代码搜索:techniques
找到约 847 项符合「techniques」的源代码
代码结果 847
www.eeworm.com/read/280913/4121971
lex numbers.lex
/*
* numbers.lex : An example of the definitions and techniques
* for scanning numbers
*/
%{
#include
#define UNSIGNED_LONG_SYM 1
#define SIGNED_LONG_SYM 2
#define U
www.eeworm.com/read/437033/1836811
readme
This directory contains some examples illustrating techniques for extracting
high-performance from flex scanners. Each program implements a simplified
version of the Unix "wc" tool: read text from st
www.eeworm.com/read/174006/9612474
txt 2.6.txt
Listing 2.6 Defining Properties to Provide Validating Member Variable Access Using
Data-Hiding Techniques
using System;
namespace _6_Properties
{
public class Television
{
private int channel =
www.eeworm.com/read/132541/14084584
java drawings.java
package examples.windows;
import java.awt.*;
import javax.swing.*;
/** An example class used to demonstrate various
* drawing techniques including text, lines,
* shapes, and filled shapes.
www.eeworm.com/read/112509/15484096
readme
This hierarchy contains all the source code from my book
"C Interfaces and Implementations: Techniques for Creating Reusable
Software (Addison-Wesley Professional Computing Series, 1997,
ISBN 0-201
www.eeworm.com/read/109798/15548374
v onehot.v
//
// Just a little demo of some FSM techniques, including One-Hot and
// using 'default' settings and the case statements to selectively
// update registers (sort of like J-K flip-flops).
//
//
www.eeworm.com/read/105622/15663698
pas yacclr0.pas
{
LR(0) set construction. For an explanation of this algorithm, see
Aho/Sethi/Ullman, "Compilers : Principles, Techniques and Tools,"
1986, Section 4.7.
Copyright (c) 1990-92 Albert G
www.eeworm.com/read/104415/15694416
v onehot.v
//
// Just a little demo of some FSM techniques, including One-Hot and
// using 'default' settings and the case statements to selectively
// update registers (sort of like J-K flip-flops).
//
//
www.eeworm.com/read/100128/15883365
readme
This directory contains some examples illustrating techniques for extracting
high-performance from flex scanners. Each program implements a simplified
version of the Unix "wc" tool: read text from st
www.eeworm.com/read/363596/9943594
readme
This hierarchy contains all the source code from my book
"C Interfaces and Implementations: Techniques for Creating Reusable
Software (Addison-Wesley Professional Computing Series, 1997,
ISBN 0-201-49