In the last blog, there are three query condition to be described. In the blog, we wil...
分类:
数据库 时间:
2014-09-22 03:37:02
阅读次数:
255
In the last blog, we talked about the basic operation of MongoDB, including insert, query, remove and update. Now in this blog, we will further hava a good understanding of querying operation.
At f...
分类:
数据库 时间:
2014-09-22 01:35:41
阅读次数:
233
Problem Description
Corrupt governors always find ways to get dirty money. Paint something, then sell the worthless painting at a high price to someone who wants to bribe him/her on an auction, this ...
分类:
其他好文 时间:
2014-09-20 22:56:29
阅读次数:
258
Problem Description
Corrupt governors always find ways to get dirty money. Paint something, then sell the worthless painting at a high price to someone who wants to bribe him/her on an auction, this ...
分类:
其他好文 时间:
2014-09-20 20:23:09
阅读次数:
289
采用LR(1)技术,写了一个C语言的语法归约器!之所以用LR(1)是因为gcc,tcc,ucc和lcc跟商量好似的,清一色的用的LL归约技术,书上也是讲的跟天花一样漂亮,如果再使用LL技术实在是炸不出价值来,源码一抓一大把,看看就够了,重写必要性不大!另外,书中的LR技术讲的项集又是大的没谱,工具YACC自动生成又不知道它玩的猫腻!最终用LR(1)自搞了一套方法high起来,效果还不错^!^...
分类:
其他好文 时间:
2014-09-20 14:07:27
阅读次数:
220
高可用基础知识讲解 一、高可用集群的定义 高可用集群,英文原文为High Availability Cluster,简称HACluster,简单的说,集群(cluster)就是一组计算机,它们作为一个整体向用户提供一组网络资源。这些单个的计算机系统 就是集群的节点(node)。 高可用集群的出现是为...
分类:
其他好文 时间:
2014-09-20 02:15:46
阅读次数:
287
Table of Contents
ForewordPreface
About This BookConventions Used in This BookSafari® Books OnlineHow to Contact UsContent Updates
May 23, 2014
I. Networking 101
1. Primer on Latency an...
分类:
Web程序 时间:
2014-09-18 22:20:04
阅读次数:
225
Problem Description
Today is the 10th Annual of “September 11 attacks”, the Al Qaeda is about to attack American again. However, American is protected by a high wall this time, which can be treatin...
分类:
其他好文 时间:
2014-09-18 00:52:23
阅读次数:
268
#include #include #include using namespace std;int BinSearch(vector ivec, int key) //循环实现的二分查找要比递归实现效率要高很多,推荐使用这种方法{ int low = 0, high = ivec.siz...
分类:
编程语言 时间:
2014-09-18 00:40:02
阅读次数:
292
长度为n的直线上有几个防御塔,每个防御塔都有攻击范围为[L,R],然后给出几个怪物的血量和出现位置,问能从出现位置走到末尾的有几个。对于每次输入的防御塔的L,R和他的攻击力d,a[L]+=d,a[R+1]-=d。然后从1到n累加一遍计算出每个位置的实际伤害。最后从末尾累加到开始计算后缀和。#incl...
分类:
其他好文 时间:
2014-09-17 18:34:42
阅读次数:
178