摘要:
The Falling LeavesEach year, fall in the North Central region is accompanied by the brilliant colors of the leaves on the trees, followed quickly by t... 阅读全文
摘要:
S-TreesA Strange Tree (S-tree) over the variable setis a binary tree representing a Boolean function. Each path of the S-tree begins at therootnode an... 阅读全文
摘要:
QuadtreesA quadtree is a representation format used to encode images. The fundamental idea behind the quadtree is that any image can be split into fou... 阅读全文
摘要:
TreeYou are to determine the value of the leaf node in a given binary tree that is the terminal node of a path of least value from the root of the bin... 阅读全文
摘要:
Tree SummingBackgroundLISP was one of the earliest high-level programming languages and, with FORTRAN, is one of the oldest languages currently being ... 阅读全文
摘要:
Team QueueQueuesandPriority Queuesare data structures which are known to most computer scientists. TheTeam Queue, however, is not so well known, thoug... 阅读全文
摘要:
Max SumTime Limit: 2000/1000 MS (Java/Others)Memory Limit: 65536/32768 K (Java/Others)Total Submission(s): 97273Accepted Submission(s): 22426Problem D... 阅读全文
摘要:
Problem B: Myacm TrianglesSource file:triangle.{c,cpp,java,pas}Input file:triangle.inOutput file:triangle.outThere has been considerable archeological... 阅读全文
摘要:
Problem A: BilliardIn a billiard table with horizontal sideainches and vertical sidebinches, a ball is launched from the middle of the table. Afters> ... 阅读全文
摘要:
Inscribed Circles and Isosceles TrianglesGiven two real numbersBthe width of the base of an isosceles triangle in inchesHthe altitude of the same isos... 阅读全文
摘要:
Problem EThe Other Two TreesInput:standard inputOutput:standard outputTime Limit:2 secondsYou have a quadrilateral shaped land whose opposite fences a... 阅读全文
摘要:
Problem BCode RefactoringTime Limit: 2 seconds"Harry, my dream is a code waiting to bebroken. Break the code, solve the crime."Agent CooperSeveral alg... 阅读全文
摘要:
Problem F: Factoring Large NumbersOne of the central ideas behind much cryptography is that factoring large numbers is computationally intensive. In t... 阅读全文
摘要:
Pseudo-Random NumbersComputers normally cannot generate really random numbers, but frequently are used to generate sequences of pseudo-random numbers.... 阅读全文
摘要:
Uniform GeneratorComputer simulations often require random numbers. One way to generate pseudo-random numbers is via a function of the formwhere ``" i... 阅读全文