Search:

Type: Posts; User: KONI

Page 1 of 18 1 2 3 4

Search: Search took 0.03 seconds.

  1. Replies
    11
    Views
    1,523

    A semicolon ( ; ) is a punctuation mark used to...

    A semicolon ( ; ) is a punctuation mark used to separate words opposed in meaning and to mark off interdependent statements. It binds two sentences more closely than they would be if separated by a...
  2. Replies
    19
    Views
    3,575

    1. What is the return value of the function if...

    1. What is the return value of the function if the array is empty ? This is an important choice and might influence the used algorithm greatly.

    2. Another simple idea is to sort the array...
  3. Replies
    15
    Views
    6,008

    Well, one of the advantages of a double linked...

    Well, one of the advantages of a double linked list is that you can iterate it in two directions. To be able to iterate it backwards though, you need a pointer to the last element (the tail).


    ...
  4. Thread: regarding xml

    by KONI
    Replies
    6
    Views
    1,216

    Either you're using XML or you don't. If you use...

    Either you're using XML or you don't. If you use incorrect element names, you're not using XML and the whole advantage of XML is to be exploitable easily. Think about it ... either write an ENTIRE...
  5. Replies
    1
    Views
    2,927

    Nested array vs. tree

    I'm currently writing on a paper about evaluation and comparison of Rich Internet Application technologies and am currently researching the effects of different data structures to store the data. I'm...
  6. Replies
    4
    Views
    2,972

    Chuck Norris owns every button

    Chuck Norris owns every button
  7. Replies
    3
    Views
    2,779

    I couldn't find any such directive in the HTTP...

    I couldn't find any such directive in the HTTP Authentication: Basic and Digest Access Authentication RFC.
  8. Replies
    47
    Views
    13,591

    You're discussing part-of-speech tagging of...

    You're discussing part-of-speech tagging of natural language here, which is considered "solved" (almost solved) and for which there exist very robust programs already. I linked to some part of speech...
  9. Replies
    5
    Views
    4,879

    You need to prototype or declare the functions in...

    You need to prototype or declare the functions in the code prior to using them.
  10. Replies
    47
    Views
    13,591

    You're completely forgetting the fact that...

    You're completely forgetting the fact that natural language is by definition ambiguous.
    Sometimes writers don't want you to know if something is a verb or a noun and they make full usage of the two...
  11. Replies
    17
    Views
    16,017

    Here are a few guidelines: - You somehow need...

    Here are a few guidelines:

    - You somehow need to store where the cannibals/missionaries are (on what bank). Of course you could have 6 different variables but a slightly better approach would be...
  12. Replies
    17
    Views
    16,017

    well, we're not going to give you the answer...

    well, we're not going to give you the answer right away (if at all). Try to solve the problem on paper, write down how you solved it and then translate the solution into code.
  13. Replies
    17
    Views
    16,017

    What have you got so far ?

    What have you got so far ?
  14. Replies
    47
    Views
    13,591

    Let's throw a bit of theory into this, shall we:...

    Let's throw a bit of theory into this, shall we:

    Computational processing of textual data

    Interesting parts:

    Part-of-Speech tagging (Brill, HMM)

    Part-of-Speech tagging (HMM ctnd.)
  15. Thread: Holiday in Europe

    by KONI
    Replies
    10
    Views
    3,760

    Oh my god, that's probably the worst attitude one...

    Oh my god, that's probably the worst attitude one can have towards traveling (and other cultures, religions and people in general). I think I can guess what that country of yours is already ...
  16. Thread: Holiday in Europe

    by KONI
    Replies
    10
    Views
    3,760

    What about the CERN...

    What about the CERN
  17. Thread: Holiday in Europe

    by KONI
    Replies
    10
    Views
    3,760

    When you pass Luxembourg, post me a note and I'll...

    When you pass Luxembourg, post me a note and I'll take you for a drink.
  18. Replies
    3
    Views
    1,495

    What exactly do you want to know ? The...

    What exactly do you want to know ?

    The comparison is fairly simple: such sites either have an automated process to extract information or a team of workers to extract the needed information and...
  19. Replies
    10
    Views
    2,913

    Here: http://www.google.com/coop/cse/ I win !

    Here: http://www.google.com/coop/cse/

    I win !
  20. Replies
    31
    Views
    10,773

    distributed.net (http://www.distributed.net/des/)...

    distributed.net was able to break the 56-bit DES key in less than 24 hours. It uses a system like Seti@Home or Folding@Home, breaking the keyspace into small blocks and distributing the key search...
  21. Replies
    31
    Views
    10,773

    Deep Crack...

    Deep Crack, build in 1998 could test 90 billion keys per second, that's already a lot more than "10000" passwords a second. But it is true that bruteforce attacks are for idiots, as you can see here....
  22. Replies
    12
    Views
    5,195

    Inspired by the strcpy source code, you could do...

    Inspired by the strcpy source code, you could do this:



    for (; (*target = *source) != 0; ++target, ++source);
  23. Replies
    20
    Views
    6,865

    Sorry, that is just hilarious. "Omg, look, it's a...

    Sorry, that is just hilarious. "Omg, look, it's a girl ... it must be Madeleine".

    I do feel for her parents (and for herself of course) but the chances of finding her are rather small....
  24. Replies
    13
    Views
    3,791

    You should probably know all the existing...

    You should probably know all the existing algorithms, even if you can't implement them. You should be able to understand (very good) the algorithms of linear data structures, trees, graphs and...
  25. Thread: Geo-Location

    by KONI
    Replies
    3
    Views
    1,947

    It's called a "visual traceroute", you may find...

    It's called a "visual traceroute", you may find an example here.

    And this has nothing to do with C, it's related to the hundreds of other threads you recently asked in the Networking Forum.
Results 1 to 25 of 446
Page 1 of 18 1 2 3 4