Летопись МИФИ

Диагноз: МИФИст


ЕГЭ-2024
Тесты ЕГЭ Онлайн
Задачи ЕГЭ по математике
Решения ЕГЭ по математике

Вступительные экзамены и специальности
Фишки для Корума:
Рейтинг пользователей Корума
Настроение • Модераторы
Темы • Картина дня • Realtime
Прочие фишки:
Нецензурная брань
Народная орфография
Морзянка онлайн • Калькулятор
Анаграммы • Игра в города

Загрузка календаря

Новые записи

20.05Задача про фермера и его кредит
26.01Актуализация сервисов ЕГЭ по математике 2014 года
05.11Поломалось
28.08Смена парадигмы
18.07Как вести себя в приличном обществе, предварительно обмочив штаны
оглавление »

Лучшие записи

1.Математическое порно1563
2.Ответы ко всем задачам ЕГЭ по математике 2010 года793
3.Тесты ЕГЭ Онлайн515
4.Результаты ЕГЭ по математике368
5.Результаты ЕГЭ по русскому языку268

О чем тут?

NX VBAB Webometrics igjhs А1-08 Абитуриенты Бачинский ВКонтакте Ващенифтему Волга Диплом Дрессировка преподов Дума ЕГЭ Жизнь Забабахал Инновации История Кафедра 26 Кларк Корум Лженаука МИФИ МИФИсты Морзянка НИЯУ Нанотехнологии Наука Образование Омоймоск ПЦ Поздравляю Поиск Президент Преподы Приколы Программное обеспечение Рейтинги Русский язык Сессия Смерть Статистика Стихи Сувениринг Тест Учеба Учебные материалы ФЯУ Физтех Фотки Ядерщики матанализ

Комментарии

День памяти
  20 мая 2023 (мифи умер)

Задача про фермера и его кредит
  20 мая 2023 (Алекс)

Математическое порно
  22 марта 2023 (Angleton)

Российский Союз ректоров
  19 февраля 2023 (Hellen Paul )

В помощь юному радисту: Морзянка 1.0
  13 ноября 2022 (Сергей)

Знахари и шаманы в МГТУ имени Баумана
  5 ноября 2021 (монах из кельи)

Зачет по инженерной графике
  24 августа 2020 (Инженерная графика)

Пасынки Вселенной
  18 февраля 2020 (Max Brown)

Финансовая пирамида за 10 рублей
  7 февраля 2020 (Флора Миллс)

База решений задач ЕГЭ по математике
  26 декабря 2019 (Мария)

$kib@t®onЪ
Сейчас на скибатроне
Шедевры
Я ищу слово,  «» 

а б в г д е ё ж з и й к л м н о п р с т у ф х ц ч ш щ ъ ы ь э ю я
a b c d e f g h i j k l m n o p q r s t u v w x y z

Слово «break»
впервые сказано пользователем valex 15.04.2005 в 20:41,
и с тех пор употреблялось 86 раз.
СообщенияПользователиПользователи (top10)

Сообщения со словом
«break»

