代码搜索:techniques

找到约 847 项符合「techniques」的源代码

代码结果 847
www.eeworm.com/read/280913/4121971

lex numbers.lex

/* * numbers.lex : An example of the definitions and techniques * for scanning numbers */ %{ #include #define UNSIGNED_LONG_SYM 1 #define SIGNED_LONG_SYM 2 #define U
www.eeworm.com/read/437033/1836811

readme

This directory contains some examples illustrating techniques for extracting high-performance from flex scanners. Each program implements a simplified version of the Unix "wc" tool: read text from st
www.eeworm.com/read/174006/9612474

txt 2.6.txt

Listing 2.6 Defining Properties to Provide Validating Member Variable Access Using Data-Hiding Techniques using System; namespace _6_Properties { public class Television { private int channel =
www.eeworm.com/read/132541/14084584

java drawings.java

package examples.windows; import java.awt.*; import javax.swing.*; /** An example class used to demonstrate various * drawing techniques including text, lines, * shapes, and filled shapes.
www.eeworm.com/read/112509/15484096

readme

This hierarchy contains all the source code from my book "C Interfaces and Implementations: Techniques for Creating Reusable Software (Addison-Wesley Professional Computing Series, 1997, ISBN 0-201
www.eeworm.com/read/109798/15548374

v onehot.v

// // Just a little demo of some FSM techniques, including One-Hot and // using 'default' settings and the case statements to selectively // update registers (sort of like J-K flip-flops). // //
www.eeworm.com/read/105622/15663698

pas yacclr0.pas

{ LR(0) set construction. For an explanation of this algorithm, see Aho/Sethi/Ullman, "Compilers : Principles, Techniques and Tools," 1986, Section 4.7. Copyright (c) 1990-92 Albert G
www.eeworm.com/read/104415/15694416

v onehot.v

// // Just a little demo of some FSM techniques, including One-Hot and // using 'default' settings and the case statements to selectively // update registers (sort of like J-K flip-flops). // //
www.eeworm.com/read/100128/15883365

readme

This directory contains some examples illustrating techniques for extracting high-performance from flex scanners. Each program implements a simplified version of the Unix "wc" tool: read text from st
www.eeworm.com/read/363596/9943594

readme

This hierarchy contains all the source code from my book "C Interfaces and Implementations: Techniques for Creating Reusable Software (Addison-Wesley Professional Computing Series, 1997, ISBN 0-201-49