搜索结果

找到约 13 项符合 Hashing 的查询结果

加密解密 雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中

雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能 ...
https://www.eeworm.com/dl/519/154772.html
下载: 134
查看: 1038

数据结构 linearing hashing (with c++)

linearing hashing (with c++)
https://www.eeworm.com/dl/654/159507.html
下载: 180
查看: 1029

人工智能/神经网络 CKHash is an implementation of Cuckoo Hashing that can receive the input in the form of strings dir

CKHash is an implementation of Cuckoo Hashing that can receive the input in the form of strings directly
https://www.eeworm.com/dl/650/203082.html
下载: 26
查看: 1071

CA认证 雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中

雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能 ...
https://www.eeworm.com/dl/640/246389.html
下载: 23
查看: 1029

数据结构 A C++ Program to show an example of Hashing using Mid-Square Method. 应用Mid-Square理论的哈希算法

A C++ Program to show an example of Hashing using Mid-Square Method. 应用Mid-Square理论的哈希算法
https://www.eeworm.com/dl/654/338861.html
下载: 59
查看: 1097

软件设计/软件工程 A detailed expanation about the new Cuckoo hashing algorithm.

A detailed expanation about the new Cuckoo hashing algorithm.
https://www.eeworm.com/dl/684/428878.html
下载: 158
查看: 1034

数学计算 pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerpr

pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small chang ...
https://www.eeworm.com/dl/641/429179.html
下载: 51
查看: 1136

数学计算 program which uses hashing techniques for storing and retrieving the data. Input to the program:

program which uses hashing techniques for storing and retrieving the data. Input to the program: Some random numbers. Input will be from a file. Output: First the program reads all the input and store it properly using some hash techniques. Once your program reads the complete input,it waits for ...
https://www.eeworm.com/dl/641/432790.html
下载: 189
查看: 1056

其他 it is c implementation of Hashing .. all types of hashing covered in this program

it is c implementation of Hashing .. all types of hashing covered in this program
https://www.eeworm.com/dl/534/458667.html
下载: 40
查看: 1031

加密解密 This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message au

This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared secret key. The cryptographic strength of HMAC de ...
https://www.eeworm.com/dl/519/303374.html
下载: 76
查看: 1028