/* * The internal form of a hash table. * * The table is an array indexed by the hash of the key collisions * are resolved by hanging a linked list of hash entries off each * element of the array. Although this is a really simple design it * isn t too bad given that pools have a low allocation overhead. */ split from apache for general usage
上传时间: 2014-01-07
上传用户:gtf1207
java的一个源代码,、 public class ThunderBoltAct extends Canvas implements Runnable { private int TIMEOUT = 0 private final static int NUMERIC = 10000 //总分 private final static int INERRGAL = 60 //频率 private final static int MAXBATTLE = 3 //最大飞机数 private final static int MAXBALLNUM = 30 //最多飞机子弹数 private final static int MAXCOPTERNUM = 16 //最大敌机数 private final static int MAXCOPTERBALLNUM = 16 //最多敌机子弹数 private final static int STEP = 1 private final static int MINCOPTER = 2 //最小敌机数
上传时间: 2016-04-26
上传用户:jichenxi0730
Infrared telecontrol design based on the the VHDL includes the mode of infrared send,receive mode,key code mode,ringing mode and so on.
标签: the mode telecontrol Infrared
上传时间: 2016-05-02
上传用户:c12228
flash lite开发 ArcadeHeroes.swf SWF content games/invaders.swf SWF content games/pacman.swf SWF content Arcade1_2nd_edition.SIS Nokia S60 2nd Edition SIS package Arcade1_3rd_edition_signed.sis Nokia S60 3rd Edition signed SIS package Arcade1_2nd_edition.pkg Nokia S60 2nd Edition SIS Package descriptor Arcade1_3rd_edition.pkg Nokia S60 3rd Edition SIS Package descriptor makesis.php PHP script mykey.key sample certificate key, created using makekeys.exe mycert.cer sample certificate, created using makekeys.exe makekeys.exe Symbian application to create signing keys
上传时间: 2014-01-22
上传用户:hn891122
输入n个数,在输入数的过程中建立一个二叉排序树。建立成功后,输入一个key, //在二叉树中实现删除key所在的结点
标签: 输入
上传时间: 2014-01-06
上传用户:cursor
扫描一个C源程序,用Hash表存储该程序中出现的关键字,并统计该程序中的关键字出现频度。用线性探测法解决Hash冲突。设Hash函数为: Hash(key)=[(key的第一个字母序号)*100+(key的最后一个字母序号)] MOD 41
标签: 源程序
上传时间: 2014-01-05
上传用户:ardager
在Linux下访问LDAP目录,验证客户端用USB KEY签名的文件。
上传时间: 2014-01-30
上传用户:shizhanincc
LPC21XX系列开发板测试原代码,包括FLASH\电源管理\MODEM\KEY等驱动程序
上传时间: 2014-01-13
上传用户:kelimu
This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared secret key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. The HMAC specification in this standard is a generalization of Internet RFC 2104, HMAC, Keyed-Hashing for Message Authentication, and ANSI X9.71, Keyed Hash Message Authentication Code.
标签: message authentication keyed-hash describes
上传时间: 2014-01-07
上传用户:凤临西北
Tasks Read the textbook about the details of Vigenére Cipher. Implement the algorithm by C or C++. Requirements You do this lab in a group of two students. Your program should have input and output as follows: csci>a.out --> Please input the key: receptive --> Please input the plain text: wearediscoveredsaveyourself --> The cipher text is : nicvtwqngfzgvtwavzvcqyglmgj -->The original message is: wearediscoveredsaveyourself • You should test your program with several runs.
标签: the Implement algorithm textbook
上传时间: 2013-12-21
上传用户:bruce5996