代码搜索:reverse
找到约 4,015 项符合「reverse」的源代码
代码结果 4,015
www.eeworm.com/read/455463/1614735
m flipx.m
function flipx
% FLIPX: script to flip the direction of the x axis
%
% just type "flipx" at the matlab prompt
state=get(gca,'xdir');
if(strcmp(state,'normal'))
set(gca,'xdir','reverse')
else
www.eeworm.com/read/455463/1614741
m flipy.m
function flipy
% FLIPY: script to flip the direction of the y axis
%
% just type "flipy" at the matlab prompt
state=get(gca,'ydir');
if(strcmp(state,'normal'))
set(gca,'ydir','reverse')
else
www.eeworm.com/read/238913/4606956
js panel-dialog.js
HTMLArea.PanelDialog = function(editor, side, html, localizer)
{
this.id = { };
this.r_id = { }; // reverse lookup id
this.editor = editor;
this.document = document;
this.rootElem = e
www.eeworm.com/read/233448/4682347
c acc1.c
/* Tail call optimizations would reverse the order of additions in func(). */
double func (const double *array)
{
double d = *array;
if (d == 0.0)
return d;
else
return d + func (array
www.eeworm.com/read/233448/4687551
java stringbuffer_1.java
// Test StringBuffer.replace(), reverse(), insert(String), append(String),
// and delete().
public class StringBuffer_1
{
public static void main(String args[])
{
StringBuffer sb = new Strin
www.eeworm.com/read/190666/5180508
java stringbuffer_1.java
// Test StringBuffer.replace(), reverse(), insert(String), append(String),
// and delete().
public class StringBuffer_1
{
public static void main(String args[])
{
StringBuffer sb = new Strin
www.eeworm.com/read/162614/5527272
c acc1.c
/* Tail call optimizations would reverse the order of additions in func(). */
double func (const double *array)
{
double d = *array;
if (d == 0.0)
return d;
else
return d + func (array
www.eeworm.com/read/340710/3265152
db.arpa.
;
; BIND reverse data file for west subnet
;
$TTL 604800
@ IN SOA arpa. root.freeswan.org. (
200210241 ; Serial
604800 ; Refresh
86400 ; Retry
2419200 ; Expire
604800 ) ; Negativ
www.eeworm.com/read/340710/3265154
db.3.1.192.in-addr.arpa.
;
; BIND reverse data file for untrusted net
;
$TTL 604800
@ IN SOA 3.1.192.in-addr.arpa. root.freeswan.org. (
200306021 ; Serial
604800 ; Refresh
86400 ; Retry
2419200 ; Expire
www.eeworm.com/read/340710/3265208
db.2.1.192.in-addr.arpa.
;
; BIND reverse data file for untrusted net
;
$TTL 604800
@ IN SOA 2.1.192.in-addr.arpa. root.freeswan.org. (
200305261 ; Serial
604800 ; Refresh
86400 ; Retry
2419200 ; Expire