文件名称:check
-
所属分类:
- 标签属性:
- 上传时间:2013-03-08
-
文件大小:11.68kb
-
已下载:0次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
1.利用实验一建立的有序表,采用折半查找实现对某一已知的关键字的查找。
2.随机产生一组关键字,利用二叉排序树的插入算法建立二叉排序树,然后删除某一指定关键字元素。
3.已知散列函数为H(key)=key p(p为自定义的常数),冲突处理方法分别为线性探测法和外拉链法,建立散列表并实现查找某一指定关键字元素。-1. Experiment established orderly table, using a binary search to achieve a known keyword search. 2. Randomly generated a set of keywords, binary sort tree insertion the build binary sort tree algorithm, and then delete a specified keyword elements. 3. Known hash function H (key) = key p (p is a constant custom) conflict handling methods were linear detection method and outside zipper method, set up the hash table and Find a designated keyword element.
2.随机产生一组关键字,利用二叉排序树的插入算法建立二叉排序树,然后删除某一指定关键字元素。
3.已知散列函数为H(key)=key p(p为自定义的常数),冲突处理方法分别为线性探测法和外拉链法,建立散列表并实现查找某一指定关键字元素。-1. Experiment established orderly table, using a binary search to achieve a known keyword search. 2. Randomly generated a set of keywords, binary sort tree insertion the build binary sort tree algorithm, and then delete a specified keyword elements. 3. Known hash function H (key) = key p (p is a constant custom) conflict handling methods were linear detection method and outside zipper method, set up the hash table and Find a designated keyword element.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
check.doc
1999-2046 搜珍网 All Rights Reserved.
本站作为网络服务提供者,仅为网络服务对象提供信息存储空间,仅对用户上载内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
