Location:
Search - memmanager
Search list
Description:
Platform: |
Size: 9694 |
Author: |
Hits:
Description: 内存泄漏管理,介绍内存泄漏的避免方法-memory leakage management, memory leakage on the ways to avoid
Platform: |
Size: 10007 |
Author: 张三 |
Hits:
Description: 这是操作系统中的内存管理的全部debug程序,可移植性非常强,可以在VC中调试,仅供学习,请勿用于商用-This is the operating system of all the memory management debug procedures, portability is very strong. the VC debugging, is for learning, do not for business
Platform: |
Size: 24732 |
Author: Xuan Yang |
Hits:
Description: 操作系统实验
动态形象模拟内存管理
Platform: |
Size: 31768 |
Author: 乃牛 |
Hits:
Description: 内存泄漏管理,介绍内存泄漏的避免方法-memory leakage management, memory leakage on the ways to avoid
Platform: |
Size: 9216 |
Author: 张三 |
Hits:
Description: 这是操作系统中的内存管理的全部debug程序,可移植性非常强,可以在VC中调试,仅供学习,请勿用于商用-This is the operating system of all the memory management debug procedures, portability is very strong. the VC debugging, is for learning, do not for business
Platform: |
Size: 186368 |
Author: Xuan Yang |
Hits:
Description: 操作系统实验
动态形象模拟内存管理
-Experimental simulation of dynamic image of the operating system memory management
Platform: |
Size: 1888256 |
Author: 乃牛 |
Hits:
Description: 在分页管理方式下采用位示图来表示主存分配情况,模拟实现主存分配和回收-In the paging management method used under Bitmap to represent the distribution of main memory, analog realization of main memory allocation and recovery of
Platform: |
Size: 126976 |
Author: 杨子辰 |
Hits:
Description: memory manager vhdl code
Platform: |
Size: 3072 |
Author: SHRAVAN GARLAPATI |
Hits:
Description: 内存管理相关操作,演示Global函数的使用和演示堆的使用.-Memory management, demonstrates the use of the global functions and demonstrate the use of.
Platform: |
Size: 4469760 |
Author: Quantity |
Hits:
Description: 生成一个由随机产生的字符型数据组成大的数据文件(例如,大小≥1GB)。将该文件中的所有字节进行倒放,存入原文件,即将文件中的首字节与尾字节对换,次字节与次尾字节对换,以此类推。
编写两个程序,一个程序采用常规的文件访问方法,另一个程序采用内存映射文件方法。 请记录两种方法完成字节倒放所需要的时间,并进行比较。
-Generate a random character data generated by the formation of large data files (for example, the size of ≥ 1GB). All the bytes in the file upside down, into the original file, is about the first byte of the file and tail bytes on the exchange, and sub-sub-byte Last byte swapping, and so on. Write two programs, one program file access using conventional methods, another program using memory-mapped file method. Record the time to complete the two methods of bytes needed to rewind and compared.
Platform: |
Size: 9719808 |
Author: Liuning |
Hits: