资源列表
sequence-cipher-and-shift-register
- 序列密码的安全保密性主要依赖于密钥序列,因此研究什么样的伪随机序列可以作为序列密码的密钥序列就成为序列密码研究中的主要问题,即序列密码的关键是产生密钥序列的算法。-Security and confidentiality of the password depends on the sequence of key sequence, the study of what can be used as a pseudo-random sequence key sequences password b
erchashu
- 二叉树的应用举例:将设计一个算法以确定把信号放大器放在何处。目标是要使所用的放大器数目最少并且保证信号衰减(与源端信号相关)不超过给定的容忍值。-Binary Application examples: the design of an algorithm to determine where to put the signal amplifier. Goal is to make the minimum number of amplifiers used in signal attenuati
datastructure(vc)
- 严蔚敏、吴伟民等《数据结构(c语言版)》一书的全部源代码
Deepc
- C语言程序,具备画图、十进制数转换、汉诺塔和二叉树编码功能。调试运行都没有问题,代码还可以进一步完善-C language program.It contains drawing graphic, decimal conversion, Tower of Hanoi code and the binary tree encoding. Commissioning are no problems, the code can be further improved.
CS-GATE-2012
- gate 2012 questions paper mtech
Classification-of-binary-tree
- 利用分类二叉树查找及堆排序实现学生成绩管理 -Classification of binary tree search and sort heap of student achievement management
intensity
- Tq wop lilas derta yerat hgawer trea cza rawerti
sourcecode
- 数据结构与算法原书第二版(C语言描述)涉及的源代码-Data structures and algorithms second edition of the original book (C language descr iption) involved in the source code
tree
- 数据结构重点——数与二叉树的详细教学资料-Key data structures- binary number and details of teaching materials
the-ex-of-programs
- 这个文档是数据结构程序设计的题目集合,适合对数据结构应用较有基础的学习者进行自选模拟,有助于提升水平-it is easy for you
895
- java写的多种dm算法,有需要的拿去下啊,还有些别的,需要的联系我-various dm algorithm, it is necessary to spend the next ah, but also some other, I need to contact the
puzzle-map
- 迷宫问题的生成与处理 可以自动生成迷宫并且处理-Maze generation and processing can be automatically generated maze
