搜索资源列表
Shabake_bisim
- wireless network include topology an any constraint may be occured in such networks well described in this file
NSGA-II-in-C-with-gnuplot-v1.1.6.tar
- for Linux only- 64-bit bug for binary coding fixed): NSGA-II in C with gnuplot (Real + Binary + Constraint Handling)-for Linux only- 64-bit bug for binary coding fixed): NSGA-II in C with gnuplot (Real+ Binary+ Constraint Handling)
DexVerify
- Dalvik classfile verification. This file contains the verifier entry points and the static constraint checks.
DrmConstraintInfo
- This class provides interfaces to access the DRM constraint.
lightweight-aes
- Light-weight AES implementation for ressource constraint devices like Radio Frequency Identification (RFID) and wireless sensors network
DrmConstraintInfo
- This class provides interfaces to access the DRM constraint.
SQLiteConstraintException
- An exception that indicates that an integrity constraint was violated.
SQLIntegrityConstraintViolationException
- An exception, which is subclass of SQLNonTransientException, is thrown when various the an integrity constraint (foreign key, primary key or unique key) has been violated.
msr
- both i386 and x86_64 returns 64-bit value in edx:eax, but gcc s A constraint has different meanings. -both i386 and x86_64 returns 64-bit value in edx:eax, but gcc s A constraint has different meanings.
dm-btree-remove
- A very important constraint for our btree is that no node, except the root, may have fewer than a certain number of entries.
usercopy_64
- no memory constraint because it doesn t change any memory gcc knows about.
i915_gem_context
- This a HW constraint. The value below is the largest known requirement I ve seen in a spec to date, and that was a workaround for a non-shipping part. It should be safe to decrease this, but it s more future proof as is. -This is a HW constraint. T
hwc
- Incrementally try to add our supported layers to hardware windows. If adding a layer would violate a hardware constraint, force it into the framebuffer and try again. -Incrementally try to add our supported layers to hardware windows. If adding a
fenv_h
- Apparently the b register constraint is like r except that it disallows the use of r0, which means it is safe to use in places where the appearance of r0 would cause a problem due to it being read as zero. -Apparently the b register constraint is
db_image_homography
- Compute the linear constraint on H obtained by requiring that the ratio between coordinate i_num and i_den of xp is equal.
usercopy_64
- no memory constraint because it doesn t change any memory gcc knows about.
zlueh20
- 阵列信号处理中用最小约束矩阵实现二维到达角的估计,不错的-Array signal processing using minimum constraint matrix to achieve two-dimensional doas estimation, pretty good
gjodp-constraint
- 猫吃老鼠问题的算法程序的VC完整应用程序代码,()