Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - TI
Search - TI - List
1.n个叶结点,权分别为w1,w2,• • • ,wn的二叉树中,带权路径长度WPL最小的二叉树叫最优二叉树, 也叫霍夫曼树。 2.霍夫曼算法:1)根据给定的权值{w1,w2,• • • ,wn}构造n个二叉树F={T1,T2,• • • ,Tn}每个Ti只有一个根结点,权为wi。2)在F中选取两棵根结点的权值最小的树 构成一棵新的二叉树,其根的权值为左右子树根的权值的和。3)F中删去这两棵树,加上新得的树。4)重复2)3)直到只剩一棵树。 -1. N leaf nodes, the right to w1, w2, # 8226 # 8226, wn the binary tree, with the right path length WPL smallest binary tree called Optimal binary tree, the tree is also called Hoffman. 2. Hoffman algorithm : 1) According to the weights (w1, w2, # 8226 # 8226 # 8226, wn) n binary tree structure F = (T1, T2, # 8226 # 8226 # 8226, Tn) each only a Ti Root, the right to wi. 2) In 1984 two F Root in the value of the right to the smallest tree constitute a new binary tree, the roots of the right value for the son around the roots and the value of the right. 3) F deleted these two trees, coupled with the new tree. 4) repeat 2) 3) until only a tree.
Date : 2008-10-13 Size : 1.62kb User : yy

DL : 0
一个ASP的珠算题录入生成程序,包括题型设置,录入题库,生成题库等!-an ASP Abacus generation that entry procedures, including Questions installed, logging questions, such as database generation!
Date : 2008-10-13 Size : 28.43kb User : 之点

Stealth Bomber is an ti-virus utility. It performs simple checks by looking for suspicious behaviour in the operating system and checks files with one of the most effective weapons against computer viruses: the Cyclic Redundancy Check, or CRC
Date : 2008-10-13 Size : 52.1kb User : 林菁明

DL : 0
TI公司的DSP,TMS3202812的大部分库文件
Date : 2008-10-13 Size : 51.16kb User : 王丽

ti tms320lf2407的测试程序-ti tms320lf2407 testing procedures
Date : 2008-10-13 Size : 222.5kb User : 阿斌

DL : 0
osk5912 omap5912 ti omap
Date : 2024-03-15 Size : 14.86mb User : nani2220
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.