- decremented
- Decremented
Большой англо-русский и русско-английский словарь. 2001.
Большой англо-русский и русско-английский словарь. 2001.
Garbage collection (computer science) — This article is about garbage collection in memory management. For garbage collection in an SSD, see garbage collection (SSD). For other uses, see garbage collection. In computer science, garbage collection (GC) is a form of automatic memory… … Wikipedia
FRACTRAN — is a Turing complete functional esoteric programming language invented by the mathematician John Conway. FRACTRAN programs are given as a list of fractions which are applied to a single argument p as follows: #multiply p by each fraction fnof; in … Wikipedia
Brainfuck — Not to be confused with Brain Fuck Scheduler. brainfuck Paradigm(s) esoteric Appeared in 1993 Designed by Urban Müller Influenced by P′′, FALSE Usual filename extensions … Wikipedia
Motorola 68000 — This article is about the CPU. For the computer, see Sharp X68000. Motorola 68000 Designer Motorola Bits 16/32 bit Introduced 1979 Design CISC Endianness Big … Wikipedia
Reference counting — In computer science, reference counting is a technique of storing the number of references, pointers, or handles to a resource such as an object or block of memory. It is typically used as a means of deallocating objects which are no longer… … Wikipedia
Addressing mode — Addressing modes are an aspect of the instruction set architecture in most central processing unit (CPU) designs. The various addressing modes that are defined in a given instruction set architecture define how machine language instructions in… … Wikipedia
Leaky bucket — Although the leaky bucket algorithm has several uses, it is best understood in the context of network traffic shaping or rate limiting. Typically, the algorithm is used to control the rate at which data is injected into a network, smoothing out… … Wikipedia
Immunity Aware Programming — When writing firmware for an embedded system, immunity aware programming is a set of programming techniques used in an attempt to tolerate transient errors in the program counter or other that would otherwise lead to failure.Immunity aware… … Wikipedia
Producer-consumer problem — In computer science, the producer consumer problem (also known as the bounded buffer problem) is a classical example of a multi process synchronization problem. The problem describes two processes, the producer and the consumer, who share a… … Wikipedia
IP in IP — [http://www.faqs.org/rfcs/rfc2003.html] IP tunneling uses IP in IP protocol to encapsulate the IP packet in another IP packet. To encapsulate IP packet in a IP packet, an outer header is added with SourceIP, the entry point of the tunnel and the… … Wikipedia
Interfaz de Paso de Mensajes — Para MPI (Multidimensional Poverty Index), véase Índice de pobreza multidimensional. MPI ( Message Passing Interface , Interfaz de Paso de Mensajes) es un estándar que define la sintaxis y la semántica de las funciones contenidas en una… … Wikipedia Español