从左到右交换所有位来修改由重编二进制比较器组成表1。
The modification to Listing 1 consists of rewiring the binary comparator with all the bits swapped from left to right.
例如,标准的JAR文件和一个使用Pack200打包的JAR文件,这两个制品版本的二进制比较是有差异的……
For example, the standard JAR, a JAR packed using Pack200, the binary diff between two versions of the artifact, ...
因而值得注意的是,虽然认证方法的选择对于提高二进制文件输入性能并不是特别重要,但是在其它领域可能比较重要。
It is therefore worth noting that while the choice of authentication method is not particularly important in improving performance with binary files, it may be important in other areas.
您可以将这与二进制、非自描述的和难于跟踪的CORBA和DCOM协议进行比较。
Contrast this with the CORBA and DCOM protocols, which are binary, not self-describing, and tough to trace.
尽管XML的词汇像OpenOffice XML一样未得到很好的归档并且比较紊乱,但依然比使用过去那种晦涩难解的二进制格式要轻松上千倍。
Even when the XML vocabulary is as poorly documented and incoherent as OpenOffice XML, it's still about a thousand times easier to work with than previous opaque binary formats.
该脚本之所以要花费那么多时间,是因为它实际上要将整个二进制文件的副本导出到本地磁盘,以进行比较。
The script takes so much time because it actually involves exporting a full copy of the binary to the local disk for comparison.
为进行这个测试,我们将Subversion服务器宿主在各种不同的机器上,并比较将二进制文件导入每种机器上的Subversion服务器所需的时间。
For this test, we hosted the Subversion server on a variety of machines and compared the time required to import binaries into each one.
对认证方法的调查是使用不同认证方法时比较将二进制文件移入Subversion所需的时间。
The investigation into authentication methods was carried out by comparing the authentication method against the time taken to move the binaries into Subversion.
输入模拟信号立即与所有的参考电压通过一串高速比较器进行比较,高速比较器用于产生二进制输出。
The analog signal is compared with all the reference voltages at once by a string of high-speed comparators whose outputs are used to generate the binary output.
首先,比较了文本XML与二进制XML特征,接着比较三种二进制XML编码方式,最后指出进一步的研究方向。
The features of textual XML and binary XML are compared, then some encoding schemes are compared, and finally future research topics are pointed out.
简要介绍TTCM技术及符号MAP算法,并比较了二进制MAP算法与符号MAP算法的差别。
First it introduces TTCM and MAP algorithm and then compares the difference between binary MAP and Symbol by Symbol MAP.
比较两个文本文件,MAT文件,二进制文件或活页夹。
对于十六进制比较,您可以指定每行和对齐方式,以确保从不同的系统二进制文件是真正相同的字节数。
For Hex Compare, you can specify the number of bytes per line and the alignment to ensure that binary files from different systems are truly identical.
我们如何比较两个双字节二进制数8085 ?
最后,对该检测方法与传统二进制积累检测算法就检测性能给予比较。
Finally, comparisons for detection performance between this algorithm and conventional binary integration detection algorithm are also given by simulation.
此算法只扫描一遍数据库,并且二进制数的位运算速度比候选集与事务记录的比较运算速度要快得多。
This algorithm scans the data base only once and the speed of binary operation is faster than the speed of comparison of item sets and transactions.
十六进制的值和非数字做比较时,会被当做二进制串。
Hexadecimal values are treated as binary strings if not compared to a number.
通过对DAC结构的比较,决定采用分段式电流舵结构,其中高5位采用温度计码,低3位采用二进制译码。
After compared some structures of DAC, the segmented architecture of current-steering DAC is adopted. The 5 MSBS are thermometer code weighed and the 3 LSBS are binary-weighted.
把原单词和替换词分别代入SHA - 1算法运算,通过比较摘要信息的大小而确定原单词与替换词各表示的二进制值。
Then these two words will be sent to SHA-1 for digest calculation, the results of which will decide the binary values of both words.
和基于指令比较的二进制文件比较方法相比,二进制文件结构化比较方法更注重二进制文件在逻辑结构上的变化,而且更加简单。
Comparing with the comparing method of binary files based on instructions, this method is less complex and pays more attention to the logical structure change of binary files.
同时,与等价编码速率的二进制ld P C码进行了性能比较,分析了多进制ldpc码的纠错性能和译码复杂度。
Their performance is compared with that of binary LDPC codes with same coding rates over AWGN channel by BPSK modulation and 8psk modulation.
与字符格式比较起来,二进制编码格式可以在较少的空间储存较多的信息。
Binary formats are often used to store more information in less space than possible in a character format file.
计算该模型的误字率和通信效率、并与门限型判决模型和二进制传输系统作了比较。
The detection characteristics of this system are made clear by comparing it with a threshold type decision model and ordinary systems.
分析结果表明:在译二进制码时,时域算法的运算量较少、实现比较容易;
The decoding in time domain is shown be simpler in a binary system;
二进制搜索算法虽然识别效率比较高,但是泄露信息比较多,安全性比较差。
The identification of the binary search algorithm is more efficient. This algorithm exposes information and has poor security.
通过逐步计算的方法对两个实例进行了比较,并给出二进制编码和BCD编码的特点。
Comparison between the two examples by calculating step by step, the characters of binary code and BCD code are show.
然后根据离散时间双稳态系统,设计了处理常值二进制信号的接收器结构,在一些非高斯噪声下对接收器的检测性能与匹配滤波器进行了比较分析。
The receiver structure based on discrete-time bistable system is designed for the constant binary signal detection, and it is compared with the matched filter in some cases of non-Gaussian noise.
通过对二进制文件结构化比较方法的研究,提出了基于有向图的二进制文件结构化比较方法及实现算法。
After researched structural comparing methods of binary files, a new structural comparing method of binary files based on directed graph is presented.
对几种改进的遗传算法进行了比较、分析、综合后,提出了一种基于二进制编码的改进遗传算法。
To deal with the deficiency in symbol code and binary code in genetic neural network, a new hybrid code method is proposed on the basis of binary code.
对几种改进的遗传算法进行了比较、分析、综合后,提出了一种基于二进制编码的改进遗传算法。
To deal with the deficiency in symbol code and binary code in genetic neural network, a new hybrid code method is proposed on the basis of binary code.
应用推荐