| 일 | 월 | 화 | 수 | 목 | 금 | 토 |
|---|---|---|---|---|---|---|
| 1 | 2 | 3 | 4 | 5 | 6 | |
| 7 | 8 | 9 | 10 | 11 | 12 | 13 |
| 14 | 15 | 16 | 17 | 18 | 19 | 20 |
| 21 | 22 | 23 | 24 | 25 | 26 | 27 |
| 28 | 29 | 30 | 31 |
- 배열
- const
- vscode
- Object Oriented Programming
- string
- array
- function
- pointer
- predictive analysis
- 티스토리챌린지
- 문자열
- 알고리즘
- assignment operator
- programming
- Python
- 함수
- Pre-processing
- 반복문
- 파이썬
- C++
- raw data
- 백준
- 포인터
- OOP
- 오블완
- pass by reference
- Class
- Deep Learning
- Data Science
- baekjoon
- Today
- Total
목록전체 글 (188)
Channi Studies
Resize OperationA hash table resize opeartion increases the number of buckets, while preserving all existing items.A hash table with N buckets is commonly resized to the next prime number ≥ N * 2. A new array is allocated, and all items from the old array are re-insrted into the new array, making the resize opeartion's time complexity O(N). Let's take a look into an example of hash table resiz..
A function is a stored program that you can pass a parameters into to return a value. There are lots of functions offered by MySQL that can be found in following reference manual. MySQL :: MySQL 8.4 Reference Manual :: 14.1 Built-In Function and Operator Reference14.1 Built-In Function and Operator Reference The following table lists each built-in (native) function and operator and provides a s..
A JOIN clause is used to combine rows from two or more tables, based on a related column between them.We will take a look into INNER JOIN, LEFT JOIN, and RIGHT JOIN. Continued from the previous post, customers table consists of 3 columns: customer_id (PRIMARY KEY), first_name, last_nametransactions table consists of 3 columns: transaction_id (PRIMARY KEY), amount, customer_id (FOREIGN KEY)INSER..
Double Hashing is an open-addressing collision resolution technique that uses 2 different hash functions to compute bucket indices. Using hash functions h₁ and h₂, a key's index in the table is computed with the formula (h₁(key) + 𝑖 * h₂(key)) mod (tablesize) Inserting a key uses the formula, starting with 𝑖 = 0, repeatedly search hash table buckets until an empty bucket is found.Each time an ..