Zobrazeno 1 - 10
of 203
pro vyhledávání: '"Debug menu"'
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 39:492-505
Due to the ever increasing complexity of hardware systems, designers strive for higher levels of abstractions in the early stages of the design process. Modeling hardware at the electronic system level (ESL) is one way to address this demand, with th
Publikováno v:
Proceedings of the Institute for System Programming of the RAS. 32:97-114
The paper presents a debugger for parallel programs in С/C++, or FORTRAN, which are executed in high-performance computers. The debugger’s program components and mechanism of their interaction are described. The graphic user’s interface capabili
Autor:
Louis Salin, Rami Morrar
Publikováno v:
Game Development with MonoGame ISBN: 9781484277706
Your long journey of learning the MonoGame framework has finally come to an end. You covered a lot in this book—from dev tools, such as a debug mode and a window rendering component to make a level editor, to gameplay experience enhancements, like
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::23816debca64b982c05f6a812f6d49b3
https://doi.org/10.1007/978-1-4842-7771-3_9
https://doi.org/10.1007/978-1-4842-7771-3_9
Autor:
Hubert Henry Ward
Publikováno v:
Programming Arduino Projects with the PIC Microcontroller ISBN: 9781484272329
This chapter is designed to take away some of the mystery of C programming. We will look at some obscure instructions and analyze how they work and we will use the debugging mode of MPLABX to confirm our analysis. We will then look at some of the mor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::28c0436640efcf0f0a611b24fdaeb46d
https://doi.org/10.1007/978-1-4842-7230-5_14
https://doi.org/10.1007/978-1-4842-7230-5_14
Publikováno v:
IEEE Access, Vol 7, Pp 178321-178330 (2019)
Android system attackers have proposed various attack schemes to invade users' privacy. One way is to use ADB (Android Debug Bridge) with advanced permissions but low protection. In order to set up an ADB connection successfully, the USB debugging op
Autor:
Richard Swinbank
Publikováno v:
Azure Data Factory by Example ISBN: 9781484270288
The relationship between the ADF UX, Git, and your development data factory, first introduced in Chapter 1, is shown in Figure 10-1. In subsequent chapters, you have been authoring factory resources in the ADF UX, then saving them to the Git reposito
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e97440cc63a056457dded539f74b9560
https://doi.org/10.1007/978-1-4842-7029-5_10
https://doi.org/10.1007/978-1-4842-7029-5_10
Autor:
Sergei Skorobogatov
Publikováno v:
2020 IEEE Physical Assurance and Inspection of Electronics (PAINE).
This paper introduces a new vulnerability found in a low-cost secure authentication IC that stores its security settings in non-volatile memory (NVM). Such devices are widely used for prevention of counterfeiting in consumable products and accessorie
Autor:
Alexander Ivannikov
Publikováno v:
Recent Research in Control Engineering and Decision Making ISBN: 9783030652821
Digital system simulation on the architecture level is considered, i.e. instruction set and internal register changes emulation. Emulators is used for embedded software debugging and in the design process of new special processor development. The req
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8c9555f4ea9eb542ca6e581a354c08a8
https://doi.org/10.1007/978-3-030-65283-8_18
https://doi.org/10.1007/978-3-030-65283-8_18
Autor:
Abakumov, P M Dovgalyuk
Publikováno v:
Труды Института системного программирования РАН, Vol 30, Iss 3, Pp 87-92 (2018)
When programs are analyzed for the presence of vulnerabilities and malicious code, there is a need for a quality isolation of the analysis tools. There are two reasons for this. At first, the program can influence the tool environment. This problem i
Publikováno v:
Sensors, Vol 21, Iss 4660, p 4660 (2021)
Sensors (Basel, Switzerland)
Sensors
Volume 21
Issue 14
Sensors (Basel, Switzerland)
Sensors
Volume 21
Issue 14
In this paper, a new method for gaining the control of standalone underwater sensor nodes based on sensing the power supply evolution is presented. Underwater sensor networks are designed to support multiple extreme scenarios such as network disconne