<?xml version="1.0" encoding="utf-8"?>
<oembed><version>1.0</version><provider_name>Camdemy1.0</provider_name><provider_url>http://media.usc.edu.tw</provider_url><title>雜湊法: 總和集(Sumsets)</title><description></description><author_name></author_name><author_url>http://media.usc.edu.tw/user/</author_url><thumbnail_url>http://media.usc.edu.tw/sysdata/doc/2/2bf49c235d04d094/thumb_l.jpg</thumbnail_url><thumbnail_height>360</thumbnail_height><thumbnail_width>640</thumbnail_width><html>&amp;lt;iframe width='720' height='405' id='ccShare669' frameborder='0'  src='http://media.usc.edu.tw/media/e/669' allowfullscreen&amp;gt;&amp;lt;/iframe&amp;gt;</html><type>video</type><width>720</width><height>405</height><duration>1:42:11</duration><index><item_1><title>Sumsets總和集</title><time>0</time><indent>0</indent><sn>1</sn></item_1><item_2><title>Observation 1: a + b + c = d (暴力法)</title><time>76350</time><indent>0</indent><sn>2</sn></item_2><item_3><title>Observation 2: a + b = d - c (省力法)</title><time>327100</time><indent>0</indent><sn>3</sn></item_3><item_4><title>Observation 3: does (d – c) belong to T (暴力法)</title><time>447450</time><indent>0</indent><sn>4</sn></item_4><item_5><title>Observation 3: does (d – c) belong to T (暴力法)</title><time>582650</time><indent>0</indent><sn>5</sn></item_5><item_6><title>Observation 4: does (d – c) belong to T (省力法)</title><time>592350</time><indent>0</indent><sn>6</sn></item_6><item_7><title>Observation 5: no solution (暴力法)</title><time>655650</time><indent>0</indent><sn>7</sn></item_7><item_8><title>Observation 6: how to hash</title><time>738450</time><indent>0</indent><sn>8</sn></item_8><item_9><title>Why is hash fast?</title><time>841150</time><indent>0</indent><sn>9</sn></item_9><item_10><title>How to hash?</title><time>1269800</time><indent>0</indent><sn>10</sn></item_10><item_11><title>Design Issue 1: qsort in c library</title><time>1348600</time><indent>0</indent><sn>11</sn></item_11><item_12><title>Design Issue 2: to belong or not to belong(屬於或不屬於)</title><time>1852800</time><indent>0</indent><sn>12</sn></item_12><item_13><title>Design Issue 3: structures of hash table</title><time>1970100</time><indent>0</indent><sn>13</sn></item_13><item_14><title>Design Issue 3.1: generate hash table</title><time>2307450</time><indent>0</indent><sn>14</sn></item_14><item_15><title>Design Issue 3.2: hit hash table</title><time>2713750</time><indent>0</indent><sn>15</sn></item_15><item_16><title>Design Issue 3.2: hit hash table</title><time>2778400</time><indent>0</indent><sn>16</sn></item_16><item_17><title>Design Issue 3.3: collision linked list</title><time>2952000</time><indent>0</indent><sn>17</sn></item_17><item_18><title>Coding Part1: input elements of S</title><time>3092000</time><indent>0</indent><sn>18</sn></item_18><item_19><title>Coding Part2: qsort of elements of S</title><time>3458800</time><indent>0</indent><sn>19</sn></item_19><item_20><title>Coding Part3: create hash table and hit it</title><time>3800100</time><indent>0</indent><sn>20</sn></item_20><item_21><title>Coding Part4: review the whole program</title><time>5714400</time><indent>0</indent><sn>21</sn></item_21></index><resolution><playtype>fs</playtype><subtype></subtype><src>1280x720</src><mp4>720x404</mp4><mp4_hd>1280x720</mp4_hd><mp4_4k></mp4_4k><mp4_1920></mp4_1920><mp4_src></mp4_src><mp4_base></mp4_base></resolution><base_image><thumb>http://media.usc.edu.tw/sysdata/doc/2/2bf49c235d04d094/thumb.jpg</thumb><cover>http://media.usc.edu.tw/sysdata/doc/2/2bf49c235d04d094/cover.jpg</cover><storyboard>http://media.usc.edu.tw/sysdata/doc/2/2bf49c235d04d094/video/thumbs/storyboard.jpg</storyboard></base_image><srcFrom></srcFrom><base_url>http://media.usc.edu.tw/sysdata/doc/2/2bf49c235d04d094</base_url><status>1</status></oembed>
