Structure and Interpretation of Computer Programs0 码力 | 136 页 | 7.35 MB | 6 月前3
Neighborhoods Banding Together: Reasoning Globally about ProgramsNeighborhoods Banding Together Reasoning Globally about Programs Lisa LippincottThe code here is written in a fantasy C++, with extensions supporting local reasoning.void foo() implementation { … … … bar();0 码力 | 49 页 | 1.03 MB | 6 月前3
Bridging the Gap: Writing Portable Programs for CPU and GPU1/66Bridging the Gap: Writing Portable Programs for CPU and GPU using CUDA Thomas Mejstrik Sebastian Woblistin 2/66Content 1 Motivation Audience etc.. Cuda crash course Quiz time 2 Patterns Oldschool tell me about afterwards7/66 Motivation Patterns The dark path Cuda proposal Thank you Why write programs for CPU and GPU Difference CPU/GPU Algorithms are designed differently Latency/Throughput Memory sense? Scope of the talk7/66 Motivation Patterns The dark path Cuda proposal Thank you Why write programs for CPU and GPU Difference CPU/GPU Why it makes sense? Library/Framework developers Embarrassingly0 码力 | 124 页 | 4.10 MB | 6 月前3
SuperCharge Your IPC Programs With C++20 and CCI PatternRules • IPC stands for Intra-Process Communication • Programs stand for software running in a constrained environment ▪ CCI stands for: oContract oConcept oImplementationProblem Definition: Channel0 码力 | 57 页 | 7.11 MB | 6 月前3
Design patterns for error handling in C++ programs using parallel algorithms and executorsDesign patterns for error handling in C++ programs using parallel algorithms and executors Mark Hoemmen* mhoemmen@stellarscience.com CppCon 2020 * hoʊ’mən, or hœm’mən; he/himWho am I? • > 10 years0 码力 | 32 页 | 883.27 KB | 6 月前3
Casdoor · An Open Source UI-first Identity Access Management (IAM) / Single-Sign-On (SSO) platform supportingTrree ee User groups within an organization ? ? Passw Passwor ord Comple d Complexity xity Supporting different password complexity options. ? ? Account Cust Account Customization omization Customizing B2C Intr Introduction oduction Azure AD B2C is a customer identity access management solution, supporting standards like OpenID Connect, OAuth 2.0, and SAML. It allows the integration of consumer-facing Therefore, the process of using Casdoor for WeChat Mini Program is different from that of regular programs. This document will explain how to integrate Casdoor into WeChat Mini Program. You can find an0 码力 | 825 页 | 58.31 MB | 1 年前3
Celery v4.4.5 Documentationrequired to maintain such a system. It’s a task queue with focus on real-time processing, while also supporting task scheduling. Celery has a large and diverse community of users and contributors, you should can use periodic tasks for recurring events based on a simple interval, or Crontab expressions supporting minute, hour, day of week, day of month, and month of year. Read more…. Resource Leak Protection send monitoring messages (events) for actions occurring in the worker. These can be used by monitor programs like celery events, and Flower – the real-time Celery monitor, which you can read about in the Monitoring0 码力 | 1215 页 | 1.44 MB | 1 年前3
Celery 4.4.3 Documentationrequired to maintain such a system. It’s a task queue with focus on real-time processing, while also supporting task scheduling. Celery has a large and diverse community of users and contributors, you should can use periodic tasks for recurring events based on a simple interval, or Crontab expressions supporting minute, hour, day of week, day of month, and month of year. Read more…. Resource Leak Protection send monitoring messages (events) for actions occurring in the worker. These can be used by monitor programs like celery events, and Flower – the real-time Celery monitor, which you can read about in the Monitoring0 码力 | 1209 页 | 1.44 MB | 1 年前3
Celery v4.4.4 Documentationrequired to maintain such a system. It’s a task queue with focus on real-time processing, while also supporting task scheduling. Celery has a large and diverse community of users and contributors, you should can use periodic tasks for recurring events based on a simple interval, or Crontab expressions supporting minute, hour, day of week, day of month, and month of year. Read more…. Resource Leak Protection send monitoring messages (events) for actions occurring in the worker. These can be used by monitor programs like celery events, and Flower – the real-time Celery monitor, which you can read about in the Monitoring0 码力 | 1215 页 | 1.44 MB | 1 年前3
Celery v4.4.6 Documentationrequired to maintain such a system. It’s a task queue with focus on real-time processing, while also supporting task scheduling. Celery has a large and diverse community of users and contributors, you should can use periodic tasks for recurring events based on a simple interval, or Crontab expressions supporting minute, hour, day of week, day of month, and month of year. Read more…. Resource Leak Protection send monitoring messages (events) for actions occurring in the worker. These can be used by monitor programs like celery events, and Flower – the real-time Celery monitor, which you can read about in the Monitoring0 码力 | 1216 页 | 1.44 MB | 1 年前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100
相关搜索词
StructureandInterpretationofComputerProgramsNeighborhoodsBandingTogetherReasoningGloballyaboutBridgingtheGapWritingPortableforCPUGPUSuperChargeYourIPCWithC++20CCIPatternDesignpatternserrorhandlinginprogramsusingparallelalgorithmsexecutorsCasdoorAnOpenSourceUIfirstIdentityAccessManagementIAMSingleSignOnSSOplatformsupportingOAuth2.0OIDCSAMLCASCeleryv44.5Documentation4.44.6













