搜索结果
找到约 16 项符合
complement 的查询结果
按分类筛选
编译器/解释器 Full support for extended regular expressions (those with intersection and complement); Support for
Full support for extended regular expressions (those with intersection and complement); Support for some kinds of cycles in grammar; DFA-based operation; Unicode support; C++ only, requires a modern compiler; Lexical analyzers can be configured to get symbols from any input class (built-in support f ...
VHDL/FPGA/Verilog it about using veriolog complement some project,thanks!
it about using veriolog complement some project,thanks!
Linux/Unix编程 mkdosfs - Make DOS file system utilty. I wrote this, partially to complement the dosfsck utilit
mkdosfs - Make DOS file system utilty.
I wrote this, partially to complement the dosfsck utility written by Werner
Almesberger (who graciously gave me some pointers when I asked for some
advice about writing this code), and also to avoid me having to boot DOS
just to create data partitions (I use ...
编译器/解释器 complement of multiplier
complement of multiplier
单片机编程 Using the Stellaris Microcontr
Luminary Micro Stellaris™ microcontrollers that are equipped with an analog-to-digital converter(ADC), use an innovative sequence-based sampling architecture designed to be extremely flexible,yet easy to use. This application note describes the sampling architecture of the ADC. Sinceprogrammer ...
单片机编程 微机原理与接口课件
微处理器及微型计算机的发展概况  第一代微处理器是以Intel公司1971年推出的4004,4040为代表的四位微处理机。      第二代微处理机(1973年~1977年),典型代表有:Intel 公司的8080、8085;Motorola公司的M6800以及Zlog公司的Z80。     第三代微处理机 第三代微机是以16位 ...
通信网络 MEMS 经典教材
The field of microelectromechanical systems (MEMS), particularly micromachinedmechanical transducers, has been expanding over recent years, and the productioncosts of these devices continue to fall. Using materials, fabrication processes, anddesign tools originally developed for the microelectronic ...
加密解密 What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the poss
What Does the code DO? Sometimes we may desire to hide our file contents from others.One of the possible way is encrypting these files.Here a simple encryption technique is used(In VB - The same technique can be implemented in "c" also.) Program flow Explained * Open the File to be encrypted for Bin ...
Linux/Unix编程 TinyLogin is a suite of tiny Unix utilities for handling logging into, being authenticated by, chan
TinyLogin is a suite of tiny Unix utilities for handling logging into,
being authenticated by, changing one s password for, and otherwise
maintaining users and groups on an embedded system. It also provides
shadow password support to enhance system security. TinyLogin is, as the
name implies, very s ...
VC书籍 本文从英文C–FAQ (2004 年7 月3 日修订版) 翻译而来。本文的中文版权为 朱群英和孙云所有。本文的内容可以自由用于个人目的
本文从英文C–FAQ (2004 年7 月3 日修订版) 翻译而来。本文的中文版权为
朱群英和孙云所有。本文的内容可以自由用于个人目的,但是不可以未经许可出
版发行。英文版权为Steve Summit 所有,详情见下面的英文版权说明。
The English version of this FAQ list is Copyright 1990-2004 by Steve Summit.
Content from the boo ...