原创 在VS.NET 2005 beta1中添加自定義工具

本人是新手 文中有不中足之處請多指正  ildasm是一個經常用到的工具,使用時一般有兩種方法:在run窗口中輸入ildasm,然後再打開所調試的程序;在cmd找到生成的.exe文件目錄,輸入ildasm app.exe(本文以app.e

原创 .NET Framework General Reference - Capitalization Styles

Use the following three conventions for capitalizing identifiers. Pascal case The first letter in the identifier and th

原创 acm.jlu.edu.cn-2098-All in All

All in All You have devised a new encryption technique which encodes a message by inserting between itscharacters rando

原创 acm.jlu.edu.cn-1552-Identifying Legal Pascal Real Constants

Pascal requires that real constants have either a decimal point, or an exponent(starting with the letter e or E, and of

原创 複製某一目錄下的所有文件

class App{ /// <summary> /// 複製指定目錄的所有文件,不包含子目錄 /// </summary> /// <param name="sourceDir">原始目錄</param>

原创 acm.jlu.edu.cn-1317-Tree Recovery

Little Valentine liked playing with binary trees very much. Her favorite game was constructing randomly looking binary

原创 如何取得其它程序輸出結果

主題: 如何獲取控制檯程序的運行結果? 作  者: answered (愛才的) 等  級: 信 譽 值: 100 所屬社區: .NET技術 C# 問題點數: 100 回覆次數: 3 發表時間: 2005-02-28 2

原创 acm.jlu.edu.cn-1071-Maya Calendar

Maya CalendarDuring his last sabbatical, professor M. A. Ya made a surprising discovery about the old Maya calendar. Fr

原创 acm.jlu.edu.cn-2005-The Dir Command

The Dir CommandWe all know the dos command "dir" . It can list the files in the computer . When we use the file name wi

原创 JOJ-2033-Towers of Hanoi

Tomorrow is Kate's birthday,  Kate is a lovely girl aged 20. This Contest  is held for her birthday and I want everyone

原创 acm.jlu.edu.cn-1099-Simple Computers

You are to write an interpreter for a simple computer. This computer uses a processor with a small number of machine in

原创 JOJ-2165-Hilbert Curve

The pictures above are Hilbert curve.You can see a Hilbert curve with a certain recursion depth n is composed of four d

原创 對象序列化

using System;using System.IO;using System.Diagnostics;using System.Reflection;using System.Runtime.Serialization;using

原创 JOJ-1018-Anagrams by Stack

How can anagrams result from sequences of stack operations? There are two sequences of stack operators which can conver

原创 acm.jlu.edu.cn-1068-Cipher

Bob and Alice started to use a brand-new encoding scheme. Surprisingly it is not a Public Key Cryptosystem, but their e