This file contains board-specific information for the Motorola LoPEC in support of the lopec BSP. Specifically, this file contains information on any BSP interface changes from previous software or hardware versions, and contains caveats that the user must be aware of before using this BSP. Additionally, the target board s manual page entry (for example, lopec/target.nr) provides board-specific information necessary to run VxWorks, and should be read before this BSP is used.
标签: board-specific information the Motorola
上传时间: 2013-12-05
上传用户:a673761058
Excel的强大函数功能,为我们带来了极大方便,虽然它有200多个函数,但有时我们为实现一项规定的功能,可能用到几个函数或者采用嵌套函数,这样应用起来,也不太方便。其实对于我们经常用到的功能,我们可以创建自定义函数UDF(User—defined function),它的运行与Excel中自带的函数完全相同。建立自定义函数有以下几个优点:建立自己特殊的功能和名称的函数;能将复杂的、嵌套的、多个原有的函数组合在一起,发挥更大的威力。
上传时间: 2013-12-24
上传用户:gxrui1991
SuperLU is a general purpose library for the direct solution of large, sparse, nonsymmetric systems of linear equations on high performance machines. The library is written in C and is callable from either C or Fortran. The library routines will perform an LU decomposition with partial pivoting and triangular system solves through forward and back substitution. The LU factorization routines can handle non-square matrices but the triangular solves are performed only for square matrices. The matrix columns may be preordered (before factorization) either through library or user supplied routines. This preordering for sparsity is completely separate from the factorization. Working precision iterative refinement subroutines are provided for improved backward stability. Routines are also provided to equilibrate the system, estimate the condition number, calculate the relative backward error, and estimate error bounds for the refined solutions.
标签: nonsymmetric solution SuperLU general
上传时间: 2017-02-20
上传用户:lepoke
This taglib contains tags used to create struts input forms, as well as other tags generally useful in the creation of HTML-based user interfaces. Many of the tags in this tag library will throw a JspException at runtime when they are utilized incorrectly (such as when you specify an invalid combination of tag attributes). JSP allows you to declare an "error page" in the <%@ page %> directive. If you wish to process the actual exception that caused the problem, it is passed to the error page as a request attribute under key org.apache.struts.action.EXCEPTION.
标签: tags generally contains taglib
上传时间: 2017-02-21
上传用户:dianxin61
Freetz is a firmware-extension (modification) for the AVM Fritz!Box and devices with identical hardware. The original firmware from the manufacturer is extended with new functions and programs which may be selected by the user
标签: firmware-extension modification identical devices
上传时间: 2014-12-08
上传用户:qw12
在书上所看到的源码,阅读器,读取*.txt,并能使用PageUp、PageDown、Home、End、Esc、F1和上下左右键以阅读完整文章。
标签: 源码
上传时间: 2017-02-26
上传用户:米卡
Murphy 大俠 GPL 的 C++/x86 RTOS, 支持 MMU, 用戶/核心 模式區隔. http://hpc.ee.ntu.edu.tw/~murphy/me/EKernel.html part 2 of 3: user mode LIB
标签: EKernel Murphy murphy RTOS
上传时间: 2013-12-23
上传用户:小鹏
Windows Mobile NLED driver proxy. Created for customization of incoming call ring vibration. While original Windows Mobile ring vibration constant vibrating during all ring, this driver help to apply any user vibrating pattern.
标签: customization vibration incoming Windows
上传时间: 2017-03-07
上传用户:498732662
先运行力控应用程序(如演示工程——反应釜),实时数据库系统亦随之启动。 然后启动delphi6.0,创建一个新的工程。 在form1窗体中,放置DdeClientConv控件(system标签页),设置ConnectMode属性值为ddeAutomatic、DdeService属性值为db、DdeTopic属性值为db; 接下来放置DdeClientItem控件(system标签页),设置DdeConv为DdeClientConv1,设置DdeItem属性值为所要读取的数据库点参数值如dbmixvol.pv; 放置一个edit控件; 放置一个timer控件,设置interval属性值为100;在ontimer脚本中加入: procedure TForm1.Timer1Timer(Sender: TObject) begin edit1.text:=form1.DdeClientItem1.Text end
上传时间: 2014-01-22
上传用户:lwwhust
This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.
标签: demonstrates encryption functions implement
上传时间: 2017-03-08
上传用户:xuanchangri