Common linked list questions (java Edition)
Dry goods directly .....
Common linked list questions:Find the last k nodes of a single-chain table. Delete a node (O (1) in a single-chain table )). Reverse the linked list. The first public node of the two linked lists. The Start Node of the loop returned from the chain table (and whether the ring exists ). Merge two sorted linked lists. Delete duplicate nodes i
Tips"Effective Java, third Edition" an English version has been published, the second edition of this book presumably many people have read, known as one of the four major Java books, but the second edition of 2009 published, to now nearly 8 years, but with
pointer is introduced, so we have to deal with the empty list separately. When the first linked list is an empty list, that is, its head node is a null pointer, then it is merged with the second linked list, and the process of the idler merge is the second linked list. Similarly, when the head node of the second linked list is a null pointer, we combine it with the first linked list to get the first linked
of the list is the 1th node in the bottom. * For example, a list of 6 nodes. Starting from the beginning, their values are sequentially 1. 2. 3,4,5. 6. The 3rd node of the list is the node with a value of 4 */package swordforoffer;import utils. listnode;/** * @author Jinshuangqi * * August 1, 2015 */public class E15kthnodefromend {public ListNode findkthtotail (listnode Head,int k) {if (head = = NULL | | k
. * For example, a linked list has 6 nodes, starting from the beginning their values are 1,2,3,4,5,6. The bottom 3rd node of the list is a node with a value of 4 */package swordforoffer;import utils. listnode;/** * @author Jinshuangqi * * August 1, 2015 */public class E15kthnodefromend {public ListNode findkthtotail (listnode Head,int k) {if (head = = NULL | | k Test cases, functional tests (K-nodes in the
replication has been nominated for the ACM Outstanding Doctoral Dissertation Award. He holds a bachelor's degree from Columbia University and a PhD from Carnegie Mellon University.Pan Zhejiang Haining People, is currently serving in the Institute of Computer Science and Technology, Peking University, associate researcher; The research direction is information security (including network security and public key technology) and software development (including component technology and model); The
Download address: Network disk download
Introduction to the content
One of the most influential and valuable works in the Java field, with more than 20 years of experience in teaching and research of senior Java technology experts to write (won the Jolt Award), and "Java Programming ideas," the same as the more than 10-year global best-selling not decline, popul
DescriptionHere is read the "Effective Java Chinese version of the second edition" of the Reading notes, here will record some personal feeling a little bit important content, convenient for later review, may be due to personal strength reasons caused by misunderstanding, if found welcome to point out. Some individuals do not understand that will be marked with a slash.The first chapter is the introduction,
iterators , Java nested classes, and the implementation of the inner class 493.5LinkedList class 523.6 stack ADT583.6.1 stack model 583.6.2 stack implementation 593.6.3 application 593.7 queue ADT653.7.1 queue Model 653.7.2 queue array Implementation 653.7.3 Queue Application 66 Summary 67 Exercise 67 4th Tree 714.1 Preliminary Knowledge 714.1.1 tree's implementation 724.1.2 tree traversal and application
48916.3.4 process contains how many steps 49016.3.5 need to control and monitor 4911 6.3.6 when to redefine a project objective 49216.4 law Field 49216.4.1 Royce Methodology 49316.4.2 Extreme Programming (XP) 49616.4.3 Rugby methodology 50016.5 Case study 50516.5.1 XP project: ATRAC T 50616.5.2 Local main customer: FRIEND 50816.5.3 Distributed project: JAMES 51316.5.4 Case Study summary 51816.6 recommended readings 52116.7 Exercise 521 Part 4 Appendix Appendix A design Pattern 525a.1 Abstrac T
Course Study Address: http://www.xuetuwuyou.com/course/227The course out of self-study, worry-free network: http://www.xuetuwuyou.comLecturer: Watermelon TeacherCourse Catalogue:1th Lecture, Project Flow2nd, the overall process of the project3rd, the process of demand analysisThe 4th, common indicators5th, the goal of the project6th, the structure of the project process7th lecture, Project Process supplement8th Lecture, Technology selection9th, zookee
;ImportOrg.testng.annotations.BeforeMethod;Importorg.openqa.selenium.By;ImportOrg.openqa.selenium.JavascriptExecutor;ImportOrg.openqa.selenium.WebDriver;Importorg.openqa.selenium.WebElement;ImportOrg.openqa.selenium.chrome.ChromeDriver;ImportOrg.testng.annotations.AfterMethod; Public classScrollbarapi {webdriver driver; String BaseUrl; //Slide the scroll bar to the bottom of the page@Test (priority=0) Public voidf () {((javascriptexecutor) driver). Executescript ("Window.scrollto (0,documen
data;public lnode next;}Algorithm implementation:public class Linklistutli {public static void Deleterepeatvalue (Lnode L) {//If the single-linked list is empty, or if there is only a header node, or if there is only one element behind the head node. There is no possibility of duplicate values if (l==null| | l.next==null| | L.next.next==null) return; Lnode p=l;//The previous node of the current access node Lnode q=l.next;//the currently visited node
handy;2, through reading the document and the actual use, mastered the basic usage of jsoup;3, enhance the Java programming ability. The insufficiency of this experiment:1, the code has redundancy, the next time you can use a lot of encapsulation and inheritance, make the code more readable;2, did not do highlight;3, only the analysis of 3 pages, after perfect can be more analysis of several pages (in fact, similar principles), increase the degree of
Java code to implement:/** * Enter an array of integers with positive and negative numbers in the array. One or more consecutive integers in an array make up a sub-array. * The maximum value of all sub-arrays is evaluated. Requires time complexity O (n) */package swordforoffer;/** * @author Jinshuangqi * * August 8, 2015 */public class E31greatestsumofsubarrays {Pub Lic Integer findgreatestsum (int[] arr) {if (arr.length ==0) return null; int greate
link Address: Commodity barcode (Jbarcode)This article is copyrighted by the author and the blog Park is shared, welcome reprint, but without the author's consent must retain this paragraph, and in the article page obvious location to the original linkOriginal link: http://www.cnblogs.com/yuchuan/p/JBarcode2.htmlIf you think this article is good, may wish to recommend, let more readers get the harvest.If you have any other ideas, may wish to leave a message, we all discuss together. Three peopl
10,5,7. Next we take the node with a value of 10 from the data container. Notice that the node value of 10 is 5, 7, the node is placed in the container first, and then the two nodes are removed first, this is what we usually say first in first out, so it is not difficult to see that this container should be a queue. Because nodes with a value of 5,7,9,11 have no child nodes, they can be printed in turn.By analyzing specific examples, we can find the rules for printing binary trees from top to b
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.