搜索资源列表
vrb
- A simple solution of Virtual Ring Buffer, you can use it as a common command.
xfx_ZBuffer
- Z—Buffer扫描转换,对OBJ面片文件进行2D显示-Z—Buffer
z_buffer
- 消除隐藏面算法。z-buffer 扫描线算法.-Elimination of hidden surface algorithms. z-buffer scan line algorithm.
CustomCEdit
- 这个类实现了如下功能 字体 背景色 字色 一框多色字 有些BUG 但可为大家提供一个思路 一框多色应用了双缓冲-This class implements the following features: custom font/custom background color/multi-color edit box. There may be BUGs but it can provide you an idea. Multi-color edit box uses double frame b
transpose_buffer
- verilog source code for transpose buffer 8x8 matrics
Wind
- arcgis engine geoprocessing make route event layer and buffer exemples
FIFO24_CS8416[1]
- Fifo buffer vhdl code
query-buffer
- arcgis engine 制作缓冲区查询-arcgis engine production buffer query
Design-Low-Speed-Buffer-For-Usb
- Design Low Speed Buffer For Usb
buffer
- cshap做的arcgis缓冲区分析源码-Buffer Analysis code
buffer
- it is matlab code about buffer.it is very useful for electrical students . it is about how buffer works and its visulasation
Linux-TCPIP-Socket-Buffer(sk_buff-)
- Linux TCPIP 协议栈的关键数据结构Socket Buffer(sk_buff ).pdf-Linux TCPIP stack of critical data structures Socket Buffer (sk_buff). Pdf
buffer
- 采用Vb语言,利用AE开发的缓冲区分析功能-Vb language used, the use of AE buffer analysis function development
Buffer-overflow
- 用c写的一个缓冲区溢出的小程序, 很简单哦,哈哈 -Use a buffer overflow c write a small program, very easy Oh, ha ha
buffer
- 用MAPGIS 组件和VB编程语言实现了缓冲区分析的源程序。- buffer analysis
buffer-operation-code
- 该代码是关于缓冲区操作的源代码 ,对于内存管理的学习具有指导作用-buffer operating source code
Copy-Files-With-Buffer
- 利用缓冲进行文件复制,对于理解缓冲如何进行复制文件法是好的实例,在VS2005上编译通过,希望提供给大家,共同进步。-The use of buffer to copy files, for copying files to understand how the buffer is a good instance method, the VS2005 compiled through, we want to provide to the common progress.
Buffer
- 缓冲区分析初步实现,采用C#加Ae二次开发,功能可能不全!-buffer accomplished by C#
buffer-overruns
- 介绍缓冲区溢出及攻击方法,同时也涉及到如何防护缓冲区溢出-describe buffer overruns and how to attack process by it.
Buffer-overflow-attacks
- 关于缓冲区溢出相关,简单的介绍一些缓冲区溢出的知识点,以及利用方式-Buffer Overflow Attacks