サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
ドラクエ3
www.cl.cam.ac.uk/~jdy22
www.cl.cam.ac.uk/~mgk25
These shapes were even sanctioned by an early US version of the ISO 646 standard (ANSI X3.4, also known as ASCII), which defined 0x27 as “apostrophe (closing single quotation mark; acute accent)”, but they should already have been changed when the fonts were extended to cover ISO 8859-1, which added a separate acute accent at 0xB4. One obviously cannot have both 0x27/0x60 and 0x60/0xB4 as mutually
www.cl.cam.ac.uk/~lp15
ML for the Working Programmer, 2nd Edition Publication details Published by Cambridge University Press, July 1996. Publisher's information available. ISBN 052156543X Also on Amazon.com and Amazon.co.uk In response to recent requests, and with the agreement of Cambridge University Press, I have decided to make the full text of the book available in PDF. It remains copyright material and may be down
www.cl.cam.ac.uk/~sd601
The classic X Window System bitmap fonts are now available in an ISO 10646-1/Unicode extension. We have extended all the "-misc-fixed-*" fonts: 5x7 -Misc-Fixed-Medium-R-Normal--7-70-75-75-C-50-ISO10646-1 5x8 -Misc-Fixed-Medium-R-Normal--8-80-75-75-C-50-ISO10646-1 6x9 -Misc-Fixed-Medium-R-Normal--9-90-75-75-C-60-ISO10646-1 6x10 -Misc-Fixed-Medium-R-Normal--10-100-75-75-C-60-ISO10646-1 6x12 -Misc-Fi
www.cl.cam.ac.uk/~rmf25
www.cl.cam.ac.uk/~pes20
www.cl.cam.ac.uk
In this tutorial, we will be building a circuit to connect a temperature sensor to our Raspberry Pi, and writing a program to read the sensor data. The circuit we will build is going to connect to the Raspberry Pi using the GPIO pins. GPIO stands for General Purpose Input/Output. General purpose because all they are is simple connections that can be either high or low, a binary choice. This means
I've written a third edition of Security Engineering. The e-book version is available now for $44 from Wiley and Amazon; paper copies are available from Amazon here for delivery in the USA and here for the UK. You can also download the chapters for free here: Preface Chapter 1: What is Security Engineering? Chapter 2: Who is the Opponent? Chapter 3: Psychology and Usability Chapter 4: Protocols Ch
This document summarises some known mappings of C/C++11 atomic operations to x86, PowerPC, ARMv7, ARMv8, and Itanium instruction sequences. These are collected for discussion, not as a definitive source. At the moment, we do not include mappings for all atomic operations - for example, atomic increment is missing. We would be grateful for any suggestions. ARMv8 has additional instructions: stores
What is Firmament? For more on Firmament, visit the Firmament website. Firmament is a cluster manager, similar to Mesos or Kubernetes, but its key feature is a new approach to task scheduling. Firmament makes high-quality placement decisions at very low scheduling delay. To make good decisions, Firmament models the scheduling problem as a minimum-cost optimisation over a flow network (as in Quincy
Guaranteed latency in datacenter networks QJump offers a range of network service levels, from guaranteed latency for low-rate, latency-sensitive network coordination services to line-rate throughput for data intensive services. See how it works » Ready to deploy QJump is implemented as a single kernel module using the Linux TC interface and a simple application utility to configure unmodified bin
If you are not redirected automatically, follow the link
The Trojan Room Coffee Machine Click here for an up to date picture of the Trojan Room coffee machine. About this service This service was created as the first application to use a new RPC mechanism designed in the Computer Laboratory - MSRPC2. It runs over MSNL (Multi-Service Network Layer) - a network layer protocol designed for ATM networks. A video capture board in an Acorn Archimedes grabs on
A Mechanised Proof of Gödel’s Incompleteness Theorems using Nominal Isabelle Lawrence C. Paulson Abstract An Isabelle/HOL formalisation of Gödel’s two incompleteness theorems is presented. The work follows Świerczkowski’s detailed proof of the theorems using hered- itarily finite (HF) set theory [32]. Avoiding the usual arithmetical encodings of syntax eliminates the necessity to formalise elem
www.cl.cam.ac.uk/~srk31
Diverting trains of thought, wasting precious time Tue, 07 Oct 2014 Seven deadly sins of talking about “types” [Update: this article has been translated into Japanese!] My essay “In Search of Types” attempts to be a dispassionate review of some of the different concepts, purposes and attitudes surrounding the word “type” in programming. I imagine that my passions are still rather thinly veiled in
www.cl.cam.ac.uk/~dao29
The requested URL was rejected. Please consult with your administrator. Your support ID is: < 2864104463989637528> [Go Back]
The requested URL was rejected. Please consult with your administrator. Your support ID is: < 5202146270797613642> [Go Back]
This course has not yet been updated to work with the Raspberry Pi models B+ and A+. Some elements may not work, in particular the first few lessons about the LED. It has also not been updated for Raspberry Pi v2. Welcome to Baking Pi: Operating Systems Development! Course by Alex Chadwick. This website is here to guide you through the process of developing very basic operating systems on the Rasp
Our Database of Faces, (formerly 'The ORL Database of Faces'), contains a set of face images taken between April 1992 and April 1994 at the lab. The database was used in the context of a face recognition project carried out in collaboration with the Speech, Vision and Robotics Group of the Cambridge University Engineering Department. There are ten different images of each of 40 distinct subjects.
次のページ
このページを最初にブックマークしてみませんか?
『Department of Computer Science and Technology |』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く