I. g ++ compile the method with template. Failed err: Undefined reference to. The link function cannot be found.
Cause: G ++ is not perfect, and g ++ does not support separation and compilation of template classes.
. H defined this way
Template
Example: go to the cinema to watch a movie ---- see "Beijing meets Seattle", in Beijing
How to find a movie that is near the place where you live and to be watched tomorrow
A: In the beginning, I thought like this: Looking for a cinema, Baidu:
1. in LinuxIt is easy to delete these directories. The command is as follows:Find.-type d-name ". svn" | xargs rm-rf
Or
Find.-type d-iname ". svn"-exec rm-rf {}\;
2. Use the following methods in Windows:
1. Execute the doscommand in the project
Document directory
Vector
List
Deque
Container
A collection of objects of the same type. Common member functions of these containers: empty () determines whether there are elements in the container. max_size () indicates the maximum number of
Blocking and non-blocking
Blocking and non-blocking means whether the process needs to wait when the data accessed by the process is not ready. Simply put, this is equivalent to the implementation difference within the function, that isWhether to
OpenSSL
OpenSSL is not just SSL. It can implement message digest, file encryption and decryption, digital certificates, digital signatures and random numbers. There are a lot of content about the OpenSSL library, which is far from an
# Include # include # include // 1. the scope pointer // it exclusively occupies a dynamically allocated object. The corresponding class name is boost: scoped_ptr, which is defined in boost/scoped_ptr.hpp. Unlike std: auto_ptr, a scope pointer
Memory Pool
"Pool" is a design pattern often used in computer technology. Its connotation is to apply for the core resources frequently used in the program and put them in a pool, it is managed by the program itself, which can improve resource
Command mode
In Command mode, a request is encapsulated into an object (Command) and the request receiver is stored in a reciver in a specific ConcreteCommand class, in this way, the call object and the specific implementation of the operation are
Bridge Mode
Separate the abstract part from its implementation part so that they can all change independently.
Analysis
1. Abastrction: an abstract class, which is implemented by Implementor.
2. Implementor: the abstract base class of the
Problem
In the analysis and design process of the object-oriented system, we often encounter the following situation: for a business logic (Algorithm Implementation), different details are implemented in different objects, however, the logic
What is a COM component?
Com is the abbreviation of Component Object Model. The COM component is an executable code that is published in the Win32 dynamic link library (DLL) or executable file (exe ).What is guid
Globally Unique Identifier (guid --
Factory Mode
Many materials, also known as FactoryMothed (Factory method), are mainly used to create objects. When a new class is added, the previous system code is not affected.The core idea is to use a factory to generate different classes based
Problem
During OO design and development, the following situations may occur frequently: we need to add new responsibilities (Operations) for a defined class ), in general, we will define a new class to inherit the custom class, but solving this
Because the Flash cannot be read when the internal Flash is erased, otherwise the Flash will be stopped. Under normal circumstances, the interrupt vector table and the interrupt processing function are stored in Flash. Therefore, when the internal
Hardware environment: TG STK
Effect: the LED lights flash once every 1 second. Timer uses the basic timing method.
# Include # Include # Include "efm32.h"# Include "efm32_chip.h"# Include "efm32_cmu.h"# Include "efm32_timer.h"# Include "efm32_gpio.
Although the ECB encryption mode of AES is simple and conducive to parallel computing, and the error will not be transmitted, it also has obvious disadvantages. For example, the plaintext mode cannot be hidden, and active attacks can be performed on
Configure the usart module to the most basic SPI mode. No interruption. It is sent in an endless loop.
Example:
# Include # Include # Include "efm32.h"# Include "efm32_chip.h"# Include "efm32_cmu.h"# Include "efm32_gpio.h"# Include
# Include # include static int maid (unsigned int Regno, unsignedInt red, unsigned int green, unsigned int blue, unsigned int transp, struct fb_info * info); struct LCD _regs {unsigned long lcdcon1; unsigned long lcdcon2; unsigned long lcdcon3;
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service