Design and analyze an algorithm that searchs for an element x in a sorted table A(with n elements), so that its complexity is O(logD). D stands for distance, counting the amount of elements between the first element and the element x in table A. Simpler, D is the position of the element x in the sorted table A.

Member Avatar
Member Avatar
+0 forum 3

There's the text given (Duomenys.txt). The program removes vowels of the longest words in each line. How do you redo the program to find numbers in the line (starting with -+0123456789) and insert the word NUMBER before these numbers (in the results file). [CODE]const char Cduom[] = "Duomenys.txt"; // data file const char Crez[] = "Rezultatai.txt"; // results file const char Canalize[] = "Analize.txt"; // analysis file #include <string> #include <fstream> #include <iomanip> using namespace std; void ApdorotiTeksta(const char dfv[], const char rfv[], const char afv[]); // work text void AnalizuotiEilute(string eil, string & IlgZodis, int & IlgZPradzia, unsigned int …

Member Avatar
Member Avatar
+0 forum 1

I have some doubt regarding keyword analysis; please some one answer to this Below are the keywords I have picked for one of my page but I have some doubt regarding the keywords Global monthly Searches Local Monthly Searches Sales Training Program 9,900 800 Sales Training programs 6,600 590 Sale training Course 27,100 1,900 Sale Training Courses 22,200 1000 How to optimize the above 4 keywords in title tag which keywords I have pick Program or programs Course or courses

Member Avatar
Member Avatar
+0 forum 1

I would like to ask you to share with us your experiences in situations, where you suddenly realized that your approach to solution was stupid. And by taking other angle to problem it became easy. Or you thought one question and realized later that actually you should have asked another question ie "You were barking the wrong tree.".

Member Avatar
Member Avatar
+0 forum 3

Hi, i've been looking around the web but could not find anything about the filestructure of the following file: [CODE]{"tickets":[{"name":"Test", "id":"906935000", "description":"gültig", "userID":"310000", "price":"Preis: 1,90€", "productID":"119", "checksum":"6017", "dailyCode":"u", "hourlyCode":"y", "barcode":"", "rebuyLink":"191000", "buydate":"52744", "buydateString":"17.08.2011", "legalNote":".", "validString":"gültig bis 17.08.2011", "demo":true, "validDescription":"gültig in 210"}], "currentMonthExpenses":"1,90€", "getMoreTicketsAvailable":false, "monthlyTurnover":170};[/CODE] This .dat-File is generated in javacode. (no source public) I'm just lazy and dont want to write my own parser in java. ^^ There are methods like ObjectOutputStream and XMLEncoder/XMLDecoder but thats not XML and not binary as we can see. Does anyone know what type of structure this is? Or better: does anyone know a …

Member Avatar
Member Avatar
+0 forum 4

Hey guys, so im building this application using ASP.net (visual studio 2005) and i have few dropdown lists. the dropdown list has an arrow beside it. when u hover over it, it says "choose data source". i click on it but there seems like no option to connect to analysis server. there are other options available such as database, object etc etc. How do i connect to the analysis server so that i could use values from my cube to make the drop down list? basically i am going to use those drop downs as my dimensions. thanks in advanced …

Member Avatar
Member Avatar
+0 forum 10

A Friend has asked me to make him a program where the user can select a song, and there is a music Spectrum analyzer (Like the one in VLC)and the user can customise the colours of the player. i have done the code for selecting the song but i need help with the music spectrum. Any help will be greatly Appreciated. Denholm :)

Member Avatar
Member Avatar
+0 forum 2

[B]I am doing a mini project on traffic redundancy elimination methods as my mini project...i want to know how to monitor and find repetitive http requests traverse through a pc acting as aproxy server (eg: like a no: of laptops connected to a single lap acting as a proxy server) .any help would be appreciated...[/B]...

