虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

user-defined

  • This file contains board-specific information for the Motorola LoPEC in support of the lopec BSP. S

    This file contains board-specific information for the Motorola LoPEC in support of the lopec BSP. Specifically, this file contains information on any BSP interface changes from previous software or hardware versions, and contains caveats that the user must be aware of before using this BSP. Additionally, the target board s manual page entry (for example, lopec/target.nr) provides board-specific information necessary to run VxWorks, and should be read before this BSP is used.

    标签: board-specific information the Motorola

    上传时间: 2013-12-05

    上传用户:a673761058

  • SuperLU is a general purpose library for the direct solution of large, sparse, nonsymmetric systems

    SuperLU is a general purpose library for the direct solution of large, sparse, nonsymmetric systems of linear equations on high performance machines. The library is written in C and is callable from either C or Fortran. The library routines will perform an LU decomposition with partial pivoting and triangular system solves through forward and back substitution. The LU factorization routines can handle non-square matrices but the triangular solves are performed only for square matrices. The matrix columns may be preordered (before factorization) either through library or user supplied routines. This preordering for sparsity is completely separate from the factorization. Working precision iterative refinement subroutines are provided for improved backward stability. Routines are also provided to equilibrate the system, estimate the condition number, calculate the relative backward error, and estimate error bounds for the refined solutions.

    标签: nonsymmetric solution SuperLU general

    上传时间: 2017-02-20

    上传用户:lepoke

  • This taglib contains tags used to create struts input forms, as well as other tags generally useful

    This taglib contains tags used to create struts input forms, as well as other tags generally useful in the creation of HTML-based user interfaces. Many of the tags in this tag library will throw a JspException at runtime when they are utilized incorrectly (such as when you specify an invalid combination of tag attributes). JSP allows you to declare an "error page" in the <%@ page %> directive. If you wish to process the actual exception that caused the problem, it is passed to the error page as a request attribute under key org.apache.struts.action.EXCEPTION.

    标签: tags generally contains taglib

    上传时间: 2017-02-21

    上传用户:dianxin61

  • Freetz is a firmware-extension (modification) for the AVM Fritz!Box and devices with identical hardw

    Freetz is a firmware-extension (modification) for the AVM Fritz!Box and devices with identical hardware. The original firmware from the manufacturer is extended with new functions and programs which may be selected by the user

    标签: firmware-extension modification identical devices

    上传时间: 2014-12-08

    上传用户:qw12

  • The Software Engineering Institute’s (SEI) Capability Maturity Model (CMM) provides a well-known ben

    The Software Engineering Institute’s (SEI) Capability Maturity Model (CMM) provides a well-known benchmark of software process maturity. The CMM has become a popular vehicle for assessing the maturity of an organization’s software process in many domains. This white paper describes how the Rational Unified Process can support an organization that is trying to achieve CMM Level-2, Repeatable, and Level-3, Defined, software process maturity levels.

    标签: Engineering Capability well-known Institute

    上传时间: 2017-02-27

    上传用户:zhichenglu

  • Murphy 大俠 GPL 的 C++/x86 RTOS, 支持 MMU, 用戶/核心 模式區隔. http://hpc.ee.ntu.edu.tw/~murphy/me/EKernel.html

    Murphy 大俠 GPL 的 C++/x86 RTOS, 支持 MMU, 用戶/核心 模式區隔. http://hpc.ee.ntu.edu.tw/~murphy/me/EKernel.html part 2 of 3: user mode LIB

    标签: EKernel Murphy murphy RTOS

    上传时间: 2013-12-23

    上传用户:小鹏

  • Java technology is both a programming language and a platform. The Java programming language origina

    Java technology is both a programming language and a platform. The Java programming language originated as part of a research project to develop advanced software for a wide variety of network devices and embedded systems. The goal was to develop a small, reliable, portable, distributed, real-time operating platform. When the project started, C++ was the language of choice. But over time the difficulties encountered with C++ grew to the point where the problems could best be addressed by creating an entirely new language platform. Design and architecture decisions drew from a variety of languages such as Eiffel, SmallTalk, Objective C, and Cedar/Mesa. The result is a language platform that has proven ideal for developing secure, distributed, network-based end-user applications in environments ranging from network-embedded devices to the World-Wide Web and the desktop

    标签: programming language Java technology

    上传时间: 2014-01-03

    上传用户:huangld

  • Windows Mobile NLED driver proxy. Created for customization of incoming call ring vibration. While

    Windows Mobile NLED driver proxy. Created for customization of incoming call ring vibration. While original Windows Mobile ring vibration constant vibrating during all ring, this driver help to apply any user vibrating pattern.

    标签: customization vibration incoming Windows

    上传时间: 2017-03-07

    上传用户:498732662

  • This project demonstrates the use of secure hash functions technique to implement a file encryption

    This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.

    标签: demonstrates encryption functions implement

    上传时间: 2017-03-08

    上传用户:xuanchangri

  • This project demonstrates the use of secure hash functions technique to implement a file encryption

    This project demonstrates the use of secure hash functions technique to implement a file encryption / decryption system. This implemented application can encrypt / decrypt multiple files on the fly using a password. The password supplied by the user is used as the source message from which the hash code (key) is generated using the SHA algorithm. Then this key is used to enctypted the data in the file(s). This key is stored in the encrypted file along with the encrypted data.

    标签: demonstrates encryption functions implement

    上传时间: 2014-01-10

    上传用户:yyq123456789