- Strength to Increase Rep
- +0
- Strength to Decrease Rep
- -0
- Upvotes Received
- 1
- Posts with Upvotes
- 1
- Upvoting Members
- 1
- Downvotes Received
- 0
- Posts with Downvotes
- 0
- Downvoting Members
- 0
i have a file of the form [CODE](9430, 3656) (9147, 14355) (133, 14393) (7917, 9513) (3719, 12775)[/CODE] lets say i need to store it as a hash.such that 9430=>3656 and so on.I tried using split but it takes whitespaces for right hand values.How can i do it the better way? |
|
I have a hash %d,i want the top five valued keys.I did the following wich worked but is there anything more effecient? [ICODE]@p=(reverse sort{$d{$a}<=>$d{$b}} keys%d)[0..4];[/ICODE] |
|
how do i read input from a file into a 2D array, the file is in the format.. 5 6 101010 101010 101010 101010 101010 where 5 denotes 5 rows and 6 denotes 6 columns.I need to read it all into a 2D array but With one major requirement the … |
|
i want to be able to treat contents of a file as an array and traverse through it that way without having to store them in an array,can i do that?if so how? |
|
i need help using MAC from javax.crypto package. i am able to generate MAC codes using keys but i am getting different mac's for the same message using the same key.can anyone plz give a small foolproof code to generate mac from say a small message like "hello world" so … |
|
if i have information like this a->b->c->d->MESSAGE,how do i tokenize it such that i get a,b->c->d->MESSAGE from the original string??????????? |
|
i am doing a project in which i simulate symmetric encryption in routers.so hav to store secret keys for mac encryption in a symmetric matrix.how do i do it?????????should i convert them to strings and then store strings in a matrix??????? URGENT HELP NEEDED!!!!!!!!! |
|
can we generate a MAC for a text file in javax.crypto and generate a MAC stored in a String variable?????????????? |
|
i am participating in an online prog contest and only recently started learning perl. I am programming in windows environment while the contest requires programs executable in linux environment. The program takes input,a file name, as the first argument in the command line and generates output in the console itself … |
|
[url]http://sparrow.ece.cmu.edu/~adrian/projects/secure-routing/ndss03.pdf[/url] I want to know if we can implement this paper entirely with java.It is a security mechanism for routing protocols---we cannot afford routers so thinking of simulating them. |