小窓モード

プレミアム

ログイン
設定

設定

「byte」の共起表現一覧(1語右で並び替え)

該当件数 : 139



San Jose Sharks telecasts, does work for Shark Byte, a magazine-style show centering on the San Jos
He also presented The Big Byte, a programme on Sunday lunchtimes on its succes
ible much like items of an array: a$[0] (length byte); a$[1] (first character in string a$).
O-646 compliant coded character set) taking one byte and a character belonging to G1 (taken by a 94x
increasing one byte and decreasing another byte by the same amount
ficant group of 7 bits are encoded in the first byte and the most significant bits are in the last b
The game's level counter was a single 8-bit byte and could therefore store only 256 distinct val
hence Japanese cannot be encoded using only one byte, and Japanese is thus encoded using two or more
he most devastating wars known to mankind, Blue Byte, as a German company, developed Historyline to
facturers began to standardize around the 8-bit byte as their smallest datatype.
is predicted one bit at a time (rather than one byte at a time).
ded by C libraries often copy far more than one byte at a time, relying on bit math to detect if the
y allocate message space on their disk, one hex byte at a time.
r produce more destructive viruses known as the Byte Bandit and the Byte Warrior.
Byte Bandit is a computer virus created for the Comm
Byte Bandit made no attempt to disguise itself as mo
o a disk, which is in the text string "Virus by Byte Bandit in 9.87.
As a result, the 8-bit byte became the de facto datatype for computer syste
ially a version of XMODEM-CRC using larger 2048 byte blocks, as opposed to XMODEM's 128 byte blocks.
A single byte can contain up to 8 separate truth bits, making
Double Byte Character Set
searches) such that they are encoded as double byte characters
Boys' Byte CII class competition at the 2010 Summer Youth
Blore has competed in the Byte class dinghy for the past seven years.
, in which a source program was "compiled" into byte code called "PPCODE" (Push-Pop Code), for a vir
Serenity uses dynamic byte code manipulation to add coverage code to class
t AWK implementation by Mike Brennan based on a byte code interpreter.
nalysis is performed before running, nor is any byte code translation applied.
The compiler converts the source code into byte code that can be interpreted by a Warren abstra
ming language's Java Virtual Machine (JVM), the byte code used in GNU Emacs for compiled LISP code,
unwind' to a valid state and then interpret the byte code instructions correctly.
lete AML programs which were then compiled into byte code and interpreted by a runtime interpreter.
platform independence (Java's byte code, for example)
lows for the compilation of Lisp code into Java byte code, and also provides the ability to use Lisp
ETC code can be viewed as a kind of byte code; it is a compact description of the compil
Magic front end include one that generates Java byte codes (called AppletMagic), one that generates
Next Byte Codes (NBC) is a simple language with an assemb
Opcodes can also be found in so called byte codes and other representations intended for a
ch is short for Not eXactly C, is based on Next Byte Codes, an assembly language.
un fast enough to beat Systronics figure of 15M byte codes/sec.
the internet, as protocols often use big endian byte coding by default.
t 223 more times (255 - 32), bringing the total byte comparisons to 7,168 (32 * 224).
This will do 31 successful byte comparisons, a 1 byte comparison that fails and
ber, Source or Destination ports, Packet Count, Byte count, or First or Last Packet Times.
ects I/O analysis data, like open file handles, byte counters etc
It reduces byte counts so efficiently that it can compress a la
Java's primitive byte data type is always defined as consisting of 8
conflicts, no such games were created, as Blue Byte decided to develop the more successful Battle I
Every byte defines the pixel pattern for a column.
One byte, defining the message flags.
One byte, defining the message type (Reply, Request, Fra
- fill 128 Byte EEPROM With 5x7 font data -- Not all characters
uch as the exact size of certain data types and byte endianness.
r in the C programming language is a fixed-size byte entity, which at one time was large enough to s
man radio like the Online-Grimme Awards winners Byte FM and the independent radio station FSK (Freie
cher Rundfunk, Freies Sender Kombinat (FSK) and Byte FM.
to the above "best" case is a needle of an 'a' byte followed by 31 'z' bytes in a haystack consisti
ory map (at $00-$1F), with values stored as low byte followed by high byte.
Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable
Integral minifloats in one byte have a greater range of ±122880 than twos compl
The second line defines a 10 byte hexadecimal field with a length equal to the fi
Each bytecode opcode is one byte in length, although some require parameters, re
-0201 (ASCII, code set 0) is represented by one byte, in the range 0x21 - 0x7E.
each encrypted message begins with a random ten byte initialization vector (IV).
The fact that BRK and COP are actually two byte instructions facilitates the technique of treat
The byte is also defined as a data type in certain progr
Snake Byte is a 1982 computer game published by Sirius Sof
en only 256 different values can be stored in a byte, it is impossible to store characters from Unic
ately the fact that a character was stored in a byte led to the two terms being used interchangeably
Netstrings store the byte length of the data that follows, making it easi
Storing the string length as byte limits the maximum string length to 255.
