• No results found

[PDF] Top 20 Source Code Comparison of DOS and CP/M

Has 10000 "Source Code Comparison of DOS and CP/M" found on our website. Below are the top 20 most common "Source Code Comparison of DOS and CP/M".

Source Code Comparison of DOS and CP/M

Source Code Comparison of DOS and CP/M

... ing code element (statements, comments and strings, and identifiers) can be found on the ...typical code comparison, this focuses attention on those elements that can be found in both programs but ... See full document

38

22Disk 1 34 Sep90 pdf

22Disk 1 34 Sep90 pdf

... Exit to DOS Set CP/M diskette type Set CP/M diskette drive Copy CP/M files to DOS Copy DOS files to CP/M Format a CP/M diskette Display a CP/M directory Display type CP/M files Erase CP/[r] ... See full document

32

Rainbow Handbook 1984 pdf

Rainbow Handbook 1984 pdf

... Since both the Rainbow 100B and the Rainbow 100+ run software on both the MS-DOS and CP/M-86/80 operating systems, the applications that run on the Rainbow 100B also run on the Rainbow 1[r] ... See full document

354

Scalable Source Code Similarity Detection in Large Code Repositories

Scalable Source Code Similarity Detection in Large Code Repositories

... similar source code ranging from textual to semantic similarity ...the source representations they work ...raw source code, with minimal transformation, is used to perform a pairwise ... See full document

11

Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks

Seluge: Secure and DoS-resistant code dissemination in wireless sensor networks

... new code image to the nodes in a wireless sensor net- work is commonly referred to as code ...and DoS-resistant code dissemination system named Seluge for wireless sensor ...open ... See full document

11

Computational study of antenna coupling and wave propagation in helicon plasma sources

Computational study of antenna coupling and wave propagation in helicon plasma sources

... resistance comparison with the ...For comparison, the dominant kz s were taken from the code calculated spectra of the antenna radiation ...the code does not include the effects of finite ... See full document

136

Review of Literature for Code Duplication and Refactoring of Code Clones

Review of Literature for Code Duplication and Refactoring of Code Clones

... textual comparison of the source code which helps in the detection of type IV functional clones in a procedure oriented programming language source code like C has been ...open ... See full document

11

Windows, Linux, Mac Operating System and Decision Making

Windows, Linux, Mac Operating System and Decision Making

... Linux is free and open-source software based on kernel software where the kernel is nothing but the main part of the Linux operat- ing system. The fame of Linux operating system has mainly arisen because of ... See full document

5

Augmenting source code with software metrics

Augmenting source code with software metrics

... A source code editor is comprised of a number of elements; at the most basic level, this consists of a representation of a document that contains lines of ...features, source code editors may ... See full document

63

Code Reuse in Open Source Software

Code Reuse in Open Source Software

... through code reuse from other ...open source software is to solve a technical problem by writing software code and getting feedback from other users (von Hippel, 2001; Hertel et ...open source ... See full document

35

Recommendations for Datasets for Source Code Summarization

Recommendations for Datasets for Source Code Summarization

... The dataset we use in this paper is based on the dataset provided by LeClair et al. (LeClair and McMillan, 2019) in a pre-release. We used this dataset because it is both the largest and most re- cent in source ... See full document

7

Simulations of cold electroweak baryogenesis: dependence on the source of CP violation

Simulations of cold electroweak baryogenesis: dependence on the source of CP violation

... the source of effective ...specific CP-violating term explicitly biasing Chern-Simons ...scalar-gauge CP-violating terms, involving both the Higgs field and another dynamical scalar coupled to SU(2) ... See full document

17

The use of artificial neural networks in classifying lung scintigrams

The use of artificial neural networks in classifying lung scintigrams

... Table of Contents Appendix 1 Source Code of Image Processing System Appendix 2 Source Code of MA TI..AB Functions Created for Study Appendix 3 Source Code of C Programs Created for Unix [r] ... See full document

286

Molecular and crystal structures of Cp*M(S2N2) (M = Co, Rh, Ir) and related compounds

Molecular and crystal structures of Cp*M(S2N2) (M = Co, Rh, Ir) and related compounds

... TLC analysis of the crude mixture suggested decomposition of 4 on both silica and alumina. However, small amounts of pure 4 were obtained by a careful elution with an acetone/toluene (1:2) mixture from a silica column. ... See full document

19

An Improved Java Programming Learning System Using Test-Driven Development Method

An Improved Java Programming Learning System Using Test-Driven Development Method

... testing source codes at the same time [1]. In the TDD method, a test code should be written be- fore writing a source ...test code is a program code to verify the correctness of the ... See full document

6

Phishing Analysis in URL Using Machine Learning

Phishing Analysis in URL Using Machine Learning

... of source code of XcodeGhost to find the detailed information of the malware mechanism, the other is scanning the source code of iPhone Application (IPA) packages to detect the infected ...the ... See full document

10

DeltaBASIC Reference Manual May1985 pdf

DeltaBASIC Reference Manual May1985 pdf

... Source Language: 8080 Assembly 8086/8088 under development Operating Systems Supported: CP/M-80, MP/M-80, TurboDOS Recommended Memory Size: 48K minimum Essential Terminal Capabilities: C[r] ... See full document

130

Analysis of Source Code: A Case Study

Analysis of Source Code: A Case Study

... The third scenario is more complicated and is presented in Figure 5. After a request is accepted from a permitted host, the proxy is ready to authenticate the user. The client process simulates a user entering the system ... See full document

15

Another Look At Copyright Protection of Software: Did the 1980 Act Do Anything For Object Code?, 3 Computer L.J. 1 (1981)

Another Look At Copyright Protection of Software: Did the 1980 Act Do Anything For Object Code?, 3 Computer L.J. 1 (1981)

... In transforming source code to object code, some source code statements may wholly disappear, while some object code statements may have no counterpart in the source c[r] ... See full document

19

The asymmetric Kerr metric as a source of CP violation

The asymmetric Kerr metric as a source of CP violation

... parameterise CP violation but it does not account for the origin of the ...when CP violation was first discovered in the neutral Kaons an external galactic vector field was considered, but was dis- counted ... See full document

5

Show all 10000 documents...