文件名称:check
-
所属分类:
- 标签属性:
- 上传时间:2013-03-08
-
文件大小:11.68kb
-
已下载:0次
-
提 供 者:
-
相关连接:无下载说明:别用迅雷下载,失败请重下,重下不扣分!
介绍说明--下载内容来自于网络,使用问题请自行百度
1.利用实验一建立的有序表,采用折半查找实现对某一已知的关键字的查找。
2.随机产生一组关键字,利用二叉排序树的插入算法建立二叉排序树,然后删除某一指定关键字元素。
3.已知散列函数为H(key)=key p(p为自定义的常数),冲突处理方法分别为线性探测法和外拉链法,建立散列表并实现查找某一指定关键字元素。-1. Experiment established orderly table, using a binary search to achieve a known keyword search. 2. Randomly generated a set of keywords, binary sort tree insertion the build binary sort tree algorithm, and then delete a specified keyword elements. 3. Known hash function H (key) = key p (p is a constant custom) conflict handling methods were linear detection method and outside zipper method, set up the hash table and Find a designated keyword element.
2.随机产生一组关键字,利用二叉排序树的插入算法建立二叉排序树,然后删除某一指定关键字元素。
3.已知散列函数为H(key)=key p(p为自定义的常数),冲突处理方法分别为线性探测法和外拉链法,建立散列表并实现查找某一指定关键字元素。-1. Experiment established orderly table, using a binary search to achieve a known keyword search. 2. Randomly generated a set of keywords, binary sort tree insertion the build binary sort tree algorithm, and then delete a specified keyword elements. 3. Known hash function H (key) = key p (p is a constant custom) conflict handling methods were linear detection method and outside zipper method, set up the hash table and Find a designated keyword element.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
check.doc
本网站为编程资源及源代码搜集、介绍的搜索网站,版权归原作者所有! 粤ICP备11031372号
1999-2046 搜珍网 All Rights Reserved.