原创 在VS.NET 2005 beta1中添加自定義工具
本人是新手 文中有不中足之處請多指正 ildasm是一個經常用到的工具,使用時一般有兩種方法:在run窗口中輸入ildasm,然後再打開所調試的程序;在cmd找到生成的.exe文件目錄,輸入ildasm app.exe(本文以app.e
原创 .NET Framework General Reference - Capitalization Styles
Use the following three conventions for capitalizing identifiers. Pascal case The first letter in the identifier and th
原创 acm.jlu.edu.cn-2098-All in All
All in All You have devised a new encryption technique which encodes a message by inserting between itscharacters rando
原创 acm.jlu.edu.cn-1552-Identifying Legal Pascal Real Constants
Pascal requires that real constants have either a decimal point, or an exponent(starting with the letter e or E, and of
原创 複製某一目錄下的所有文件
class App{ /// <summary> /// 複製指定目錄的所有文件,不包含子目錄 /// </summary> /// <param name="sourceDir">原始目錄</param>
原创 acm.jlu.edu.cn-1317-Tree Recovery
Little Valentine liked playing with binary trees very much. Her favorite game was constructing randomly looking binary
原创 如何取得其它程序輸出結果
主題: 如何獲取控制檯程序的運行結果? 作 者: answered (愛才的) 等 級: 信 譽 值: 100 所屬社區: .NET技術 C# 問題點數: 100 回覆次數: 3 發表時間: 2005-02-28 2
原创 acm.jlu.edu.cn-1071-Maya Calendar
Maya CalendarDuring his last sabbatical, professor M. A. Ya made a surprising discovery about the old Maya calendar. Fr
原创 acm.jlu.edu.cn-2005-The Dir Command
The Dir CommandWe all know the dos command "dir" . It can list the files in the computer . When we use the file name wi
原创 JOJ-2033-Towers of Hanoi
Tomorrow is Kate's birthday, Kate is a lovely girl aged 20. This Contest is held for her birthday and I want everyone
原创 acm.jlu.edu.cn-1099-Simple Computers
You are to write an interpreter for a simple computer. This computer uses a processor with a small number of machine in
原创 JOJ-2165-Hilbert Curve
The pictures above are Hilbert curve.You can see a Hilbert curve with a certain recursion depth n is composed of four d
原创 對象序列化
using System;using System.IO;using System.Diagnostics;using System.Reflection;using System.Runtime.Serialization;using
原创 JOJ-1018-Anagrams by Stack
How can anagrams result from sequences of stack operations? There are two sequences of stack operators which can conver
原创 acm.jlu.edu.cn-1068-Cipher
Bob and Alice started to use a brand-new encoding scheme. Surprisingly it is not a Public Key Cryptosystem, but their e