查询词典 two-address code
- 与 two-address code 相关的网络例句 [注:此内容来源于网络,仅供参考]
-
Attached to this article, you will find two zip files containing the source code of each section.
附于本文章,你会发现两个zip文件包含在每一部分的源代码。
-
In the last two lectures, we talked about the principle of virtual machine, accidence analyzing, and the realizing method of code creating.
在系列活动的前两场,我们深入体会了虚拟机的原理以及编译器的词法分析和代码生成部分的实现方式。
-
To the middle of 2007 is plannedthe releaseof processors generation K8L with four and two cores, witch come withthe divided cache inthe third level: they are known to us under the code names agena and Kuma respectively.
预计到2007年年中释放k8l四代处理器和两个核心巫开同分在第三级缓存:我们知道他们是在代号Agena和库玛。
-
He still expresses, these two systems are based on identical Linux and Webkit code, because this is put in amalgamative possibility.
他还表示,这两个系统都基于相同的Linux和Webkit代码,因此存在合并的可能性。
-
A common form of Jewish cryptogram, the Atbash Cipher was a simple substitution code based on the twenty-two-letter Hebrew alphabet.
作为犹太人密码中的一种常见形式,埃特巴什码是以22个希伯来字母为基础的简单替换编码。
-
Bandelet used for image segmentation Matlab code for two categories of images, three types of images, 4 Image style.
用bandelet进行图像分割的matlab代码,适合2类图像,3类图像,4类图像的风格。
-
Then, in 1996, a man named Chris Nystrom took that code, and ported it to Standard C. However, it was a very literal port (much like Mr. Birken's C# version): virtually all variables are global, maintaining their cryptic one or two letter names, and nearly all functions pass their parameters and return values using global variables.
然后,在1996年,名为克里斯尼斯特伦1名男子的代码,并把它移植到标准长不过,这是一个非常字面端口(很像比尔肯先生的C#版):几乎所有的变量是全局,保持其神秘的一个或两个字母的名字,几乎所有的功能,通过其参数和返回值使用全局变量。
-
There are two major types of branchless logic code emitted by popular compilers.
目前流行的编译器中无分支逻辑优化的主要方法一共有两个。
-
This fertilizer does not contain specified risk material, which consists of the following code and the part of ileum that is within two meters from the intestinum caecum.
这种肥料不包含指定的危险物质。这些危险物质包括以下代码和存在于动物盲肠道2米以内的物质。
-
To use Clicky, you need to sign-up to the service and insert two lines of HTML code to your blog or website template , as simple as that.
使用clicky ,您需要登录的后续服务,并插入两条线的HTML代码到您的博客或网站模板,就这麼简单。
- 推荐网络例句
-
This one mode pays close attention to network credence foundation of the businessman very much.
这一模式非常关注商人的网络信用基础。
-
Cell morphology of bacterial ghost of Pasteurella multocida was observed by scanning electron microscopy and inactivation ratio was estimated by CFU analysi.
扫描电镜观察多杀性巴氏杆菌细菌幽灵和菌落形成单位评价遗传灭活率。
-
There is no differences of cell proliferation vitality between labeled and unlabeled NSCs.
双标记神经干细胞的增殖、分化活力与未标记神经干细胞相比无改变。