Запрос выполнился за 0.0088 сек.
  1. 05.04.2011, 23:30. Aahz в теме
    «Зачем рекламируют автомобили?»
    ... door lock but its cylinder rotates uselessly he may break a window and attempt to open a door from inside...
  2. 04.03.2011, 14:22. Itheme в теме
    «Онлайн тест на трезвость»
    ... while x endx do if hasrightspace then x delta else break if not iterate -delta and not iterate delta end...
  3. 11.11.2010, 01:06. Chameleon в теме
    «Maxima на Corum'е»
    ... down the road especially to those of you who wish to break new ground in theoretical mathematics and science do not use a computer as a substitute for your basic education by the same token however proficiency with computers and computer based mathematics is crucial for attacking the many problems which literally cannot be solved by pencil and paper methods in many cases problems which would take years by hand can be reduced to seconds by powerful computers also in the course of a long derivation it is sometimes useful for those who have already mastered the fundamentals to do work in these systems as a guard against careless errors or a faster means than a table of deriving some particular result also in case of an error fixing the resulting error can often be much quicker and simpler courtesy of a mathematical notebook which can be reevaluated with the correct parameters in place but just as a computer can guard against human error the human must not trust the computer unquestioningly all of these systems have limits and when those limits are reached it is quite possible for bizarre errors to result or in some cases answers which are actually wrong to say nothing of the fact that the people who programmed these systems were human and make mistakes to illustrate the limits of computer algebra systems we take the following example when given the integral integrate 1 sqrt 2-2 cos x from x -pi 2 to pi 2 mathematica 4 1 gives with no warnings 2 log 4 2 log cos pi 8 2 log sin pi 8 which n evalutates numerically to give 1 00984 maxima 5 6 returns the integral unevaluated the commercial macsyma says the integral is divergent and maple 7 says infinity cite maxima email list here had the person who wished to learn the result blindly trusted most of the systems in question he might have been misled so remember to think about the results you are given the computer is not always necessarily right and even if it gives a correct answer that answer is not necessarily complete a brief history of macsyma the birthplace of macsyma where much of the original coding took place was project mac at mit in the late 1960s and earlier 1970s projectmac was an mit research unit which was folded into the current laboratory for computer science research support for macsyma included the advanced research projects agency arpa department of defense the us department of energy and other government and private sources the original idea first voiced by marvin minsky was to automate the kinds of manipulations done by mathematicians as a step toward understanding the power of computers to exhibit a kind of intelligent behavior the undertaking grew out of a previous effort at mitre corp called mathlab work of carl engelman and others plus the mit thesis work of joel moses on symbolic integration and the mit thesis work of william a martin the new effort was dubbed macsyma project mac s symbolic manipulator the original core design was done in july 1968 and coding began in july 1969 this was long before the days of personal computers and cheap memory initial development was centered around a single computer shared with the artificial intelligence laboratory a dec pdp-6 this was replaced by newer more powerful machines over the years and eventually the mathlab group acquired its own dec-pdp-10 mit-ml running the its operating system this machine became a host on the early arpanet predecessor to the internet which helped it gain a wider audience as the effort grew in scope and ability the general interest it created led to attempts to port the code that is to take the series of instructions which had been written for one machine and operating system and adapt them to run on another different system the earliest such effort was the running of macsyma in a maclisp environment on a ge honeywell multics mainframe another system at mit the multics environment provided essentially unlimited address space but for various reasons the system was not favored by programmers and the multics implementation was never popular the next effort came about when a group at mit designed and implemented a machine which was based on the notion that hardware support of lisp would make it possible to overcome problems that inhibited the solution of many interesting problems the lisp machine clearly had to support macsyma the largest lisp program of the day and the effort paid off with probably the best environment for macsyma to date although requiring something of an expert perspective lisp machines as well as other special purpose hardware tended to become slow and expensive compared to off-the-shelf machines built around merchant-semiconductor cpus and so the two companies that were spun off from mit symbolics inc and lmi both eventually disappeared texas instruments built a machine called the explorer bases on the lmi design but also stopped production around 1980 the idea of porting macsyma began to be more interesting and the unix based vaxima distribution which ran on a lisp system built at the university of california at berkeley for vax unix demonstrated that it was both possible and practical to run the software on less expensive systems this system franz lisp was implemented primarily in lisp with some parts written in c once the code stabilized the new version opened up porting possibilities ultimately producing at least six variations on the theme which included macsyma maxima paramax paramacs punimax aljbar and vaxima these have followed somewhat different paths and most were destined to fade into the sunset the two which survived obscurity maxima and macsyma we will discuss below punimax was actually an offshoot of maxima some time around 1994 bruno haible author of clisp ported maxima to