Memory leaks

Xem 1-6 trên 6 kết quả Memory leaks
  • Based upon the authors' experience in designing and deploying an embedded Linux system with a variety of applications, Embedded Linux System Design and Development contains a full embedded Linux system development roadmap for systems architects and software programmers. Explaining the issues that arise out of the use of Linux in embedded systems, the book facilitates movement to embedded Linux from traditional real-time operating systems, and describes the system design model containing embedded Linux....

    pdf429p phongvohinh 19-02-2010 221 118   Download

  • Java is interpreted, and garbage collected: C++ has more potential for memory leaks (you must explicitly delete objects) Java intended to be explicitly platform independent • Similarities in syntax. See Gary Shute’s document on Java for C Programmers (available from course calendar)

    pdf54p nhq_khtn 12-03-2011 70 26   Download

  • This book brings together indispensable knowledge for building efficient, high-value, Linux-based embedded products: information that has never been assembled in one place before. Drawing on years of experience as an embedded Linux consultant and field application engineer, Christopher Hallinan offers solutions for the specific technical issues you're most likely to face, demonstrates how to build an effective embedded Linux environment, and shows how to use it as productively as possible

    pdf542p bui_vy 26-09-2012 63 19   Download

  • We believe that .NET developers cannot achieve systematically high-performance software solutions without thoroughly understanding all three areas. For example, .NET memory management (facilitated by the CLR garbage collector) is an extremely complex field and the cause of significant performance problems, including memory leaks and long GC pause times. Without understanding how the CLR garbage collector operates, high-performance memory management in .NET is left to nothing but chance. Similarly, choosing the proper collection class from what the .

    pdf361p hotmoingay3 09-01-2013 77 6   Download

  • BÀI 14: DESTRUCTOR, CONSTRUCTOR, CONVERSION VÀ DEBUG ( tiếp theo) Tương tự bạn có thể viết cho calloc và realloc Phát hiện rò rỉ bộ nhớ với new và delete Với vấn đề phát hiện leak memory, chúng ta nên dùng malloc/free với primitive và dùng new/delete với object, vì delete còn gọi destructor của object. Lí do nữa là overload toán tử new và delete ở global scope rất phức tạp và không phải trình biên dịch nào cũng hỗ trợ overload hai toán tử này. ...

    pdf5p yukogaru 26-07-2010 73 17   Download

  • In this paper, we show that such seemingly minor information leaks can have more serious consequences than the system designer thought. We present a new at- tack in which a malicious user can eavesdrop on others’ keystrokes using nothing but her non-privileged account. Our attack takes advantage of the information disclosed by procfs [19], the process file system supported by most Unix-like operating systems such as Linux, BSD, Solaris and IBM AIX.

    pdf16p nhacsihuytuan 06-04-2013 17 2   Download


Đồng bộ tài khoản