Bob and Alice started to use a brand-new encoding scheme. Surprisingly it is not a Public Key Crypto
Maya Calendar During his last sabbatical, professor M. A. Ya made a surprising discovery about the o
Tree Recovery Little Valentine liked playing with binary trees very much. Her favorite game was cons
All in All You have devised a new encryption technique which encodes a message by inserting betwe
System Overload Recently you must have experienced that when too many people use the BBS simultane
The Dir Command We all know the dos command "dir" . It can list the files in the computer . When we
You are to write an interpreter for a simple computer. This computer uses a processor with a small n
Pascal requires that real constants have either a decimal point, or an exponent (starting with the l
The Caesar Cipher One of the simplest examples of a substitution cipher is the Caesar cipher, which
病毒名称(中文): 病毒别名: 威胁级别: ★★☆☆☆ 病毒类型: 宏病毒 病毒长度