Member Avatar
+0 forum 0

An analysis of 100 million security software installations in 144 countries claims to have determined just where the most dangerous, places to access the Internet are. The results are surprising to say the least. [attach]16939[/attach]The results of [URL="http://www.avg.com"]AVG Technologies' first ever Global Threat Index[/URL] report were published yesterday, and concentrated on answering one question: where in the world are you most likely to be hit by a malicious computer attack or virus? The answer, it would seem, would be the Caucasus region. Web surfers in Turkey, Russia, Armenia and Azerbaijan are the most likely to face security threats whilst using …

Member Avatar
Member Avatar
+0 forum 11

I write like Dan Brown. At least, that's according to the I Write Like [URL="http://iwl.me/"]site[/URL], which was sweeping the Intertubes yesterday (more than 100,000 [URL="http://www.codingrobots.com/blog/2010/07/14/100000-in-one-day/"]hits [/URL]in a single day) as people tried to find out which Famous Writer their deathless prose most resembled. (Brown is the critically slammed author of[I] The DaVinci Code.[/I]) [ATTACH=right]15835[/ATTACH] The site was put up on July 9 by Coding Robots, a Silicon Valley-based developer, according to the company's [URL="http://www.codingrobots.com/blog/2010/07/09/i-write-like/#comments"]blog[/URL]. "Currently it analyzes vocabulary (use of words), number of words, commas, and semicolons in sentences, number of sentences with quotation marks and dashes (direct speech)," wrote …

Member Avatar
Member Avatar
+0 forum 3

I used to use this site all thetime but i have been outta the computer game for 2 years and need some help. I have multiple error mainly when trying to install things... Like a dvd player and filehippo's update checker. I also had a Dr Watson Postmortem error a couple times and missing dll files. my computer is also running a partition Here is my HJT logfile Logfile of Trend Micro HijackThis v2.0.4 Scan saved at 4:49:18 PM, on 7/14/2010 Platform: Windows XP SP3 (WinNT 5.01.2600) MSIE: Internet Explorer v8.00 (8.00.6001.18702) Boot mode: Normal Running processes: I:\WINDOWS\System32\smss.exe I:\WINDOWS\system32\winlogon.exe I:\WINDOWS\system32\services.exe …

Member Avatar
Member Avatar
+0 forum 4

The latest MessageLabs spam index reveals that relative to its market share, any given Linux machine is five times more likely to be sending spam than any given Windows machine. But what are the facts behind those headline grabbing numbers and can Windows really get off the hook that easily? MessageLabs Intelligence Senior Analyst, Paul Wood has spoken out on the much discussed issue of spam being a Windows generated problem, noting that it is "more commonly sent from computers running Windows than from those running other operating systems" but adding "spam not identified as coming from botnets was seen …

Member Avatar
Member Avatar
+0 forum 5

I have a lot of passwords to get me onto various online sites and services, but I only need to remember one: the complex and hard to crack one that unlocks my encrypted password store. Not everyone is as paranoid as I am it seems, and many fall neatly into the dumbass category if a recent analysis of 32 million consumer passwords is anything to go by. A data security company called Imperva undertook a [URL="http://www.imperva.com/ld/password_report.asp"]detailed analysis[/URL] of breached consumer passwords, and the very fact that they ended up in the 32 million breached passwords database suggests that they were …

Member Avatar
Member Avatar
+1 forum 1

After running a Google campaign, you will get a long data report. Other than looking for the obvious, CTR, what else do you look for, both from a tatical and strategic level?

Member Avatar
Member Avatar
+0 forum 2

It's good news for those in the security business, according to Gartner at least. It is predicting that security software and services spending will outpace other IT spending areas in 2010. The Gartner [URL="http://www.gartner.com/DisplayDocument?ref=g_search&id=1141513&subref=simplesearch"]report[/URL] suggests that security software budgets will grow by approximately 4% in 2010, while security services budgets will grow almost 3%. Earlier this year Gartner surveyed more than 1,000 IT professionals with budget responsibility worldwide to determine their budget-planning expectations for 2010 and the results form the basis of this new report. "In the current highly uncertain economic environment, with overall IT budgets shrinking, even the modest …

Member Avatar
+0 forum 0

The End.