• Aucun résultat trouvé

Operator DEBUG Code_Aster

N/A
N/A
Protected

Academic year: 2022

Partager "Operator DEBUG Code_Aster"

Copied!
2
0
0

Texte intégral

(1)

Code_Aster Version default

Titre : Opérateur DEBUG Date : 08/04/2009 Page : 1/2

Responsable : Jean-Pierre LEFEBVRE Clé : U4.15.12 Révision : 539

Operator DEBUG

1 Goal

Allows to activate or disable the functionalities of debugging between the various commands.

Certain key words are accessible in the commands debut and POURSUITE.

It is about a functionality intended for the developers.

Warning : The translation process used on this website is a "Machine Translation". It may be imprecise and inaccurate in whole or in part and is provided as a convenience.

Licensed under the terms of the GNU FDL (http://www.gnu.org/copyleft/fdl.html)

(2)

Code_Aster Version default

Titre : Opérateur DEBUG Date : 08/04/2009 Page : 2/2

Responsable : Jean-Pierre LEFEBVRE Clé : U4.15.12 Révision : 539

2 Syntax

DEBUG (

◊ SDVERI=/ “YES”, /“NON”, ◊ JXVERI=/ “YES”,

/“NON”, ◊ JEVEUX=/ “YES”,

/“NON”, ◊ IMPR_MACRO=/ “YES”, /“NON”

)

3 Operands

3.1.1 Operand SDVERI

Attention, this functionality can cause a considerable overcost during the execution.

This key word starts the checking of data structures produced by the operators. It is used in the frame as of procedures of development of the code in the tests of non regression.

3.1.2 Operand JXVERI

Makes it possible to control the integrity of the segments of the memory between two executions of consecutive commands. This functionality relates to only the mode of management in memory known as static, when a memory zone allocated at the beginning of execution is managed by JEVEUX by chaining the various objects allocated during the execution. In way of managing in memory known as dynamic the various objects are allocated directly by the system and sequence does not exist.

3.1.3 Operand JEVEUX

Makes it possible to activate the operating mode in debug of the manager of JEVEUX memory:

unloadings on disc not differed and assignment from the segments values to an indefinite value [D6.02.01].

3.1.4 Key word IMPR_MACRO

Authorizes or not the displays produced by the macros in the file of message. The reading of the files of message can be painful when it contains the totality of the echoes of the subcommands generated by macro itself. By default, only the echo of the commands explicitly called by the user in his command set will appear.

Warning : The translation process used on this website is a "Machine Translation". It may be imprecise and inaccurate in whole or in part and is provided as a convenience.

Licensed under the terms of the GNU FDL (http://www.gnu.org/copyleft/fdl.html)

Références

Documents relatifs

d’histoire : à la recherche de modèles transposés de raisonnement historique », Le Cartable de Clio, Lausanne, LEP, N°2.. Cette approche est plus utilisée pour des élèves

To decide how to place each partition in hybrid memory, we quantitatively eval- uate the LLC misses associated with each partition, as well as the performance effect when it is

The multi-trace model (Nadel & Moscovitch, 1997) assumes that the re- evocation of a memory preserves it from semantization, contrary to the standard model (Alvarez &

In conclusion, it appears that the long-term dynamics of the Oort cloud involved by the Galactic tides, passing stars and plan- etary perturbations are such that a memory of the

Therefore, for the largest memory bounds, the original graph being itself a valid partial serialization, all the normalized critical paths equal 1. When a method fails to find

This problem is in NP as given a partial serialization of a graph G for a memory bound M, one can check in polynomial time that it is valid: simply compute its maximum peak

In 8 recognition experiments, we investigated theproduction effect—the fact that producing a word aloud during study, relative to simply reading a word silently, improves

Nanobiosci., vol. Malik, “Scale-space and edge detection using anisotropic diffusion,” IEEE Trans. Ushida, “CNN-based difference-con- trolled adaptive non-linear image filters,”