yangzhe1990.wordpress.com
最好写的suffix tree(suffix array)算法? | Yangzhe1990's Blog
https://yangzhe1990.wordpress.com/2012/09/14/suffix-array-suffix-tree
Just another WordPress.com weblog. Suffix Array Construction: KA’s algorithm and Induced Sorting, which is faster? 最好写的suffix tree suffix array 算法. Posted 09/14/2012 by yangzhe1990 in 码农. 有至少6年没写suffix array了,另外大概半年内听谁说过似乎有个OI界不怎么用的04年的算法,正好最近要用到后缀树,但我是绝对不会蛋疼尝试写Ukkonen的,抱着会不会有个比U家后缀树简单的算法的想法,所以看了看整个suffix tree有什么新东西没有很遗憾的是好像没有suffix array倒有一两个。 Http:/ homepage3.nifty.com/wpage/links/suffix trees.html. Juha Karkkainen and Peter Sanders 2003,或者DC-3算法 鄙人当年觉得写起来好像不太爽、radix三层 2/3递归是不是常数因子有点儿大就从没写过。 You are co...
omarsebres.wordpress.com
2014 June « omarsebres
https://omarsebres.wordpress.com/2014/06
Mainly Programming blog for experience sharing. C references, because pointers are overrated. 11280 – Flying to Fredericton. 1253 – Infected Land. 12444 – Bits and Pieces. Uhunt Training Series 2014. Amr Elroumy's blog. Petr Mitrichev's Blog. Archive for June, 2014. D The Child and Sequence. On June 28, 2014. The use of segment tree will help query the data fast enough to avoid TLE, but there is still another catch doing the module operation on big ranges will make the code pass the Time Limit.
marathoncode.blogspot.com
Marathoncode: Frações contínuas
http://marathoncode.blogspot.com/2013/06/fracoes-continuas-uma-fracao-continua-e.html
Quinta-feira, 6 de junho de 2013. Uma fração contínua é uma expressão obtida a partir de um processo iterativo para representação de um número como a soma de sua parte inteira mais o inverso da sua parte fracionária. O processo termina quando o número não tem uma parte fracionária. Note que este processo pode ser utilizado para representação dos números racionais e irracionais. Considere o seguinte exemplo:. Dfrac{415}{93}$ = 4 $ dfrac{43}{93}$ = 4 $ dfrac{1}{ frac{93}{43} $. Dfrac{7}{1}$ = 7 0. Http:/ m...
yangzhe1990.wordpress.com
关于香港的一些想法 | Yangzhe1990's Blog
https://yangzhe1990.wordpress.com/2013/02/18/关于香港的一些想法
Just another WordPress.com weblog. Posted 02/18/2013 by yangzhe1990 in Uncategorized. 尤其是,在这个商品社会,target到女人上的市场宣传 毒 ,商品 品 ,还有电视、SNS这种传播低俗价值的洗脑盒子,稍不留神一个人就丧失思考能力最后沦为书呆子不受欢迎文中的情况了。 Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out. You are commenting using your Twitter account. ( Log Out. You are commenting using your Facebook account. ( Log Out. You are commenting using your Google account. ( Log Out.
yangzhe1990.wordpress.com
给域名开启DNSSEC权威解析 | Yangzhe1990's Blog
https://yangzhe1990.wordpress.com/2012/08/30/enable-dnssec-for-authority-ns
Just another WordPress.com weblog. Laquo; ssh known hosts洁癖. Posted 08/30/2012 by yangzhe1990 in Network. 配置过程可以参考DNSSEC in 6 Minutes http:/ static.usenix.org/event/lisa08/dnssec bof.pdf. 例如,你有一个域名example.com,在bind9里配置了master文件db.example.com.notsigned,. 基本过程就是,安装bind9utils,运行dnssec-keygen -a RSASHA1 -b 1024 -n ZONE zonename生成ZSK,运行dnssec-keygen -a RSASHA1 -b 4096 -n -f KSK ZONE zonename。 接下来,用dnssec-dsfromkey -f db.example.com.signed example.com可以生成相应的DS记录。 2 responses to this post. You are commenting us...
yangzhe1990.wordpress.com
中华人民共和国境内的递归域名服务器,应配置中国国家DNSSEC信任源为信任锚点 | Yangzhe1990's Blog
https://yangzhe1990.wordpress.com/2012/08/31/中华人民共和国境内的递归域名服务器,应配置中
Just another WordPress.com weblog. 最好写的suffix tree suffix array 算法. Posted 08/31/2012 by yangzhe1990 in 河蟹 (Harmonize). 刚搜到工信部的 中华人民共和国通信行业标准 域名服务安全框架技术要求 ,乍一看目录好先进啊 这是真的么 嗯,真的 http:/ www.ccsa.org.cn/publish/download bp.php? One response to this post. Posted by yangzhe1990 on 08/31/2012 at 1:39 下午. Fill in your details below or click an icon to log in:. Address never made public). You are commenting using your WordPress.com account. ( Log Out. You are commenting using your Twitter account. ( Log Out.
omarsebres.wordpress.com
2013 November « omarsebres
https://omarsebres.wordpress.com/2013/11
Mainly Programming blog for experience sharing. C references, because pointers are overrated. 11280 – Flying to Fredericton. 1253 – Infected Land. 12444 – Bits and Pieces. Uhunt Training Series 2014. Amr Elroumy's blog. Petr Mitrichev's Blog. Archive for November, 2013. On November 29, 2013. Second problem from Facebook Hacker Cup Qualification Round. I solved it using sorting, but I guess a better solution will be using a “priority queue”. It was my first time using lambdas in a solution. 30 Things To K...
omarsebres.wordpress.com
12444 – Bits and Pieces « omarsebres
https://omarsebres.wordpress.com/2014/08/25/12444-bits-and-pieces
Mainly Programming blog for experience sharing. C references, because pointers are overrated. 11280 – Flying to Fredericton. 1253 – Infected Land. 12444 – Bits and Pieces. Uhunt Training Series 2014. Amr Elroumy's blog. Petr Mitrichev's Blog. Laquo; 12086 – Potentiometers. 1253 – Infected Land. 12444 – Bits and Pieces. On August 25, 2014. You’ll have to build the result { a, b }, for each bit in { c, d } you have three options:. 1 – both bits are one, then sit the bits in { a, b } with one. Laquo; 12086 ...
yangzhe1990.wordpress.com
GPG Public Keys | Yangzhe1990's Blog
https://yangzhe1990.wordpress.com/gpg
Just another WordPress.com weblog. BEGIN PGP PUBLIC KEY BLOCK- - -. Version: GnuPG v1.4.10 (GNU/Linux). GqPBQx1ck1drIMEsEYJV l1w0W2/J1Qa9SNj45c6z54WBhsOJ aByN9gNyV6ca e. VRUUZkheEhTu1eWNyZN6jFw F 0HV45sIbVY VKhQBtlXm8ayCmGApnAvzS9xi7d. GlbghCe51H2ZK 1HaeCYKM7WrNbq6EqfC02IWTzMXiJUqFfC IFm Lo9gKGkz3XS. HbJehmQ2UG3A/jgEwBFW6HRbCmjxRcLkXjcgguPuW Ua9wJg YOPu0 ZYlhtIjop. 1H4meoGQ d53zmN7BxF86NQQK7lpdbkh48m CqnvknqnK/kd nplTNbB1Z1PwDkX. A/XJ1crzYGg UtcTe0eAf4m/eSq3RtqDmXYxI9LaLZ dcM5 y9O1eFXhJXDSNLnK.
SOCIAL ENGAGEMENT