虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

code-and

  • This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end

    This code detects memory leaks in embedded VC++ almost the same way crtdbg does in VC++. At the end of program execution it will display in the debug window if there were any memory leaks and how the memory looks so you can identify where your memory leak occurred. It will display in the debug window a message saying no memory leaks detected if there are no memory leaks. Similar to what crtdbg.h does in VC++. The code detects memory leaks generated with calls to new and delete operators in C++. The code doesn t detect memory leaks generated with C functions: malloc, calloc, free, but that can be done in the future. Let me know and I will program it.

    标签: the embedded detects almost

    上传时间: 2015-05-07

    上传用户:comua

  • This companion disc contains the source code for the sample programs presented in INSIDE VISUAL C++

    This companion disc contains the source code for the sample programs presented in INSIDE VISUAL C++ 5.0, as well as pre- compiled copies of the programs. To copy all of the sample code onto your hard disk, run the SETUP.EXE program and follow the instructions that appear on the screen. The sample code requires about 10 MB of hard disk space.

    标签: companion the presented contains

    上传时间: 2015-05-09

    上传用户:mhp0114

  • Mysql short course 1. Introduction to MySQL 2. MySQL and PHP 3. Database Queries 4. The Contact

    Mysql short course 1. Introduction to MySQL 2. MySQL and PHP 3. Database Queries 4. The Contacts Database – HTML, PHP and MySQL code

    标签: MySQL Introduction Database Contact

    上传时间: 2015-05-11

    上传用户:牛布牛

  • VHDL 关于2DFFT设计程序 u scinode1 ∼ scinode9.vhd: Every SCI node RTL vhdl code. The details can be

    VHDL 关于2DFFT设计程序 u scinode1 ∼ scinode9.vhd: Every SCI node RTL vhdl code. The details can be seen in the following section. u 2dfft.vhd: The top module includes these scinodes and form a 3x3 SCI Torus network, and it support these sub-modules scinode1∼ scinode9 reset and clk and global_cnt signals to synchronous the sub-modules to simplify the overall design. u proj2.wfc: VSS simulation result that is the same as the ModelSim simulation result. u Pro2_2.wfc: VSS simulation result of another test pattern can’t cause overflow situation.

    标签: scinode1 scinode details 2DFFT

    上传时间: 2014-12-02

    上传用户:15071087253

  • The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: he

    The tar file contains the following files: ptfsf.c: heart of the perfect TFSF code ptfsf.h: header file for same ptfsf-demo.c: FDTD code which demonstrates use of perfect TFSF code. Essentially this program used to generate results shown in the paper ptfsf-file-maker.c: code to generate an incident-field file using the "perfect" incident fields ptfsf-demo-file.c: FDTD code which uses the perfect incident fields stored in a file fdtdgen.h: defines macros used in much of my code Makefile: simple make-file to compile programs Also include are some simple script files to run the programs with reasonable values. The code assumes a two-dimensional computational domain with TMz polarization (i.e., non-zero field Ez, Hx, and Hy). The program is currently written so that the incident field always strikes the lower-left corner of the total-field region first. (If you want a different corner, that should be a fairly simple tweak to the code, but for now you ll have to make that tweak yourself.)

    标签: ptfsf following the contains

    上传时间: 2013-11-28

    上传用户:风之骄子

  • This a very simple Yee algorithm 3D FDTD code in C implementing the free space form of Maxwell s equ

    This a very simple Yee algorithm 3D FDTD code in C implementing the free space form of Maxwell s equations on a Cartesian grid. There are no internal materials or geometry. The code as delivered simulates an idealized rectangular waveguide by treating the interior of the mesh as free space/air and enforcing PEC (Perfect Electric Conductor) conditions on the faces of the mesh.

    标签: implementing algorithm Maxwell simple

    上传时间: 2015-05-14

    上传用户:水中浮云

  • I. Introduction This code exploits a previously undisclosed vulnerability in the bit string deco

    I. Introduction This code exploits a previously undisclosed vulnerability in the bit string decoding code in the Microsoft ASN.1 library. This vulnerability is not related to the bit string vulnerability described in eEye advisory AD20040210-2. Both vulnerabilities were fixed in the MS04-007 patch. II. Screenshots $ ./kill-bill.pl . kill-bill : Microsoft ASN.1 remote exploit for CAN-2003-0818 (MS04-007) by Solar Eclipse <solareclipse@phreedom.org> Usage: kill-bill -p <port> -s <service> host Services: iis IIS HTTP server (port 80) iis-ssl IIS HTTP server with SSL (port 443) exchange Microsoft Exchange SMTP server (port 25) smb-nbt SMB over NetBIOS (port 139) smb SMB (port 445) If a service is running on its default port you don t have to specify both the service and the port. Examples: kill-bill -s iis 192.168.0.1 kill-bill -p 80 192.168.0.1 kill-bill -p 1234 -s smb 192.168.0.1

    标签: I. vulnerability Introduction undisclosed

    上传时间: 2015-05-15

    上传用户:xhz1993

  • This is a serial mouse driver, which is compliant with Plug and Play, supports dynamic detection (vi

    This is a serial mouse driver, which is compliant with Plug and Play, supports dynamic detection (via serenum) and removal (either hotplug or via the device manager). The code serves as a sample for any serial-enumerable device. The behavior of the various routines is documented in the source code files.

    标签: compliant detection supports dynamic

    上传时间: 2015-05-16

    上传用户:dancnc

  • A collection of math routines including 8-bit, 16-bit, 32-bit signed and unsigned addition, subtract

    A collection of math routines including 8-bit, 16-bit, 32-bit signed and unsigned addition, subtraction, multiplication, and division. Very nice code library with heavy in-line documentation! Been looking for multi-byte divide? Here it is.

    标签: bit collection including addition

    上传时间: 2015-05-17

    上传用户:cursor

  • 十部经典算法合集 .chm Fundamentals of Data Structures by Ellis Horowitz and Sartaj Sahni PREFACE C

    十部经典算法合集 .chm Fundamentals of Data Structures by Ellis Horowitz and Sartaj Sahni PREFACE CHAPTER 1: INTRODUCTION CHAPTER 2: ARRAYS CHAPTER 3: STACKS AND QUEUES CHAPTER 4: LINKED LISTS CHAPTER 5: TREES CHAPTER 6: GRAPHS CHAPTER 7: INTERNAL SORTING CHAPTER 8: EXTERNAL SORTING CHAPTER 9: SYMBOL TABLES CHAPTER 10: FILES APPENDIX A: SPARKS APPENDIX B: ETHICAL CODE IN INFORMATION PROCESSING APPENDIX C: ALGORITHM INDEX BY CHAPTER

    标签: Fundamentals Structures Horowitz PREFACE

    上传时间: 2015-05-19

    上传用户:维子哥哥