虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

both

  • The following Philips LPC2k CAN examples in this directory were provided by ESAcademy. LPC2_CANA

    The following Philips LPC2k CAN examples in this directory were provided by ESAcademy. LPC2_CANAll_V110: Receives all CAN messages in a receive queue. LPC2_CANFull_V110: Uses Full-CAN-like reception filtering. LPC2_CANBlinky_V130: Minimal example of MicroCANopen, uses Full-CAN-like reception filtering and implements both Rx and Tx Interrupt Service Routines.

    标签: ESAcademy following directory examples

    上传时间: 2015-04-25

    上传用户:hasan2015

  • The following Philips LPC2k CAN examples in this directory were provided by ESAcademy. LPC2_CANA

    The following Philips LPC2k CAN examples in this directory were provided by ESAcademy. LPC2_CANAll_V110: Receives all CAN messages in a receive queue. LPC2_CANFull_V110: Uses Full-CAN-like reception filtering. LPC2_CANBlinky_V130: Minimal example of MicroCANopen, uses Full-CAN-like reception filtering and implements both Rx and Tx Interrupt Service Routines.

    标签: ESAcademy following directory examples

    上传时间: 2013-12-13

    上传用户:牛津鞋

  • The following Philips LPC2k CAN examples in this directory were provided by ESAcademy. LPC2_CANA

    The following Philips LPC2k CAN examples in this directory were provided by ESAcademy. LPC2_CANAll_V110: Receives all CAN messages in a receive queue. LPC2_CANFull_V110: Uses Full-CAN-like reception filtering. LPC2_CANBlinky_V130: Minimal example of MicroCANopen, uses Full-CAN-like reception filtering and implements both Rx and Tx Interrupt Service Routines.

    标签: ESAcademy following directory examples

    上传时间: 2014-01-06

    上传用户:zukfu

  • In case you haven t realized it, building computer systems is hard. As the complexity of the system

    In case you haven t realized it, building computer systems is hard. As the complexity of the system gets greater, the task of building the software gets exponentially harder. As in any profession, we can progress only by learning, both from our mistakes and from our successes. This book represents some of this learning written in a form that I hope will help you to learn these lessons quicker than I did, or to communicate to others more effectively than I did before I boiled these patterns down.

    标签: complexity the building computer

    上传时间: 2015-04-25

    上传用户:tyler

  • I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco

    I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> Usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) If a service is running on its default port you don t have to specify both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1

    标签: I. vulnerability Introduction undisclosed

    上传时间: 2015-05-15

    上传用户:xhz1993

  • ARM下 Implement matrix multiplication of 2 square matrices, with data read from an input file and pri

    ARM下 Implement matrix multiplication of 2 square matrices, with data read from an input file and printed both to the console and to an output file. • Assume a file with correct data (no garbage, characters, etc.). • you must check and provide appropriate execution for 2 extra cases, namely when the matrix size given is either “0” , or when the size is greater than the maximum handled of “5” . In these 2 cases you must implement the following behaviour: o If size = 0, then print a message “Size = 0 is unacceptable” and continue by reading the next size for the next 2 matrices (if not end of file). o If size >5, then print two messages: “Size is too big - unacceptable”. Then read and discard the next (size2 ) integers and continue by reading the next size for the next 2 matrices (if not end of file).

    标签: multiplication Implement matrices matrix

    上传时间: 2014-08-30

    上传用户:dsgkjgkjg

  • Decoding most of the infrared signals can be easily handled by PIC16C5X microcontrollers. This appl

    Decoding most of the infrared signals can be easily handled by PIC16C5X microcontrollers. This application note describes how this decoding may be done. The only mandatory hardware for decoding IR signals is an infrared receiver. The use of two types is described here. both are modular types used often by the consumer electronics industry. The first type responds to infrared signals modulated at about 40 kHz. The second responds to non-modulated infrared pulses and has a restricted range. The hardware costs of each approach will be less than two dollars.

    标签: microcontrollers Decoding infrared handled

    上传时间: 2015-05-24

    上传用户:ruan2570406

  • The Linux kernel is one of the most interesting yet least understood open-source projects. It is als

    The Linux kernel is one of the most interesting yet least understood open-source projects. It is also a basis for developing new kernel code. That is why Sams is excited to bring you the latest Linux kernel development information from a Novell insider in the second edition of Linux Kernel Development. This authoritative, practical guide will help you better understand the Linux kernel through updated coverage of all the major subsystems, new features associated with Linux 2.6 kernel and insider information on not-yet-released developments. You ll be able to take an in-depth look at Linux kernel from both a theoretical and an applied perspective as you cover a wide range of topics, including algorithms, system call interface, paging strategies and kernel synchronization. Get the top information right from the source in Linux Kernel Development.

    标签: interesting open-source understood projects

    上传时间: 2015-06-30

    上传用户:zyt

  • This book focuses on combining C++ s power and flexibility with high performance and scalability, r

    This book focuses on combining C++ s power and flexibility with high performance and scalability, resulting in the best of both worlds. Specific topics include temporary objects, memory management, templates, inheritance, virtual functions, inlining, referencecounting, STL, and much more

    标签: flexibility performance scalability and

    上传时间: 2015-07-02

    上传用户:784533221

  • DIGITAL IMAGERY is pervasive in our world today. Consequently, standards for the efficient represen

    DIGITAL IMAGERY is pervasive in our world today. Consequently, standards for the efficient representation and interchange of digital images are essential. To date, some of the most successful still image compression standards have resulted from the ongoing work of the Joint Photographic Experts Group (JPEG). This group operates under the auspices of Joint Technical Committee 1, Subcommittee 29, Working Group 1 (JTC 1/SC 29/WG 1), a collaborative effort between the International Organization for Standardization (ISO) and International Telecommunication Union Standardization Sector (ITUT). both the JPEG [1–3] and JPEG-LS [4–6] standards were born from the work of the JPEG committee. For the last few years, the JPEG committee has been working towards the establishment of a new standard known as JPEG 2000 (i.e., ISO/IEC 15444). The fruits of these labors are now coming to bear, as JPEG-2000 Part 1 (i.e., ISO/IEC 15444-1 [7]) has recently been approved as a new international standard.

    标签: Consequently efficient pervasive standards

    上传时间: 2013-12-21

    上传用户:源弋弋