Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (2)
Linux kernel timers
4.0
Timer setting, to help us get an application execution time. You can help us observe the experiment is complex algorithm's time degree Practice how to write kernel call time measurement capabilities for measuring and precision timing applications, through this experiment: You can learn more about timing mechanism within Linux and the data results, and how to access the kernel of the control data from the user space of time. Principle: Before the main action of each user process executing a set time, after the main action is completed, the acquisition time, and so has been the main action of the execution time,
ruoshuisanqian
2016-08-23
0
1
RSA encryption algorithm
no vote
Rivest, Shamir and Adleman design an algorithm that can achieve asymmetric encryption. This algorithm uses three of them named, called RSA algorithm. From then until now, RSA algorithm has been the most widely "asymmetric encryption algorithm" uses. As long as there is a computer network where there is the RSA algorithm.
ruoshuisanqian
2016-08-23
2
1
No more~