μC/OS-II Goals Probably the most important goal of μC/OS-II was to make it backward compatible With μC/OS (at least from an application’s standpoint). A μC/OS port might need to be modified to work With μC/OS-II but at least, the application code should require only minor changes (if any). Also, because μC/OS-II is based on the same core as μC/OS, it is just as reliable. I added conditional compilation to allow you to further reduce the amount of RAM (i.e. data space) needed by μC/OS-II. This is especially useful when you have resource limited products. I also added the feature described in the previous section and cleaned up the code. Where the book is concerned, I wanted to clarify some of the concepts described in the first edition and provide additional explanations about how μC/OS-II works. I had numerous requests about doing a chapter on how to port μC/OS and thus, such a chapter has been included in this book for μC/OS-II.
标签: OS-II compatible important Probably
上传时间: 2013-12-02
上传用户:jkhjkh1982
Delphi Advanced Import Component_v2.48.With Full Source.
标签: Component_v Advanced Delphi Import
上传时间: 2014-01-27
上传用户:zhouchang199
2D TM program With plane wave source fd2d_3.3.c
上传时间: 2016-02-21
上传用户:wendy15
2D TM program With plane wave source fd2d_3.4.c
上传时间: 2014-01-06
上传用户:wff
find the information about a host With the DNS retrieving system calls, such as gethostbyname() and gethostbyaddr(). (2) All the required information are in the hostent structure. (3) All the aliases and IP addresses of the host is stored in the hostent structure using linked list (链表).
标签: gethostbyname information retrieving the
上传时间: 2016-02-21
上传用户:13517191407
Drawing Graphs With Metapost : A powerful graphics language
标签: Metapost powerful graphics language
上传时间: 2016-02-21
上传用户:Andy123456
The tool presented below tries to detect from remote if the target machine was compromised With the HACKER Defender rootkit. The tool connect to the remote host, and compares the reply to several known replies. The rootkits that can be detected by the tool are: HACKER Defender v1.0.0 and below.
标签: compromised presented the machine
上传时间: 2016-02-21
上传用户:gundan
C++ GUI Programming With Qt 4
标签: Programming With GUI Qt
上传时间: 2014-01-19
上传用户:784533221
R/W With DB [代码性质] VC完整应用程序代码 [代码作者] 徐景周
上传时间: 2016-02-21
上传用户:tedo811
merge exe With dll pe bundle.
上传时间: 2014-01-24
上传用户:hwl453472107