initial working phase of the design of said editor,
featuring multicasting, advanced linux keyboard handling,
sub-hierarchical expansion, and multiple cursors (similar
to the concept found in moonedit). The author respectfully requests your compliance with the GPL
This a collection of sample processes that provide examples ranging from
how to use a particular BPEL activity such as pick or scope, to more complex
examples of processes that invoke external Web services or show techniques
such as handling multiple start messages.
Mobile phones are constantly decreasing in size, thereby complicating the acoustical
functionality. Signal processing methods can be used to partially mitigate
this problem. In this paper we suggest a method which uses multiple spectral
subtraction functions and two microphones, introducing only a short signal delay.
These two classes show an extremely simple example of java.net socket programming. They implement the Unix daytime protocol, an extremely simple protocol that consists entirely of the server sending its current local time and date to the client as an ASCII string. The server, to keep it very simple, does not use multiple threads. This code requires JDK 1.1 or later, but can easily be adapted to JDK 1.0.
About:
hamsterdb is a database engine written in ANSI C. It supports a B+Tree index structure, uses memory mapped I/O (if available), supports cursors, and can create in-memory databases.
Release focus: Major feature enhancements
Changes:
This release comes with many changes and new features. It can manage multiple databases in one file. A new flag (HAM_LOCK_EXCLUSIVE) places an exclusive lock on the file. hamsterdb was ported to Windows CE, and the Solution file for Visual Studio 2005 now supports builds for x64. Several minor bugs were fixed, performance was improved, and small API changes occurred. Pre-built libraries for Windows (32-bit and 64-bit) are available for download.
Author:
cruppstahl
xl2tpd a Layer 2 Tunneling Protocol (L2TP) daemon. It supports IPsec SA reference tracking, which enables the IPsec stacks to support multiple l2tp clients behind the same NAT router and multiple l2tp clients on the same internal IP address. It is a fork of "l2tpd".
Release focus: Minor feature enhancements
Changes:
Support for passwordfd, a workaround for some Cisco routers, and extended logging.
A stochastic-flow network consists of a set of nodes, including source nodes which supply various resources and sink nodes at which
resource demands take place, and a collection of arcs whose capacities have multiple operational states.
water temperature control system uses the Single Chip Microcomputer to carry on temperature real-time gathering and controling. DS18B20, digitized temperature sensor, provides the temperature signal by "a main line". In -10~+85℃ the scope, DS18B20’s inherent measuring accuracy is 0.5 ℃. The water temperature real-time control system uses the electricity nichrome wire carring on temperature increiseament and operates the electric fan to realize the temperature decrease control. The system has the higher measuring accuracy and the control precision, it also can complete the elevation of temperature and the temperature decrease control.
In a preemptive priority based RTOS, priority inversion
problem is among the major sources of deadline
violations. Priority inheritance protocol is one of the
approaches to reduce priority inversion. Unfortunately,
RTOS like uC/OS can’t support priority inheritance
protocol since it does not allow kernel to have multiple
tasks at the same priority. Although it has different ways
to avoid priority inversion such as priority ceiling
protocol, developers still have some difficulties in
programming real time applications with it. In this paper,
we redesign the uC/OS kernel to provide the ability to
support round robin scheduling and implement priority
inheritance semaphore on the modified kernel. As result,
we port new kernel with priority inheritance semaphore to
evaluation board, and evaluate the execution time of each
of the kernel service as well as verify the operations of
our implementation.
This library allows creating, modifying and extracting zip archives in the compatible way with PKZIP (2.5 and higher) and WinZip. Supported are all possible operations on the zip archive: creating, extracting, adding, deleting files from the archive, modifications of the existing archive. There is also the support for creating and extracting multiple disk archives (on non-removable devices as well) and for password encryption and decryption. This module uses compression and decompression functions from zlib library by Jean-loup Gailly and Mark Adler.