代码搜索结果
找到约 33,766 项符合
Algorithm 的代码
algorithm.txt
1. Compression algorithm (deflate)
The deflation algorithm used by gzip (also zip and zlib) is a variation of
LZ77 (Lempel-Ziv 1977, see reference below). It finds duplicated strings in
the input
algorithm.doc
1. Algorithm
The deflation algorithm used by zip and gzip is a variation of LZ77
(Lempel-Ziv 1977, see reference below). It finds duplicated strings in
the input data. The second occurrence of a str
acknowledgements
Berkeley Yacc owes much to the unflagging efforts of Keith Bostic.
His badgering kept me working on it long after I was ready to quit.
Berkeley Yacc is based on the excellent algorithm for
readme
Classic philosophs algorithm.
readme
Classical Hairdresser algorithm
bsort.asm
TITLE BubbleSort Procedure (BSort.asm)
; Sort an array of signed integers, using the Bubble
; sort algorithm. The main program is in B_main.asm.
; Last update: 9/10/01
INCLUD
readme
This is a complex example. It shows how to run the
Genetic Algorithm to evolve Amygdala Networks.
NOTE: This example needs an update. Don't expect it to work.
ktest.+003+23616.private
Private-key-format: v1.2
Algorithm: 3 (DSA)
Prime(p): 73V/K7fSDvkA0eDYcGg/kSvEjAEO/oLWCERltkuC55ZcM/mSv17WF1d/wR6kww/pLI9eXwkjftAYqs5sNxk+mQ==
Subprime(q): 2nX/+WoOUR9Nq9wUj5zK501+ATM=
Base(g): sQaXrP
kdh.+002+48957.private
Private-key-format: v1.2
Algorithm: 2 (DH)
Prime(p): ///////////JD9qiIWjCNMTGYouA3BzRKQJOCIpnzHQCC76mOxObIlFKCHmONATd75UZs806QxswKwpt8l8UN0/hNW1tUcJF5IW1dmJefsb0TELppjo2IP//////////
Generator(g): Ag==
ice-user.pem
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: md5WithRSAEncryption
Issuer: O=European ICE-TEL project, OU=V3-Certification Authori