clisp due to the legal concerns of richard petti then the owner of the commercial macsyma the name was changed to punimax it has not seen much activity since the initial port and although it is still available the ability of the main maxima distribution to compile on clisp makes further development of punimax unlikely there is a certain surprising aspect in this multiplicity of versions and platforms given how the code seemed tied to the development environment which included a unique operating system fortunately berkeley s building a replica of the maclisp environment on the mit-ml pdp-10 using tools available in almost any unix c environment helped solve this problem complicating the matter was the eventual demise of the pdp-10 and maclisp systems as common lisp resembling lisp-machine lisp influenced by bbn lisp and researchers at stanford carnegie mellon university and xerox began to take hold it seemed sensible to re-target the code to make it compatible with what eventually became the ansi common lisp standard since almost everything needed for for macsyma can be done in ansi cl the trend toward standardization made many things simpler there are a few places where the language is not standardized in particular connecting to modules written in other languages but much of the power of the system can be expressed within ansi cl it is a trend the maxima project is planning to carry on to maintain and expand on this flexibility which has emerged with all these versions in recent history there are two which have been major players due this time more to economics than to code quality 1982 was a watershed year in many respects for macsyma it marks clearly the branching of macsyma into two distinct products and ultimately gave rise to the events which have made maxima both possible and desirable mit had decided with the gradual spread of computers throughout the academic world to put macsyma on the market commercially using as a marketing partner the firm of arthur d little inc this version was sold to the symbolics inc which depending on your perspective either turned the project into a significant marketing effort to help sell their high-priced lisp machines or was a diversionary tactic to deny their competitors lmi this program at the same time mit forced uc berkeley richard fateman to withdraw the copies from about 50 sites of the vax unix and vax vms versions of macsyma that he had distributed with mit s consent until some agreement could be reached for technology transfer symbolics hired some of the mit staff to work at symbolics in order to improve the code which was now proprietary the mit-ml pdp-10 also went off the arpanet in 1983 interestingly the closing of the mit lisp and macsyma efforts was a key reason richard stallman decided to form the free software foundation between the high prices closed source code and neglecting all platforms in favor of lisp machines pressure came to bear on mit to release another version to accommodate these needs which they did with some reluctance the new version was distributed via the national energy software center and called doe macsyma it had been re-coded in a dialect of lisp written for the vax at mit called nil there was never a complete implementation at about the same time a vax unix version vaxima was put into the same library by berkeley this ran on any of hundreds of machines running the berkeley version of vax unix and through a unix simulator on vms on any vax system the doe versions formed the basis of the subsequent non-symbolics distributions the code was made available through the national energy software center which in its attempt to recoup its costs charged a significant fee 1-2k it provided full source but in a concession to mit did not allow redistribution this prohibition seems to have been disregarded and especially so since nesc disappeared perhaps it didn t recoup its costs among all the new activity centered around doe macsyma prof william schelter began maintaining a version of the code at ut austin calling his variation maxima he refreshed the nesc version with a common-lisp compatible code version there were from the earliest days other computer algebra systems including reduce camal mathlab-68 pm and altran more serious competition however did not arrive until maple and mathematica were released maple in 1985 cite list of dates and mathematica in 1988 cite wolfram website these systems were inspired by macsyma in terms of their capabilities but they proved to be much better at the challenge of building mind-share doemacsyma because of the nature of its users and maintainers never responded to this challenge symbolics successor macsyma inc having lost market share and unable to meet its expenses was sold in the summer of 1999 after attempts to find endowment and academic buyers failed cite richard petti usenet post the purchaser withdrew macsyma from the market and the developers and maintainers of that system dispersed mathematica and maple appeared to have vanquished macsyma it was at this point maxima re-entered the game although it was not widely known in the general academic public w schelter had been maintaining and extending his copy of the code ever since 1982 he had decided to see what he could do about distributing it more widely he attempted to contact the nesc to request permission to distribute derivative works the duties of the nesc had been assumed in 1991 by the energy science and technology software center which granted him virtually unlimited license to make and distribute derivative works with some minor export related caveats it was a significant breakthrough while schelter s code had been available...
  4. 19.10.2010, 02:42. ln(x) в теме
    «Линукс и мелкомягкие»
