• Polygon Boolean operation is a key algorithm way in computer graphics.

    多边形布尔运算计算机图形学一个关键算法

    youdao

  • A new design flow is summarized and a key algorithm is designed for the new architecture.

    针对新的结构概括了设计流程设计核心算法

    youdao

  • Requiring everything to be one-way-encrypted using a strong algorithm key means that your data is very secure, but not convenient to use.

    使用强大的算法密钥所有数据都进行单向加密意味着的数据非常安全但是使用时很方便

    youdao

  • An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.

    对称算法使用不同密钥消息进行加密解密;其中个秘必须秘密的,一个密钥通常是公开的。

    youdao

  • The bulk of the data is encrypted using a symmetric key algorithm that encrypts and decrypts data using a single secure key.

    数据使用对称密钥算法进行加密,它使用一个密钥来实现对数据的加密解密

    youdao

  • Its key feature is a very fast algorithm that just sends file differences over the data link, thus minimizing the total data flow between machines.

    关键特性一个非常算法,它通过数据链路发送文件差异因此机器之间传输数据总量降低到最低限度。

    youdao

  • RC4 is a stream cipher algorithm operating on each byte of data; like the RC2, it supports key lengths of 40 bits, 64 bits, and 128 bits.

    RC 4一个密码算法数据每个字节进行操作RC 2一样,它支持长度40、64位和128位的密钥

    youdao

  • This might mean being able to undertake detailed design of a key aspect of the system, even to the point of being able to represent a critical algorithm in a programming language.

    意味着他们能够承担系统关键方面设计甚至是某种程序设计语言表现一个关键算法

    youdao

  • Now, as obvious a statement as that is in this algorithm, it turns out that is the key to this whole problem being solved correctly without my algorithm looping infinitely.

    算法很明显一句话也是正确解决,整个问题关键,否则此算法就会陷入死循环。

    youdao

  • A symmetric algorithm requires that both the sender and receiver of the message use the same secret key; this is often referred to as secret key cryptography.

    对称算法要求消息发送方接收方使用同一个通常被称作秘钥密码术

    youdao

  • Instead of having to determine this information, the memcached clients use a simple hashing algorithm on the key you specify when storing the information.

    memcached客户机不必决定信息,它只需对在存储信息指定使用一个简单散列算法

    youdao

  • When you store or get information from a list of memcached servers, the memcached client derives a numerical value from the key using a consistent hashing algorithm.

    想要memcached服务器存储获取信息时,memcached客户机就会一个一致散列算法这个获取一个数值

    youdao

  • It then passes the extracted Base 64 encoded cipher value, the decryption key, and the algorithm name to a method named decrypt (examined in Cryptography).

    接着抽取出的用Base 64编码密码解密密钥以及算法名称传递名为Decrypt方法(见密码术中的研究)。

    youdao

  • Ron Rivest developed the RC4 algorithm to generate random bytes based on a 256 byte key.

    RonRivest开发基于256字节的密钥生成随机数RC4加密算法

    youdao

  • Instead, aSSL uses the RSA algorithm to enable the client to negotiate a random 128-bit key with one or more servers.

    相反aSSL使用RSA算法使客户机能够通过一个多个服务器处理随机的 128bit 密匙。

    youdao

  • Kerberos defines an algorithm for processing a user's password to produce a secret key. The Kerberos client will use this key for decryption during the process of getting the TGT.

    Kerberos定义了用户密码进行处理生成一个密钥算法

    youdao

  • The third command creates a 1024-bit Digital Signature Algorithm (DSA) key (-b 1024 -t dsa), turns off output (-q), and specifies the name of the key and that there is no password.

    第三命令创建了一个 1024DigitalSignatureAlgorithm (DSA)密钥-b 1024-t dsa),关闭输出-q),指定密钥的名称在这里指定密码

    youdao

  • Listing 2 shows a sample algorithm which creates such a key by string concatenation.

    清单2显示了一个通过字符串串联创建此类示例算法

    youdao

  • It is a combination of a digest algorithm, a key dependent algorithm, and possibly other algorithms.

    摘录算法从属算法可能其它算法的组合

    youdao

  • Through a mathematical algorithm, a private key is like your electronic identification card; the public key is like the lock or gate mechanism that you present your ID card to.

    通过数学算法,一个私如同电子身份证公钥如同向其出示身份证机制

    youdao

  • The hashing algorithm is applied to the value of the partitioning key, and generates a partition number between zero and 4095.

    算法应用分区产生 0 到 4095之间一个分区

    youdao

  • The use of a nearby anchor is the key to the doomsday algorithm.

    末日算法使用最近关键

    youdao

  • The basic algorithm used to search for a key is shown in Listing 3.

    搜索密钥基本算法清单3

    youdao

  • The key is typically a random sequence of bits; its size categorizes the strength of the encryption algorithm.

    密钥一般 0 或 1一个随机序列大小区分了加密算法能力

    youdao

  • Despite these examples, most words in the Metaphone algorithm return a single key.

    除了这些例子之外,Metaphone算法中的多数单词还是返回单一

    youdao

  • Kerberos defines an algorithm to generate a secret key from the user's password.

    Kerberos定义一种利用用户密码生成密钥算法

    youdao

  • Therefore, an algorithm that permits a "close-enough" match is required to compensate for the average user's inability to precisely match a given set of intra-key timings.

    因此需要使用允许 “足够接近(close-enough)”匹配算法弥补普通用户不能精确匹配给定计时这个问题。

    youdao

  • Therefore, the key problem is how to design a video compression algorithm aimed at network characteristics efficiently.

    关键问题如何针对网络特点更有效地设计视频压缩算法

    youdao

  • Therefore, the key problem is how to design a video compression algorithm aimed at network characteristics efficiently.

    关键问题如何针对网络特点更有效地设计视频压缩算法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定