代码搜索结果

找到约 33,766 项符合 Algorithm 的代码

algorithm.txt

1. Compression algorithm (deflate) The deflation algorithm used by gzip (also zip and zlib) is a variation of LZ77 (Lempel-Ziv 1977, see reference below). It finds duplicated strings in the input

algorithm.doc

1. Algorithm The deflation algorithm used by zip and gzip is a variation of LZ77 (Lempel-Ziv 1977, see reference below). It finds duplicated strings in the input data. The second occurrence of a str

acknowledgements

Berkeley Yacc owes much to the unflagging efforts of Keith Bostic. His badgering kept me working on it long after I was ready to quit. Berkeley Yacc is based on the excellent algorithm for

readme

Classic philosophs algorithm.

readme

Classical Hairdresser algorithm

bsort.asm

TITLE BubbleSort Procedure (BSort.asm) ; Sort an array of signed integers, using the Bubble ; sort algorithm. The main program is in B_main.asm. ; Last update: 9/10/01 INCLUD

readme

This is a complex example. It shows how to run the Genetic Algorithm to evolve Amygdala Networks. NOTE: This example needs an update. Don't expect it to work.

ktest.+003+23616.private

Private-key-format: v1.2 Algorithm: 3 (DSA) Prime(p): 73V/K7fSDvkA0eDYcGg/kSvEjAEO/oLWCERltkuC55ZcM/mSv17WF1d/wR6kww/pLI9eXwkjftAYqs5sNxk+mQ== Subprime(q): 2nX/+WoOUR9Nq9wUj5zK501+ATM= Base(g): sQaXrP

kdh.+002+48957.private

Private-key-format: v1.2 Algorithm: 2 (DH) Prime(p): ///////////JD9qiIWjCNMTGYouA3BzRKQJOCIpnzHQCC76mOxObIlFKCHmONATd75UZs806QxswKwpt8l8UN0/hNW1tUcJF5IW1dmJefsb0TELppjo2IP////////// Generator(g): Ag==

ice-user.pem

Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: md5WithRSAEncryption Issuer: O=European ICE-TEL project, OU=V3-Certification Authori