    ... unlink tunnel dir name print removed tunnel name n breaksymlink file if file is a symlink 1 break the link 2 copy the contents of the file pointed to do file sub breaksymlink my file shift if -l file my link readlink file link 1 link if file m and not link m print breaking symlink file link n unlink file die file pointed at a strangely named file n if link safe re link 1 cp link file rotate target new old rotates config files target full path of the config file new full path of the file being rotated in old expected contents of the file being rotated out example rotate etc resolv conf etc resolv conf pptp etc resolv conf real sub rotate my target new old return undef unless -f new -f old my diff diff target new chomp diff return 1 if diff eq diff diff target old chomp diff if diff ne print warning new not installed n print target does not match old n return undef ln -sf new target print installed new as target n return addchaporpap interactive prompts for parameters and adds a chap or pap secret sub addchaporpap my secret type 0 print add a new secret type secret note any backslashes must be doubled local name this is the local identifier for secret type authentication note if the server is a windows nt machine the local name should be your windows nt username including domain for example domain username my local queryuser local name undef print remote name this is the remote identifier for secret type authentication in most cases this can be left as the default it must be set if you have multiple secret type secrets with the same local name and different passwords just press enter to keep the default my remote queryuser remote name pptp print password this is the password or secret type secret for the account specified the password will not be echoed get the password without echoing stty -echo my pass queryuser password undef stty echo my secrets file if secret type eq chap secrets file chap secrets elsif secret type eq pap secrets file pap secrets else die wrong secret type open secrets file secrets file or die couldn t open secrets file print nadding secret local remote password n n print secrets file local t remote t pass t n print secrets file remote t local t pass n close secrets file or die couldn t close secrets file chmod 0600 secrets file addchaporpap addpptp interactive add a new pptp tunnel configuration sub addpptp my name ip local remote print nadd a new pptp tunnel n n my configs keys pptp servers my choice bselect which configuration would you like to use configs other my routes if choice configs 1 while 1 name queryuser tunnel name undef per man perlsec check for special characters if name w name 1 last print name contains special characters n print please use only alphanumerics and n ip queryuser server ip undef print what route s would you like to add when the tunnel comes up n print this is usually a route to your internal network behind the pptp server n print you can use substitution keywords as in etc pptp d config file n print tunnel dev is the tunnel interface n print def gw is the existing default gateway n print iplocal is the local ip address n print ipremote is the remote ip address n print the syntax to use is the same as the route 8 command n print enter a blank line to stop n while 1 my route queryuser route undef last unless defined route last if route eq if route unsafe re o print route contains unsafe characters discarded n next push routes route else name configs choice-1 ip pptp servers configs choice-1 ip routes pptp servers configs choice-1 routes print local name and remote name should match a configured chap or pap secret local name is probably your nt domain username note any backslashes must be doubled local queryuser local name undef remote queryuser remote name pptp print adding name ip local remote n addtunnel name ip local remote routes sub configureresolv if yesno use a pptp-specific resolv conf during tunnel connections if -f resolv pptp print resolv pptp exists n if yesno do you want to use the existing resolv pptp print renaming resolv pptp resolv pptp orig n rename resolv pptp resolv pptp orig or die couldn t rename resolv pptp if -f resolv pptp my configs keys dns servers my choice bselect which configuration do you want to use configs other my addresses search if choice configs 1 print what domain names do you want to search for partially n specified names n print enter all of them on one line seperated by spaces n search queryuser domain names undef print enter the ip addresses of your nameservers n print enter a blank ip address to stop n while 1 my address queryuser nameserver ip address undef last unless defined address last if address eq push addresses address else search dns servers configs choice-1 search list addresses dns servers configs choice-1 ip list open pptp resolv pptp or die couldn t open resolv pptp for writing print pptp search search n foreach my a addresses print pptp nameserver a n close pptp or die couldn t close resolv pptp if -f resolv real my diff diff resolv resolv real chomp diff if diff ne print resolv real exists n print copying it to resolv real orig n unlink resolv real orig rename resolv real resolv real orig breaksymlink resolv print copying resolv to resolv real n cp -f resolv resolv real print creating link from resolv real to resolv n ln -sf resolv real resolv else they choose not to twiddle etc resolv conf breaksymlink resolv if -f resolv pptp print resolv...
  5. 23.05.2010, 23:30. davinchi в теме
    «Паскаль.Файлы. очень нужно.....»
    ... 1 len matrix sorted prev matrix i j if not sorted break prev matrix i j print sorted pass
  6. 28.04.2010, 14:06. ZiF в теме
    «Дневник начинающего автомобилиста»
    ... хода некогда были придумано специальное устройство break
  7. 12.02.2010, 10:19. Lexxus в теме
    «Творчески-программистская игра»
    ... constructor case grass k food push k objectsaround i break case fly k friends push k objectsaround i break default k donothing imagine function for var...
  8. 25.02.2009, 20:40. belkins в теме
    «программирование звука unix»
    ... fin fprintf stderr nbbytes d n nbbytes if feof fin break read the packet encoded by sampleenc fread cbits...
  9. 07.01.2009, 01:53. marain в теме
    «Программный шлюз не хочет читать :(»
    ... time null -conn- stop linger close connection conn break wsaresetevent hevents dwindex i for i 0 i 2 i...
  10. 20.10.2008, 19:22. Ruben в теме
    «Неделя 2. Жадность»
    ... k- e k- next- e k- next k- next- next delete m k-- break k k- next if m null step int a 0 while intervals...

← раньше

позже →


Рейтинг блогов



 

откуда • куда • где • eureka!
Бездарно потраченное время:
105826 дней