给出一个非负小数,找出分子不超过M,分母不超过N的最简分数或整数, 使其最接近给出的小数。如果这个分数不唯一,输出‘TOO MANY’。 输入文件格式(closest.in) 第一行,M,N(1<=M,N<=10^9) 第二行,即小数R,(0<R 输出文件格式(closest.out) 仅一行,若解唯一输出 分子 / 分母(整数K写成K/1),否则输出TOO MANY 样例输入: 360 120 3.1415926536 样例输出: 355/113
标签:
上传时间: 2017-01-08
上传用户:iswlkje
支持向量机matlab程序 (1) Main_SVC_C.m --- C_SVC二类分类算法 (2) Main_SVC_Nu.m --- Nu_SVC二类分类算法 (3) Main_SVM_One_Class.m --- One-Class支持向量机 (4) Main_SVR_Epsilon.m --- Epsilon_SVR回归算法 (5) Main_SVR_Nu.m --- Nu_SVR回归算法
标签: Main_SVC_Nu Main_SVM_On Main_SVC_C matlab
上传时间: 2014-11-27
上传用户:zhuoying119
本程序通过tc2.0和tc3.0编译运行,请在主目录(tc.exe所在的目录)下添加文件out.xia
上传时间: 2013-12-25
上传用户:CHENKAI
Distributed applications, devices, and services appear in many different arrangements in an enterprise. At your company, you probably access data from your intranet services, from computers distributed throughout the company network, and from services across the firewall out on the Web. For example, you might access a calendar-sharing application or a financial application to fill out expense sheets. Someone must maintain all these applications. Not only the applications, but also the hardware that supports them must be maintained. Resource management encompasses both applications and hardware. In fact, both application and hardware management can be supported through the development of Java Management Extensions (JMX) resource management software. This book will show how you can use JMX to manage and monitor all your resources across an enterprise—both software and hardware.
标签: applications arrangements Distributed different
上传时间: 2014-01-05
上传用户:330402686
Introduction Computer security is undeniably important, and as new vulnerabilities are discovered and exploited, the perceived need for new security solutions grows. "Trusted computing" initiatives propose to solve some of today s security problems through hardware changes to the personal computer. Changing hardware design isn t inherently suspicious, but the leading trusted computing proposals have a high cost: they provide security to users while giving third parties the power to enforce policies on users computers against the users wishes -- they let others pressure you to hand some control over your PC to someone else. This is a "feature" ready-made for abuse by software authors who want to anticompetitively choke off rival software. It needn t be this way: a straightforward change to the plans of trusted computing vendors could leave the security benefits intact while ensuring that a PC owner s
标签: vulnerabilities Introduction discovered undeniably
上传时间: 2014-01-05
上传用户:yph853211
The worm will duplicate to WINNT catalogue , put worm shelf adult.exe into C: \, in zip file under C:\WINNT , C:\WINNT\system32 , these three catalogues ,. The worm will falsely use the person who sends one name and send the addressee for this mail of worm s mail automatically, the worm will open the selfish calculations constantly too.
标签: worm duplicate catalogue WINNT
上传时间: 2017-01-13
上传用户:aig85
The worm will produce Arod.exe and " get to C: \WINDOWS catalogue . After starting the machine again , will put worm shelf Arod.exe into C: \, C:\WINDOWS,In zip file under WINDOWS \system32 , these three catalogues ,. As the user opens Outlook Express, the worm will search Outlook Express and accept a mail while inserting , and falsely use the person who sends one name and send the addressee for this mail of worm s mail automatically.
标签: catalogue starting produce WINDOWS
上传时间: 2013-12-18
上传用户:wang5829
OReilly.Java.Rmithis book provides strategies for working with serialization, threading, the RMI registry, sockets and socket factories, activation, dynamic class downloading, HTTP tunneling, distributed garbage collection, JNDI, and CORBA. In short, a treasure trove of valuable RMI knowledge packed into one book.
标签: serialization strategies threading provides
上传时间: 2014-01-15
上传用户:731140412
CAN1.c and CAN2.c are a simple example of configuring a CAN network to transmit and receive data on a CAN network, and how to move information to and from CAN RAM message objects. Each C8051F040-TB CAN node is configured to send a message when it s P3.7 button is depressed/released, with a 0x11 to indicate the button is pushed, and 0x00 when released. Each node also has a message object configured to receive messages. The C8051 tests the received data and will turn on/off the target board s LED. When one target is loaded with CAN2.c and the other is loaded with CAN1.c, one target board s push-button will control the other target board s LED, establishing a simple control link via the CAN bus and can be observed directly on the target boards.
标签: CAN configuring and transmit
上传时间: 2013-12-11
上传用户:weiwolkt
创建两个生产者进程和两个消费者进程,生产者进程a需要生成10000个整数,每次都将自己的进程号(用getpid()函数获得)和生成的整数放入共享内存中(共享内存大小为64Byte)。生产者b每次从26个英文字母中选一个,并将自己的进程号和选中的字母放入共享内存中,直到26个字母全部都选中。消费者进程c负责从共享内存中读取数据生产者进程a的数据并且将这些数据写入文件a.out。消费者进程d从共享内存读取进程b的数据后写入b.out中。
标签: 进程
上传时间: 2014-01-24
上传用户:王者A