Binary search in C++ STL

Binary search in C++ STL Binary search is suitable for sequences with certain sequence Head file: #include<algorithm> usage method: a. Function template: binary search (arr [] + size, indx) b. Parameter Description: arr []: array first address size: number of array elements indx: value to ...

Posted by jlhaslip on Wed, 05 Feb 2020 01:51:46 -0800

Hexo Serverless Framework, simple three steps to build your personal blog

Many people want to have their own personal blog, but also look beautiful and cool.Especially for developers, not only can they share their technological insights, but they can also add points during interviews.Here are two useful artifacts. They can be done in 3 minutes without having to be busy at the ...

Posted by willchoong on Tue, 04 Feb 2020 17:41:05 -0800

After the value of the vue subcomponent is changed, a prompt will be given to confirm the change. Confirm and then change the value in the input box

Main idea: when the text box gets the focus, first assign the previous value to a variable, then click the confirm button to send the value to the parent component, and click the Cancel button to return the previous old value to the parent component. Substandard components <template> <!-- i ...

Posted by kreoton on Tue, 04 Feb 2020 09:09:59 -0800

Python full stack advanced programming skills 8.Python multitasking - Introduction to threads and processes

Article directory 1, Sharing global variable resource competition 2, Mutex and deadlock 1. mutual exclusive lock 2. deadlock Deadlock extension banker algorithm 3, Thread synchronization Condition 4, Multi task UDP chat 5, Process introduction 1. Concept analysis 2. Status of the process 3. Use pr ...

Posted by drucifer on Tue, 04 Feb 2020 04:58:09 -0800

Algorithm learning series - hash table, bloom filter, consistent hash, island problem, and concurrent query set

Article directory 1. Understand hash function and hash table 1.1 what is Hash 1.2 why there should be Hash 1.3 for example, chestnuts: 1. To use array storage, you need to create new arrays new int[]{2,5,9,13}, and then write a loop to traverse the search: 2. If the hash function is used for calcul ...

Posted by duk on Tue, 04 Feb 2020 00:09:04 -0800

Blue bridge: the price of perfection

Blue bridge: the price of perfection subject Problem description Palindrome string is a special string, which is read from left to right and right to left. Bruce Lee thinks the palindrome string is perfect. Now I will give you a string, which is not necessarily palindrome. Please calculate the minim ...

Posted by snipe7kills on Mon, 03 Feb 2020 21:23:47 -0800

Unity uses Shader to make glass windows in the rain learning notes

Unity uses Shader to make glass windows in the rain learning notes Blur background, simulate fog Make glass transparent Handwriting Fuzzy Algorithm https://www.youtube.com/watch?v=EBrAdahFtuo Watch the notes after the oil pipe god's tutorial. Blur background, simulate fog In the textured Inspec ...

Posted by crazy_carl on Mon, 03 Feb 2020 19:30:26 -0800

Data structure -- tree heap, Huffman tree, Huffman code, and search set

Heap (heap) It is mentioned in linear structure queue that a queue is called Priority Queue. The priority of getting elements is based on the priority of elements, not the priority of elements entering the queue. How to organize priority queues? We use the complete binary tree to represent the priorit ...

Posted by matty on Mon, 03 Feb 2020 01:44:35 -0800

python multithreading programming: analysis of python multithreading synchronization instance

Process to process communication and thread synchronization is an ever-changing topic. You should know a little about programming, but you can't say it in detail. On the one hand, in addition to the less possible use in the work, on the other hand, these concepts involve more and deeper things. Network ...

Posted by doremi on Sun, 02 Feb 2020 22:54:11 -0800

RocketMQ practice -- high concurrency seckill scenario

1. Preface Seckill is essentially a short-term, sudden and high concurrent access problem. Its business features are as follows: Triggered by timing, the flow suddenly increases in an instant Only some of the requests for seckill are successful Seckill products are often limited in quantity, not over ...

Posted by fatepower on Sun, 02 Feb 2020 22:06:54 -0800