Is executed by the shell, then passed to the kernel, which is typically slower than a compiled binary program that is pure machine code. 由shell执行,然后传递给内核,这个过程通常比编译为纯机器码的二进制程序慢。
The bash shell contains two types of commands: builtins, which are internal, and external programs ( or external filters and commands), which are typically self-contained binary program files. bashshell包含两类命令:内部的内置命令和外部程序(或外部筛选器和命令,它们通常是自含的二进制程序文件)。
UML is a kernel patch that allows the Linux kernel to be compiled into a binary that you can run as a normal program. UML是一个内核补丁,它可以将Linux内核编译成为一个二进制文件,然后您可以像运行一个普通的程序一样去运行这个内核。
This type can be created from a file containing an SPE binary or embedded into a PPE program using the ppu-embedspu utility. 这个数据类型可以从一个包含SPE二进制的文件中创建,或使用ppu-embedspu工具嵌入到PPE程序中。
Binary program transformation has played an important role in reverse program analysis. 二进制程序转换作为软件逆向分析的主要手段发挥着积极作用。
Given a sequence of binary trees, you are to write a program that prints a level-order traversal of each tree. 给定一个二叉树序列,你要写一个程序将每棵树按层序访问并打印出来。
A binary output program of the compiler that is optional at compile time. 编译程序输出的一种二进制目标输出程序,在编译时可以进行选择是否输出这种表。
Binary code execution path based on symbolic and actual program execution 基于符号执行与实际执行的二进制代码执行路径分析
This data structure is the description of a binary tree JAVA program. 这是数据结构中的描述二叉树的一个JAVA程序。
Binary Package: A package which contains a program suitable for one particular architecture. 包含适合一个特定架构的程序的软件包。
But for now, lets just keep the algorithm binary to make your first program easy. 但是现在,为了保证你的第一个程序的简单,让我们保持算法的二元性。
Since a procedure is a basic unit of most analysis algorithms, a virus writer can defeat static analysis by making it harder to identify a procedure unit in binary program. 由于过程是大多数分析算法的基本单位,所以病毒作者会设法使得识别二进制程序中的过程更加困难从而挫败静态分析。
Of the programs available whenever you distribute a binary copy of the program; that provision of the license ensures that any user will be able to modify the software. 随著二进位拷贝一起发布许可证的这项规定确保任何使用者都可以修改软体。
This is a simple binary tree class that I wrote while writing a PDA program. 这是一个简单的二进制树类,我在写一写掌上电脑程序。
Component object model is a software criterion based on binary system standard and is independent on the program language. COM是一种基于二进制标准与编程语言无关的软件规范。
Important idea of the algorithm is to extend all over the binary tree, The simple program may be obtained from the algorithm. 处理算法的核心是对二叉树的先序遍历,据此可以得到简捷的算法及程序。
Application of optimal binary tree in multi-branch program design 最优二叉树在多分支结构程序设计中的应用
The Al-Pd binary system has been thermodynamically assessed by means of the computer program Thermo-Calc. 本文利用Thermo-Calc软件对Al-Pd二元体系进行了热力学评估。
This paper study the Parallelism technique of serial code for windows, based on the interface of windows programming, the binary legacy code can be used in PVM program environment. 本文系统研究了windows平台下串行程序的并行化技术,基于目前windows系统的接口技术,提出了Pvm环境下二进制串行遗产软件的利用方法。
Based on the fractal theory, from fractal fundamental theory, the computing method of binary fractal of gridding dimension was put forward and dimension computing program was worked out. 基于分形理论,从分形基本原理出发,提出了网格维数的二进分形计算方法,编制网格维数的计算程序。
The mathematical model of discrete optimal design of structures of RCCP is established, and introduced a binary algorithm on the ( 0,1) program. 建立了适合钢筋混凝土地下埋管的离散变量模型,并给出了计算该(0,1)规划的一种二进制算法。
The paper first introduced the algorithm of optimal binary tree, and how to make use of optimal binary tree to optimize multi-branch program design was discussed in the case study of object classification. 文章介绍了最优二叉树算法,以现实中实物分类为例讨论了在多分支程序设计中,如何运用最优二叉树算法优化程序设计。
Static method does not require the actual operation of the program, but obtains the analysis result by semantic analysis and certain rules ( rules are obtained by artificial definition or machine learning) to the source code or binary form program. 静态法不需要程序的实际运行,而是通过语法语义分析,通过一定的规则(人工定义或机器学习)对程序源码或二进制进行得出分析结果。
Now there are two remote attestation programs: binary remote attestation program and property-based remote attestation program. 当前的远程证明方案主要有二进制远程证明方案和基于属性的远程证明方案。
The proposed method detects the behavior of malicious codes by tracking the behavior of binary program, monitoring the changes in memory and registers and performing formal analysis in intermediate language level. 该方法通过对二进制程序行为进行跟踪,监视内存和寄存器的变化,在中间语言层对程序行为进行形式化分析,从而达到对恶意代码分析检测的目的。
And the dynamic library support technique is the key way that makes dynamic binary translation system capable of running the practical program. 而动态库支持技术是可重定向动态二进制翻译系统能够支持实际应用程序的关键技术。
It is responsible for translating floating point instructions of the front-end executable binary program into target instructions of back-end platform, making the corresponding logic to be executed in the back-end processor. 它负责翻译前端可执行程序中的浮点指令,使得相应逻辑能够在后端处理器上正确执行。
Using the standard case library as test samples, this program can successfully achieve binary bit-stream files, which proves the fine combinability of the assembling program with other modules of FPGA supporting software system and the ability of completing the auto-design of FPGA. 通过以标准例库作为测试实例,该工具能够成功的得到二进制位流文件。实验证明本文所设计的汇编工具可以与FPGA支持软件系统的其它模块很好的结合在一起,完成FPGA的自动化设计。
Analysis on executable binary code is an important approach to analyze behavior of program, and it is also a main way to detect malware. 可执行二进制代码的分析是分析程序行为特征的重要手段,是检测恶意代码的主要措施。