Pre-requisites : Fork System Call Fork bomb Bash fork bomb : :(){:&:&};: Working in Unix : In Unix-like operating systems, fork bombs are generally written… Read More »

#
All Expert Articles

We are aware of calculating factorials using loops or recursion, but if we are asked to calculate factorial without using any loop or recursion. Yes,… Read More »

Given a positive number n (n > 1), round-off this number to a given no. of significant digits, d. Examples: Input : n = 139.59… Read More »

Lychrel Number is a natural number that cannot form a palindrome through the iterative process of repeatedly reversing its digits and adding the resulting numbers.… Read More »

Searches the range [first, last) for the first occurrence of two consecutive elements that match, and returns an iterator to the first of these two… Read More »

Given a function f(x) on floating number x and three initial distinct guesses for root of the function, find the root of function. Here, f(x)… Read More »

Background Elliptic Curve Cryptography (ECC) is an approach to public-key cryptography, based on the algebraic structure of elliptic curves over finite fields. ECC requires a… Read More »

Can we use keywords in place of operators in C++ ? Yes, certainly, we can. The ANSI C++ Standard has proposed keywords for several C++… Read More »

We use g++ compiler to turn provided C code into assembly language. To see the assembly code generated by the C compiler, we can use… Read More »

RAPTOR(Rapid Algorithmic Prototyping Tool for Ordered Reasoning) is a free graphical authoring tool created by Martin C. Carlisle, Terry Wilson, Jeff Humphries and Jason Moore,… Read More »

We are given 2*N – 1 integers. We need to check whether it is possible to construct a Range Minimum Query segment tree for an… Read More »

The main objective of this project is to build an efficient recommendation engine based on graph database(Neo4j). The system aims to be a one stop… Read More »

Prerequisites : Input/Output from external file in C/C++, Java and Python for Competitive Programming In above post, we saw a way to have standard input/output… Read More »

Ccrypt is command line tool for encryption and decryption of data. Ccrypt is based on the Rijndael cipher, the same cipher used in the AES… Read More »

We have discussed generators in Set 1. We have also discussed three distributions in Set 2. In this post, more distributions are discussed. IV.Rate-based Distributions:… Read More »

Prerequisite – JAR file format Whenever a developer wants to distribute a version of his software, then all he want is to distribute a single… Read More »

Consider a 2-way set associative cache with 256 blocks and uses LRU replacement, Initially the cache is empty. Conflict misses are those misses which occur… Read More »

Round 1 Devise a dice using one coin Stock buy sell problem What is BFS in Tree I have two coins winning strategy Round 2… Read More »

In previous article, we have discussed about the concepts related to Binomial heap. Examples Binomial Heap: 12————10——————–20 / \ / | \ 15 50 70… Read More »

Java.io.DataInputStream class in Java | Set 1 More Methods: byte readByte() : Reads and returns one input byte. Syntax:public final byte readByte() throws IOException Returns:… Read More »