- 博客(27)
- 资源 (20)
- 收藏
- 关注
原创 用异或交换两个变量的分析
题目: 试用异或(xor)操作交换两个变量而不使用其他临时变量。捯饬一下,看看你能不能搞定它! 用异或交换两个变量,其实很简单,只要记住异或的特性:设Y为一个二进制的bit位,对于异或 ( xor ) 操作则有: Y xor 0 = Y ; Y
2011-07-31 20:03:28 1322
转载 Peripherals and busses
Computer Science from the Bottom UpPrevChapter 3. Computer Architecture for BeginnersNextPeripherals and bussesPer
2011-07-31 15:46:07 862
转载 Memory
Computer Science from the Bottom UpPrevChapter 3. Computer Architecture for BeginnersNextMemoryMemory Hierarchy
2011-07-31 15:18:35 664
转载 Chapter 3. Computer Architecture for Beginners
Computer Science from the Bottom UpPrev NextChapter 3. Computer Architecture for BeginnersTable of ContentsThe C
2011-07-31 14:38:09 1138
转载 Exercises
Computer Science from the Bottom UpPrevChapter 2. Binary and Number RepresentationNextExercisesWrite all 16
2011-07-31 11:52:02 740
转载 Types and Number Representation
Computer Science from the Bottom UpPrevChapter 2. Binary and Number RepresentationNextTypes and Number Representatio
2011-07-30 22:56:43 1279
转载 Out-of-order execution
Out-of-order executionFrom Wikipedia, the free encyclopedia In computer engineering, out-of-order execution (OoOE or OOE) is a paradigm used
2011-07-26 15:36:54 3595
转载 Barrier (computer science)
Barrier (computer science)From Wikipedia, the free encyclopedia Jump to: navigation, search Contents[hide]1 Threads synchronization primiti
2011-07-26 15:00:14 1180
转载 Memory barrier
Memory barrierFrom Wikipedia, the free encyclopediaJump to: navigation, search This article does not cite any references or sources. Please
2011-07-26 13:57:25 1615
转载 Spinlock
SpinlockFrom Wikipedia, the free encyclopediaJump to: navigation, search In software engineering, a spinlock is a lock where the thread simp
2011-07-26 13:19:24 896
转载 Chapter 2. Binary and Number Representation
Computer Science from the Bottom UpPrev NextChapter 2. Binary and Number RepresentationTable of ContentsBinary -- the basis of computingType
2011-07-25 22:43:01 1111
转载 Linux kernel 3.0
Linux 3.0Summary:Besides a new version numbering scheme, Linux 3.0 also has several newfeatures: Btrfs data scrubbing and automatic defragme
2011-07-22 15:41:14 1278
转载 The 3.0 kernel is out
The 3.0 kernel is out[Posted July 22, 2011 by corbet] The 3.0 kernel is out [Kernel] Posted Jul
2011-07-22 15:34:34 640
转载 A JIT for packet filters
A JIT for packet filters By Jonathan CorbetApril 12, 2011 The BerkeleyPacket Filter (BPF) is a mechanism for the fast fi
2011-07-22 15:26:15 1118
转载 the examples :how to use LP_SOLVE.EXE
LP_SOLVE.EXEDownload lp_solve.exe (115K) LP1, LP3, LP4, LP5, F2, F3 (examples from the examples sheet)lp_solve.zip (zipped file
2011-07-21 21:20:21 967
转载 LP_SOLVE: Linear Programming Code
LP_SOLVE: Linear Programming CodeThe non-commercial linear programming code of choice appears to be lp_solve, written in ANSI C by Michel Be
2011-07-21 21:13:55 1370
转载 解决线性规划的工具(the tool of solving linear programming problem):lp-solve
软件包: lp-solve (5.5.0.13-7) lp-solve 的相关链接 下载源码包 lp-solve:[lp-solve_5.5.0.13-7.dsc][lp-solve_5.5.0.13.orig-docs.tar.gz][lp-solve_5.5.0.13.ori
2011-07-21 21:06:32 2231
转载 Standard File Descriptors
Computer Science from the Bottom UpPrevChapter 1. General Unix and Advanced CNextStandard File DescriptorsEvery running program under Unix s
2011-07-19 22:57:37 633
转载 Abstraction and function pointers
Computer Science from the Bottom UpPrevChapter 1. General Unix and Advanced CNextAbstraction and function pointersTo a programmer, reading d
2011-07-19 22:50:18 694
转载 Chapter 1. General Unix and Advanced C
Computer Science from the Bottom UpPrev NextChapter 1. General Unix and Advanced CTable of ContentsEverything is a file!Abstraction and func
2011-07-19 22:46:39 586
转载 About the course
Computer Science from the Bottom UpPrevIntroductionNextAbout the courseThe course is broken up int 10 distinct modules which I have planned
2011-07-19 22:44:33 640
转载 Introduction
Computer Science from the Bottom UpPrev NextIntroductionTable of ContentsWelcomeAbout the courseWelcomeWelcome to Computer Science from the
2011-07-19 22:42:10 615
转载 Computer Science from the Bottom Up
Computer Science from the Bottom UpWhat is it?In a sentence, a 10 week course teaching low level computer science fundamentals.PhilosophyStu
2011-07-19 22:38:55 1102
转载 RTMP: Real Time Messaging Protocol
Real Time Messaging ProtocolFrom Wikipedia, the free encyclopediaJump to: navigation, search Real Time Messaging Protocol (RTMP) was initial
2011-07-15 10:39:13 2959
转载 The Third Wave of Push Technology will be coming
Push Technology, Comet, and WebSockets: 10 years of history from Lightstreamer's perspectiveby Alessandro Alinone (originally published
2011-07-14 20:10:39 921
转载 正确理解充分必要性及其在数学求解中的应用
正确理解充分必要性及其在数学求解中的应用 正确理解充分必要性 充分必要条件的定义,大家应该比较熟悉,但对好多初学者,有时候不太容易弄明白它的真正含义。 我们说,若由A可以推出B,即 A=>B ,则称A是B的充分条件,B是A的必要条件。若A、B用集合表示,其关系如右图所示,即
2011-07-09 10:22:51 2615
原创 远程解决centos的网络问题: service network start 出现RTNETLINK answers: File exists错误解决
service network start 出现RTNETLINK answers: File exists错误解决 或者/etc/init.d/network start 出现RTNETLINK answers: File exists错误解决 (呵呵,
2011-07-03 22:32:31 6366
Verilog HDL IEEE Std 1364-2001
2012-11-22
The Mathematics of the RSA Public-Key Cryptosystem
2012-01-05
RSA_theory :RSA的数学原理
2012-01-05
stm32f10x_fw_archive.zip
2012-01-02
STM32F10X在Keil MDK环境下在RAM中调试的设置方法.pdf
2012-01-02
stm32f10x标准固件库的帮助文档(stm32f10x_stdperiph_lib_um.chm)
2012-01-02
MySQL中文参考手册-chm格式┊Mysql官方权威教程.rar
2008-12-03
空空如也
TA创建的收藏夹 TA关注的收藏夹
TA关注的人