搜索结果
找到约 1,279 项符合
Two-input 的查询结果
其他 Problem Statement You are given a string input. You are to find the longest substring of input su
Problem Statement
You are given a string input. You are to find the longest substring of input such that the reversal of the substring is also a substring of input. In case of a tie, return the string that occurs earliest in input.
Definition
Class: ReverseSubstring
Method: findReversed
Parameter ...
汇编语言 tr1 byte "Please input the first 64-bit in hex:first - second",0dh,0ah,0 string byte "remener :us
tr1 byte "Please input the first 64-bit in hex:first - second",0dh,0ah,0
string byte "remener :use enter to tell high 32-bit from low 32-bit",0dh,0ah,0
examp1 byte "eg: 1234ecdf",0dh,0ah,0
examp2 byte " 03ab2543",0dh,0ah,0
汇编语言 data array sdword 2 dup(?) str1 byte "Please input one 32-bit sign number :",0dh,0ah,0 str2 by
data
array sdword 2 dup(?)
str1 byte "Please input one 32-bit sign number :",0dh,0ah,0
str2 byte "The result is : ",0
align 4
jia1gao sdword 0
jia1 sdword 0
.code
main proc
call clrscr
mov esi,offset array
mov ecx,lengthof array
mov edx,offset str1
push esi
putin:
call writestring ...
人工智能/神经网络 If we have two individually sorted vectors "a" and "b" but they are not sorted with respect to each
If we have two individually sorted vectors "a" and "b" but they are not sorted with respect to each other and we want to merge them into vector "c" such that "c" is also a sorted vector. Then c=mergesorted(a,b) can be used.
数学计算 Two functions, num2bin and bin2num are provided. num2bin takes a double and converts it to a binary
Two functions, num2bin and bin2num are provided. num2bin takes a double and converts it to a binary string representation. bin2num is its inverse operation. It can be used in a numerical analysis course when floating point arithmetic is discussed.
单片机开发 This a two node test, requires a Coordinator and an RFD. The coordinator and node simply ping-pong
This a two node test, requires a Coordinator
and an RFD. The coordinator and node simply
ping-pong a packet back and forth, and print
out the RSSI byte. The RFD waits before
bouncing it back, while the coordinator responds
immediately.
人工智能/神经网络 CKHash is an implementation of Cuckoo Hashing that can receive the input in the form of strings dir
CKHash is an implementation of Cuckoo Hashing that can receive the input in
the form of strings directly
DSP编程 CCS编程环境 使用的是汇编加C的混合编程方法: The programme of the Correlation Algorithm. Using INT2 to get the input s
CCS编程环境 使用的是汇编加C的混合编程方法:
The programme of the Correlation Algorithm.
Using INT2 to get the input signal.
Array x, in first step, is the input signal produced by programme,
in next step, is the input signal get from A/D,
the length is 128, 32-bit floating point.
Array y, in first s ...
matlab例程 This is a program to calculate the Photonic Bands of two dimension Photonic Crystal with circular in
This is a program to calculate the Photonic Bands of two dimension Photonic Crystal with circular inclusions. It calculates both TE and TM modes (E and H polarization).
加密解密 Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The origina
Tiger Tree Hash is constructed from two parts, the Tiger Hash Algorithm and Merkle Tree. The original Tiger Hash code was taken from Tiger.Net which is written in Visual Basic. NET.
Tiger Tree Hash算法的C#实现!