the current directory by creating a hidden 247 byte long read-only COM file with the same base name
The HCS can be a byte long (as in Wimax) or 16 bit for cable modems.
h the additional alpha output the program is 14 byte long.
In 1984 he became an editor at Byte Magazine and in 1985 he left to become a report
s for the influential microcomputer publication Byte magazine spanning over a decade.
Benchmarks published by BYTE Magazine suggested that MacBASIC had better per
eeler (1952-2006) in the December 1977 issue of BYTE magazine on undocumented opcodes.
( -Byte Magazine)
ure was printed in the December 1980 edition of Byte Magazine.
he 384 and 512 bit variants work with a 4 by 36 byte matrix.
User file system on centralized Tera byte mega store
She was 2nd in the 2002 Byte National championships, and has competed and ra
char str_buf; // One extra byte needed
uSIMP/muMATH-79 Symbolic Math system, a Review, BYTE, Nov. 1980, p. 324
n and Adi Shamir who showed that the 2nd output byte of RC4 was heavily biased toward zero .
write machine code and optimize literally every byte of the program.
er will simply say "CP3!" and then play a sound byte of legendary pro wrestler Ric Flair's famous "W
used the media descriptor value from the first byte of FAT to determine file system parameters inst
support package that can do things like write a byte of output on a serial port, or read a sector fr
This means that if you change one byte of a 100 GB file, only the changed byte or bloc
Zmax does not encode each byte of data like Zmodem does.
rotate the player's perspective using only one byte of data.
h each keystroke recorded typically consuming a byte of memory.
respondent for the technology programme The Big Byte on BBC Radio.
ors claim performance of up to 25.66 cycles per byte on an Intel Core 2 Duo.
ors claim performance of up to 23.06 cycles per byte on an Intel Core 2 Duo in 64-bit mode.
are efficiency, achieving up to 36.2 cycles per byte on an Intel Family 6 Model 15 Xeon 5150, and up
For example byte or short values were stored on 4 bytes of memor
Most continuous data protection solutions save byte or block-level differences rather than file-lev
Sometimes a whole byte or longer character variable is used for this p
The least significant bit defines the byte order (0 - big endian, 1 - little endian).
Each FC frame begins with a 4 byte ordered set, called an SOF (Start of Frame), an
MM is for Motorola, which uses big endian byte ordering, so the magic number is 4D 4D 00 2A.
II is for Intel, which uses little endian byte ordering, so the magic number is 49 49 2A 00.
2 as a two-byte integer in little or big endian byte ordering.
ard Lenna image it produces an output file of 1 byte, otherwise implementing a standard JPEG, GIF or
orithm usually involves statistical analysis of byte patterns.
storage units such as wchar_t, or more than one byte per character such as UTF-8, are used.
void - zero byte quantity
Byte Range Serving
nd (1996) and From Here to There (1998) for the Byte Records label in Antwerp, Belgium.
ause of the Shift-In, Shift-Out codes parsing a byte sequence from the middle is hard.
n of in-process data structures to and from the byte sequence, which is transmitted over the network
This is due to the large percentage of invalid byte sequences in UTF-8, so that text in any other e
s-users deduplication so shared common files or byte sequences are synchronized without actually tra
Byte serving and chunking are compatible with or wit
unsigned and signed 8-bit integer types: CHAR, BYTE, SHORTINT
Some code points in this page require a second byte, so characters use either 8 or 16 bits for enco
byte state;
XML to Data: the output document is a byte stream.
ramming, a netstring is a formatting method for byte strings that uses a declarative notation to ind
ssed (read or write) as each record being an 80 byte text string, or as 40 2 character numerical fie
ry, so for example, kibibyte means a kilobinary byte, that is 1024 bytes.
to be any length with only the overhead of one byte; the alternative of storing a count requires ei
He also hosted WWE's premier web show, WWE Byte This!, which was canceled in 2006.
Pacman, which results from the use of a single byte to store the internal level counter.
problem by utilizing the eighth bit in an 8-bit byte to allow positions for another 128 characters.
small, and thus it is possible to use only one byte to encode one English character.
n finished the master can continue with another byte transfer or pull SS high to end the transfer
T9400, Fugue-256 runs at 16 cycles per byte using SSE4.1 instructions.
le by prefixing the string with the length as a byte value - a convention used in many Pascal dialec
nk, such as messages containing newlines or the byte value 0. CTCP does not establish a direct conne
For example, XML may not contain certain byte values and requires a nontrivial combination of
Appearance of byte values 0x40-0x7E as second bytes of code words
ata type is 2 bytes, and the general purpose 16 byte Variant data type can be converted to a 12 byte
Part of the Thalion team went on to Blue Byte, which produced the graphically-similar game Al
that needs to be only one bit long (within any byte) whose value is either 1 or 0 - representing TR
wever, Shift JIS only guarantees that the first byte will be high bit set (0x80-0xFF); the value of
                                                                                                    


こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する
英→日 日→英
こんにちは ゲスト さん

ログイン

Weblio会員(無料)になると

会員登録のメリット検索履歴を保存できる!

会員登録のメリット語彙力診断の実施回数増加!

無料会員に登録する

©2024 GRAS Group, Inc.RSS