Operating System Series
Learning to this point, found a lot of learned but long useless knowledge, over time, slowly forgotten. When the day is needed, but found to have forgotten almost, even if the document (Word, etc.), still have to learn from the beginning. Study the first semester, found that a lot of things can be learned from the blog, there are a lot of bloggers have worked hard to organize a lot of useful Bowen. So, I take this opportunity, also slowly began to organize some blog posts
Since the beginning of the public number began, has been thinking, how to do the training of the algorithm, because the thinking of the students in the algorithm this aspect of the mastery is indeed not enough. Therefore, I now want to do a "365 Algorithm daily Learning Plan".
The main purpose of the plan:
1, want to through this way to supervise the
Come from:http://blog.csdn.net/lonelyroamer/article/details/7630594
I. Overview
The MAC algorithm combines the advantages of the MD5 and Sha algorithms and joins the key support, which is a more secure message digest algorithm.
MAC (Message authentication code, messaging authentication Code algorithm) is a hash function algo
It 's written in front .
After learning the Python basics, start with this section to formally learn about data structure and algorithm related content. This is a more complex topic, generally divided into the primary, advanced, and specialized algorithm analysis three stages to learn, so we also need to be gradual. This section is mainly familiar with the general concepts of data structure and algorithms,
Seed filling algorithm of CGA filling algorithmThe plane area filling algorithm is an important algorithm in the field of computer graphics, which gives the boundary of an area (or the absence of a boundary, but only the specified color), which requires that all the pixel elements within the boundary range be modified to the specified color (or it may be a hatch)
The simplest code implementation of the fastest sorting and searching algorithm
by http://blog.csdn.net/shendl/ Preface
The core problem of the algorithm is sorting and searching. These 2 fields are the most widely used and are the most thoroughly studied. In this article I will explain the most efficient two algorithms for sorting and searching: A fast sort algorithm
In the front we have introduced a lot of supervised learning algorithms, classification and regression. This article mainly introduces unsupervised algorithm, through clustering analysis to deal with the No class mark data. We do not know the correct result of the data (class standard), through clustering algorithm to discover and mining the data itself structure information, the data Clustering (classifica
Last night in the dorm to see Mark Allen Weiss's "Data Structure and algorithm analysis Java language description" of this book, see the second chapter of the time to give an example to discuss, is about the maximum sub-sequence and algorithm analysis. A total of four algorithms, first when you see the first algorithm when you think this
classical algorithms Research Series: 1. A * search algorithm
July November January 2011
====================
Bloggers:1. This classic Algorithm Research Series, this seriesArticleI hope you can forgive me for not writing well enough.2. This classic algorithm research series is my reference. It is an original article, which must indicate the author's
Introduction:This paper mainly introduces several image matching algorithms based on gray scale: mean absolute difference algorithm (MAD), absolute error and algorithm (SAD), error square sum algorithm (SSD), mean error square sum algorithm (MSD), Normalized product correlation alg
Refer to the previous article: paxos algorithm 1.
1. Number Processing
According to P2c, Proposer will first consult the acceptor to view the maximum number and value it approves before deciding which value to submit. Previously, we have been emphasizing higher-numbered proposal without explaining how to handle low-numbered Proposal.
| -------- Low number (L
The correctness of P2c is guaranteed by the higher serial number H generated by the current
- numbering problem: Unique number " in the following section.2. Paxos Algorithm FormationRe-organizing P2C and P1A can propose Paxos algorithm, which is divided into 2 stages:Phase1:prepare
Proposer Select a proposal number n and send it to a majority in acceptor
If Acceptor finds that n is the largest number in the request it has replied to, it will reply to the largest proposal it has accept
July November January 2011
======================================
This article mainly references: Introduction to algorithm version 2 and Wikipedia.
Sorry for the poor writing.This article is a series of articles on classical algorithms, which are permanently inspected, updated, and maintained.July, updated on April 9, February 10, 2011.1. Dijkstra algorithm Introduction
Dijkstra
Minimum Spanning Tree --- Prim algorithm and Kruskal algorithm, --- primkruskal
Prim algorithm
1. Overview
Prim algorithm(Prim algorithm), an algorithm in graph theory that can search for the minimum spanning tree in a weighted co
--turn from: {Old yards ' column}The difficult understanding of the Paxos algorithm is as admirable as the popularity of the algorithm, and from my personal experience, the difficult reason is not that the algorithm is so advanced that the IQ is not enough, but that the lamport is too obscure to express the algorithm a
Introduction of genetic algorithm1.1 Overview of genetic algorithmsGenetic algorithm (genetic algorithm, short GA) is a kind of randomized search method derived from the evolutionary law of the organism (survival of the fittest, the fittest genetic mechanism), which was first proposed by Professor J.holland of the United States in 1975. Genetic algorithm is a com
Why should we understand the efficiency of the algorithm?In general, programming is to solve the problem by substituting various known algorithms into their own code. Therefore, understanding the efficiency of various algorithms is very helpful for us to choose a suitable algorithm.What determines the efficiency of the algorithm?From the theory of algorithmic analysis, the efficiency of the
More data mining algorithms: Https://github.com/linyiqun/DataMiningAlgorithmIntroductionCBA algorithm full name is classification base of association, is based on association rules classification algorithm, speaking of association rules, we will think of Apriori and Fp-tree algorithm are association rules mining algorithm
later chapter, we will give an algorithm to convert the regular expression into a form that the machine can read, which is the poor state automaton described in this chapter.
A poor state automaton is the name that sounds scary, but in reality the motivation is not as complicated as it might seem. This concept of state machines is widely used in a wide variety of fields. The Unified Modeling Language (UML) of software engineering has a state diagram
Scheduling Algorithm and Resource Scheduling Algorithm
In a multi-channel program environment, there are multiple processes in the main memory, and the number of processes is usually more than the number of processors. This requires the system to dynamically allocate the processor to a process in the ready queue according to an algorithm for execution. The task o
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.