devices available on many computers. To support additional d
www.eeworm.com/read/388223/8626901

h commands.h

/* * TITLE: Commands.h * * PURPOSE: This file contains the constants that define the various * serial commands the referee box can send to the operating * computers. * * WRITTEN BY: Brett
www.eeworm.com/read/278235/10555019

why-free

Why Software Should Not Have Owners by Richard Stallman Digital information technology contributes to the world by making it easier to copy and modify information. Computers promise to m
www.eeworm.com/read/421857/10687385

txt the constitution in cyberspace.txt

Laurence H. Tribe, "The Constitution in Cyberspace" PREPARED REMARKS KEYNOTE ADDRESS AT THE FIRST CONFERENCE ON COMPUTERS, FREEDOM & PRIVACY Copyright, 1991, Jim Warren & Computer Professionals for
www.eeworm.com/read/421857/10688612

txt backdoors.txt

Backdoors By Puerto Since the early days of intruders breaking into computers, they have tried to develop techniques or backdoors that allow them to get back into the system. In this paper, it wi
www.eeworm.com/read/421857/10691041

txt backdoors.txt

Backdoors By Puerto Since the early days of intruders breaking into computers, they have tried to develop techniques or backdoors that allow them to get back into the system. In this paper, it wi