码迷,mamicode.com
首页 >  
搜索关键字:one    ( 27922个结果
Merge k Sorted Lists
Mergeksorted linked lists and return it as one sorted list. Analyze and describe its complexity./***Definitionforsingly-linkedlist.*structListNode{*in...
分类:其他好文   时间:2014-06-04 21:08:57    阅读次数:381
poj 1002:487-3279(水题,提高题 / hash)
487-3279Time Limit:2000MSMemory Limit:65536KTotal Submissions:236746Accepted:41288DescriptionBusinesses like to have memorable telephone numbers. One ...
分类:其他好文   时间:2014-06-04 21:08:17    阅读次数:349
性能测试相关脚本
1,restime统计响应时间#!/bin/bash#统计日志响应时间用if [ $# -lt 1 ]; then echo "at least have one param; " echo "ex: restime a.log b.log *.log" exit 1fi. lgq...
分类:其他好文   时间:2014-06-04 20:23:43    阅读次数:291
Scramble String
Given a strings1, we may represent it as a binary tree by partitioning it to two non-empty substrings recursively.Below is one possible representation...
分类:其他好文   时间:2014-06-04 20:11:38    阅读次数:303
Maximum Subarray
Find the contiguous subarray within an array (containing at least one number) which has the largest sum.For example, given the array[?2,1,?3,4,?1,2,1,...
分类:其他好文   时间:2014-06-04 19:30:13    阅读次数:230
Plus One
Given a non-negative number represented as an array of digits, plus one to the number.The digits are stored such that the most significant digit is at...
分类:其他好文   时间:2014-06-04 19:19:52    阅读次数:185
Gray Code
The gray code is a binary numeral system where two successive values differ in only one bit.Given a non-negative integernrepresenting the total number...
分类:其他好文   时间:2014-06-04 18:58:39    阅读次数:277
Reverse Linked List II
Reverse a linked list from positionmton. Do it in-place and in one-pass.For example:Given1->2->3->4->5->NULL,m= 2 andn= 4,return1->4->3->2->5->NULL.No...
分类:其他好文   时间:2014-06-04 18:55:07    阅读次数:343
Merge Sorted Array
Given two sorted integer arrays A and B, merge B into A as one sorted array.Note:You may assume that A has enough space (size that is greater or equal...
分类:其他好文   时间:2014-06-04 18:18:08    阅读次数:259
OD: Memory Attach Technology - Off by One, Virtual Function in C++ & Heap Spray
Off by One根据 Halvar Flake 在“Third Generation Exploitation”中的描述,漏洞利用技术依攻击难度从小到大分为三类:1. 基础的栈溢出利用,可以利用返回地址轻松劫持进程,植入 shellcode,如对 strcpy、strcat 等函数的攻击。2. ...
分类:编程语言   时间:2014-05-30 22:16:39    阅读次数:399
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!