代码搜索:reverse

找到约 4,015 项符合「reverse」的源代码

代码结果 4,015
www.eeworm.com/read/340710/3265218

db.4.1.192.in-addr.arpa.

; ; BIND reverse data file for south internet ; $TTL 604800 @ IN SOA 4.1.192.in-addr.arpa. root.freeswan.org. ( 200210241 ; Serial 604800 ; Refresh 86400 ; Retry 2419200 ; Expire
www.eeworm.com/read/340665/3281652

java stringbuffer_1.java

// Test StringBuffer.replace(), reverse(), insert(String), append(String), // and delete(). public class StringBuffer_1 { public static void main(String args[]) { StringBuffer sb = new Strin
www.eeworm.com/read/324136/3505445

h xbytes.h

/* * xbytes.h -- * * Declaration of table to reverse bit order of bytes. * * Copyright (c) 1995 Sun Microsystems, Inc. * * See the file "license.terms" for information on usage and redistributi
www.eeworm.com/read/324136/3505635

h xbytes.h

/* * xbytes.h -- * * Declaration of table to reverse bit order of bytes. * * Copyright (c) 1995 Sun Microsystems, Inc. * * See the file "license.terms" for information on usage and redistributi
www.eeworm.com/read/292144/3957715

erl test.erl

%% %% This is a test file %% -module(test). -export([nrev/1]). %% Just a naive reverse function in order %% to get a code example with some comments. nrev([X | Xs]) -> append(X, nrev(Xs)); %
www.eeworm.com/read/440906/1783333

java stringbuffer_1.java

// Test StringBuffer.replace(), reverse(), insert(String), append(String), // and delete(). public class StringBuffer_1 { public static void main(String args[]) { StringBuffer sb = new Strin
www.eeworm.com/read/439112/1811151

nasl edonkey_detect.nasl

# # This script was written by Michel Arboi # # GPL # # This script only checks if ports 4661-4663 are open. # The protocol is not documented, AFAIK. It was probably 'reverse en
www.eeworm.com/read/432859/1889260

cc am_hw_primitive_builder_va_vr.cc

/* (c) Copyright Motorola 1997, 1998, 1999, 2000, 2001, 2002 All rights reserved. Motorola Confidential Proprietary Contains confidential proprietary information of Motorola, Inc. Reverse eng
www.eeworm.com/read/431110/1911024

db.arpa.

; ; BIND reverse data file for west subnet ; $TTL 604800 @ IN SOA arpa. root.freeswan.org. ( 200210241 ; Serial 604800 ; Refresh 86400 ; Retry 2419200 ; Expire 604800 ) ; Negativ
www.eeworm.com/read/431110/1911026

db.3.1.192.in-addr.arpa.

; ; BIND reverse data file for untrusted net ; $TTL 604800 @ IN SOA 3.1.192.in-addr.arpa. root.freeswan.org. ( 200306021 ; Serial 604800 ; Refresh 86400 ; Retry 2419200 ; Expire