Welcome![Sign In][Sign Up]
Location:
Search - alice and bob

Search list

[Linux-UnixDistributedMedian

Description: Distributed Median,Alice has an array A, and Bob has an array B. All elements in A and B are distinct. Alice and Bob are interested in finding the median element of their combined arrays.
Platform: | Size: 1659 | Author: zhoushusen | Hits:

[Linux-UnixDistributedMedian

Description: Distributed Median,Alice has an array A, and Bob has an array B. All elements in A and B are distinct. Alice and Bob are interested in finding the median element of their combined arrays. -Distributed Median, Alice has an array A, and Bob has an array B. All elements in A and B are distinct. Alice and Bob are interested in finding the median element of their combined arrays.
Platform: | Size: 1024 | Author: zhoushusen | Hits:

[Telnet ServerKeboros

Description: 基于Kerboros的通信客户端服务器,包括四个模块,Alice,AS,TGS和Bob-Kerboros based on client-server communication, including the four modules, Alice, AS, TGS and Bob
Platform: | Size: 1719296 | Author: Renee Zeng | Hits:

[OtherSingle-point-log

Description: 单点登录源代码,其中BOB开两个程序,被认为BOB,和ALIC两个用户,BOB与ALICE想要通信,AS,TGS为服务器,帮助他们交换密码,保护通信安全-Single Sign-source code, one of the two specific procedures BOB was considered BOB, and ALIC two users, BOB and ALICE want communication, AS, TGS for the server to help them exchange of passwords, protection of communications security
Platform: | Size: 159744 | Author: zhang | Hits:

[Windows DevelopLab1_Part1

Description: 基于语言的安全代码的小实现:Alice and Bob 参加考试,多选实验场景的模型-Language-based security code implementation. In this lab you have to implement a model of a multiple choice exam for the scenario where students Alice and Bob are taking the exam.
Platform: | Size: 7168 | Author: xmeteor | Hits:

[JSP/Javabob_and_alice

Description: BOB和Alice采用java加密算法进行通话的模拟程序-BOB and Alice calls the simulation program using java encryption algorithm
Platform: | Size: 26624 | Author: star | Hits:

[CA authcertificate

Description: 模仿CA颁发证书模式,模拟证书颁发与认证。并假设Alice给Bob发送加密后的文档及文档的签名,Bob验证Alice证书的正确性和加密文档的正确性并最终解密文档。执行顺序为CA_Key-->CA-->Alice-->拷贝Alice的证书和加密文档给Bob-->Bob-Imitation of the CA that issued the certificate mode, analog certification and certification. And assume Alice to send Bob an encrypted document and the signature, Bob to verify Alice certificates of correctness and the correctness of the encrypted document and eventually decrypt the document.Run as CA_Key-->CA-->Alice-->copy Alice s certificate and encrypted document to Bob-->Bob
Platform: | Size: 23552 | Author: 林涵 | Hits:

[Mathimatics-Numerical algorithmsfind_the_marble

Description: 利用动态规划算法解决猜测弹珠位置的问题Alice and Bob are playing a game. This game is played with several identical pots and one marble.-Alice and Bob are playing a game. This game is played with several identical pots and one marble. When the game starts, Alice puts the pots in one line and puts the marble in one of the pots. After that, Bob cannot see the inside of the pots. Then Alice makes a sequence of swappings and Bob guesses which pot the marble is in. In each of the swapping, Alice chooses two different pots and swaps their positions. Unfortunately, Alice s actions are very fast, so Bob can only catch k of m swappings and regard these k swappings as all actions Alice has performed. Now given the initial pot the marble is in, and the sequence of swappings, you are asked to calculate which pot Bob most possibly guesses. You can assume that Bob missed any of the swappings with equal possibility. Input There are several test cases in the input file. The first line of the input file contains an integer N (N ≈ 100), then N cases follow. The first line of each test case contains 4 integers n, m, k and s(0 < s
Platform: | Size: 1024 | Author: 曦馨 | Hits:

[CA authcertificate

Description: 证书制作, 数字签名,证书颁发,身份识别。-Imitate CA certificate model, simulate a certificate and the authentication. And assumed that Alice to Bob send encrypted document after document and signature, Bob verify the correctness of the Alice certificate and the correctness of the final document encryption and decryption document.
Platform: | Size: 319488 | Author: 聂小倩 | Hits:

[Othercommunicate-program

Description: Alice和Bob还有其他几位好朋友在一起玩传话游戏。这个游戏是这样进行的:首先,所有游戏者按顺序站成一排,Alice站第一位,Bob站最后一位。然后,Alice想一句话悄悄告诉第二位游戏者,第二位游戏者又悄悄地告诉第三位,第三位又告诉第四位……以此类推,直到倒数第二位告诉Bob。两位游戏者在传话中,不能让其他人听到,也不能使用肢体动作来解释。最后,Bob把他所听到的话告诉大家,Alice也把她原本所想的话告诉大家。 由于传话过程中可能出现一些偏差,游戏者越多,Bob最后听到的话就与Alice所想的越不同。Bob听到的话往往会变成一些很搞笑的东西,所以大家玩得乐此不疲。经过几轮游戏后,Alice注意到在两人传话中,有些词汇往往会错误地变成其他特定的词汇。Alice已经收集到了这样的一个词汇转化的列表,她想知道她的话传到Bob时会变成什么样子,请你写个程序来帮助她。-Alice and Bob, there are several other good friends to play together messenger games. This game is like this: First of all, all the players in order to stand in a row, Alice Station, the last bit of Bob station. Then, Alice wants to whisper a word of the second game, the second game and quietly told third place, third place and tell the fourth ... and so on, until the penultimate told Bob. Two games in the messenger, so that other people can not hear, can not use body movements to explain. Finally, Bob he heard the words to tell you, Alice is also her original thought, then tell you. Some deviations may occur due to the process of messenger, games more Bob last to hear Alice think more different. Bob to hear often turn into some very funny things, so we play this way. After several rounds of games, Alice noticed two messenger, some words are often incorrectly into other specific vocabulary. Alice has such a word into the list, she wanted to know when what will become of her, then sp
Platform: | Size: 201728 | Author: 王璐婷 | Hits:

[Otherlucky

Description: .幸运抽奖 Alice和Bob最近在玩一个抽奖游戏, 游戏规则如下: 考虑题意可知: Alice所有可能的抽奖结果有C(N, K)种, Bob的也是. 故两者一起的所有抽奖结果有S = C(N, K) * C(N, K)种. -The lucky draw Alice and Bob recently played a lottery game, the rules of the game is as follows: Consider the question is: Alice all possible lottery results have C (N, K), Bob is. Therefore, together with all the lottery results are S = C (N, K)* C (N, K).
Platform: | Size: 4096 | Author: jet | Hits:

CodeBus www.codebus.net