The subject which is to us propos¨¦ is as follows: calculation of the degr¨¦ d¡ ¯ inconsistance d¡ ¯ un logical program possibilist in C++. We thus work on a logical program possibilist, it be-¨¤-statement a logical program resulting from non-classique logic. The goal first of this project is of d¨¦ terminer if a logical program is consisting or not of share the calculation of sound degr¨¦ d¡ ¯ inconsistance.
标签: brvbar calculation subject follows
上传时间: 2013-12-18
上传用户:yulg
This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end of program execution it will display in the debug window if there were any memory leaks and how the memory looks so you can identify where your memory leak occurred. It will display in the debug window a message saying no memory leaks detected if there are no memory leaks. Similar to what crtdbg.h does in VC++. The code detects memory leaks generated with calls to new and delete operators in C++. The code doesn t detect memory leaks generated with C functions: malloc, calloc, free, but that can be done in the future. Let me know and I will program it.
标签: the embedded detects almost
上传时间: 2015-05-07
上传用户:comua
program kehuji uses Forms, Unit1 in ..\zxc\Unit1.pas {Form1}, Unit2 in ..\zxc\Unit2.pas {Form2}, Unit3 in ..\zxc\Unit3.pas {Form3}, Unit4 in ..\zxc\Unit4.pas {Form4} // Unit3 in C:\Program Files\Borland\Delphi7\Projects\Unit3.pas {Form3}, // Unit4 in C:\Program Files\Borland\Delphi7\Projects\Unit4.pas {Form4} {$R *.res} begin Application.Initialize Application.CreateForm(TForm1, Form1) Application.CreateForm(TForm2, Form2) Application.CreateForm(TForm3, Form3) Application.CreateForm(TForm4, Form4) // Application.CreateForm(TForm3, Form3) // Application.CreateForm(TForm4, Form4) Application.Run end.
标签: zxcUnit pas program kehuji
上传时间: 2014-01-16
上传用户:jing911003
Beginning with an introduction to 802.11b in general, 802.11 Security gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b--based systems, you ll want this book beside you every step of the way.
标签: 802.11 introduction Beginning Security
上传时间: 2013-12-04
上传用户:CHINA526
请把uCosII的文件放到Core文件夹下。 共有三个任务,A,B为定时调度。C通过键盘的ISR中发送消息到邮箱。 程序在优龙开发板上调试通过,用的uCosII是2.70版本。
上传时间: 2015-06-14
上传用户:jjj0202
OLE Programmer s Reference Information in this online help system is subject to change without notice and does not represent a commitment on the part of Microsoft Corporation. The software and/or files described in this online help system are furnished under a license agreement or nondisclosure agreement. The software and/or files may be used or copied only in accordance with the terms of the agreement. The purchaser may make one copy of the software for backup purposes. No part of this online help system may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or information and retrieval systems, for any purpose other than the purchaser s personal use, without the written permission of Microsoft Corporation.
标签: Information Programmer Reference subject
上传时间: 2015-08-04
上传用户:hxy200501
C++方面的一些论文,希望对大家有所帮助 如An Approach for Implementing Object Persistence in C++ using Broker.pdf
上传时间: 2013-12-30
上传用户:saharawalker
* * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS AND ANY EXPRESS * OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE * GOODS OR SERVICES LOSS OF USE, DATA, OR PROFITS OR BUSINESS * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH D
标签: WARRANTIES SOFTWARE PROVIDED EXPRESS
上传时间: 2013-12-20
上传用户:sxdtlqqjl
There is an example of how to use the LDPC encode/decode with AWGN channel model in files .\ldpc_decode.m and .\GFq\ldpc_decode.m. There are a few parity check matrices available in the code but you can use other matrices provided you have enough memory to load them. I suggest checking out matrices in Alist format available on David MacKay s web site.You will need to have access to a MEX compiler to be able to use a few functions written in C. LDPC的仿真代码
标签: example channel ldpc_de encode
上传时间: 2013-12-03
上传用户:lili123
The goal of this library is to make ODBC recordsets look just like an STL container. As a user, you can move through our containers using standard STL iterators and if you insert(), erase() or replace() records in our containers changes can be automatically committed to the database for you. The library s compliance with the STL iterator and container standards means you can plug our abstractions into a wide variety of STL algorithms for data storage, searching and manipulation. In addition, the C++ reflection mechanism used by our library to bind to database tables allows us to add generic indexing and lookup properties to our containers with no special code required from the end-user. Because our code takes full advantage of the template mechanism, it adds minimal overhead compared with using raw ODBC calls to access a database.
标签: recordsets container library ODBC
上传时间: 2015-10-11
上传用户:xlcky