Various 80386 software package and programming tools are introduced. The Phar Lap 80386 assembly-language development package 386 ASM/386 LINK which includes 4 programs, 386 ASM. EXE macroassembler;386 LINK. EXE, a li...
详细信息
Various 80386 software package and programming tools are introduced. The Phar Lap 80386 assembly-language development package 386 ASM/386 LINK which includes 4 programs, 386 ASM. EXE macroassembler;386 LINK. EXE, a linker;MINIBUG. EXE, a program debugger;and RUN 386. EXE, a protected mode runtime environment for 32-bit 80386 applications.
PSEUDO-PROLOG is an interactive programming environment allowing the development of programs made up of procedural and declarative modules. While the former are written in the language PSEUDO, the latter are PROLOG pr...
详细信息
PSEUDO-PROLOG is an interactive programming environment allowing the development of programs made up of procedural and declarative modules. While the former are written in the language PSEUDO, the latter are PROLOG predicates. The PSEUDO-PROLOG environment is currently being used to implement an expert system.
DOTSYS III is a computer program to translate inkprint into braille as automatically as possible. The occasional flaws in its translation can be removed by human intervention or, in some situations, simply left in as ...
详细信息
DOTSYS III is a computer program to translate inkprint into braille as automatically as possible. The occasional flaws in its translation can be removed by human intervention or, in some situations, simply left in as an acceptable level of ″misprints″ .
A methodology is developed that lets one design 'generic' software;for most IBM-PC-compatible machines that use MS-DOS. The procedures are presented that permit the programs automatically to take advantage of ...
详细信息
A methodology is developed that lets one design 'generic' software;for most IBM-PC-compatible machines that use MS-DOS. The procedures are presented that permit the programs automatically to take advantage of PC hardware features. The programs will know when they can write directly to video memory or access the IBM BIOS low-memory variables. If the program encounters a machine it does not know, it can decide whether certain features exist for it to use or whether it should treat the new machine as generic until that machine's features can be incorporated into the next release of the software. Some methods are described that allow user-selectable compatibility.
Three key factors often determine the success or failure of a software project: the management of the project, the selection of personnel, and the development methodology that is used. The important considerations tha...
详细信息
Three key factors often determine the success or failure of a software project: the management of the project, the selection of personnel, and the development methodology that is used. The important considerations that should be addressed in each of these areas are discussed, and the results of a typical project that paid attention to these factors are examined. In particular, it was concluded that a good development methodology can help ensure the reliability, maintainability and timeliness of any software project.
This paper discusses research into programming measurements, with emphasis on one phase of that research: a search for a method of estimating programming productivity. The method is aimed at measuring the rate of prod...
详细信息
This paper discusses research into programming measurements, with emphasis on one phase of that research: a search for a method of estimating programming productivity. The method is aimed at measuring the rate of production of lines of code by projects, as influenced by a number of project conditions and requirements.
Visual programming makes setting up of data-acquisition systems fast, simple and fun. The article discusses how this is accomplished and includes a selection of visual programming data-acquisition software products pr...
详细信息
Visual programming makes setting up of data-acquisition systems fast, simple and fun. The article discusses how this is accomplished and includes a selection of visual programming data-acquisition software products presented in tabular form for easier comparison. MS Windows is the most popular environment, but its interrupt latency can threaten data integrity in high-speed and control-system applications. Different approaches to solving this problem are presented.
The best known algorithm for modular exponentiation M**e . mod t for arbitrary M, e and t is of O(n**3) where n is the number of bits in the largest of M, e and t. This paper presents an O(n**2) algorithm for the prob...
详细信息
The best known algorithm for modular exponentiation M**e . mod t for arbitrary M, e and t is of O(n**3) where n is the number of bits in the largest of M, e and t. This paper presents an O(n**2) algorithm for the problem where M**e mod t is required for many values of M and e with constant t. Some preprocessing is done on t, and the results are applied repeatedly to different values of M and e. The main algorithm involves on-line arithmetic in a redundant number system. An immediate application is in encoding/decoding of messages in an RSA-based public-key cryptosystem.
暂无评论