Polygon Boolean operation is a key algorithm way in computer graphics.
多边形的布尔运算是计算机图形学的一个关键算法。
A new design flow is summarized and a key algorithm is designed for the new architecture.
针对新的结构,概括了设计流程,设计了核心算法。
Requiring everything to be one-way-encrypted using a strong algorithm key means that your data is very secure, but not convenient to use.
使用强大的算法密钥将所有数据都进行单向加密意味着您的数据非常安全,但是使用时很不方便。
An asymmetric algorithm USES a different key for encrypting or decrypting the message; one of the keys must be kept secret, and the other key is usually made public.
非对称算法使用不同的密钥对消息进行加密或解密;其中一个秘钥必须是秘密的,而另一个密钥通常是公开的。
The bulk of the data is encrypted using a symmetric key algorithm that encrypts and decrypts data using a single secure key.
数据块使用一个对称密钥算法进行加密,它使用一个密钥来实现对数据的加密和解密。
Its key feature is a very fast algorithm that just sends file differences over the data link, thus minimizing the total data flow between machines.
它的关键特性是一个非常快的算法,它只通过数据链路发送文件差异,因此把机器之间传输的数据总量降低到最低限度。
RC4 is a stream cipher algorithm operating on each byte of data; like the RC2, it supports key lengths of 40 bits, 64 bits, and 128 bits.
RC 4是一个流密码算法,它对数据的每个字节进行操作;和RC 2一样,它支持长度为40位、64位和128位的密钥。
This might mean being able to undertake detailed design of a key aspect of the system, even to the point of being able to represent a critical algorithm in a programming language.
这意味着他们能够承担系统的某一关键方面的设计,甚至是用某种程序设计语言表现一个关键的算法。
Now, as obvious a statement as that is in this algorithm, it turns out that is the key to this whole problem being solved correctly without my algorithm looping infinitely.
这是此算法中很明显的一句话,也是正确解决,整个问题的关键,否则此算法就会陷入死循环。
A symmetric algorithm requires that both the sender and receiver of the message use the same secret key; this is often referred to as secret key cryptography.
对称算法要求消息的发送方和接收方使用同一个秘钥;这通常被称作秘钥密码术。
Instead of having to determine this information, the memcached clients use a simple hashing algorithm on the key you specify when storing the information.
memcached客户机不必决定此信息,它只需对在存储信息时指定的键使用一个简单的散列算法。
When you store or get information from a list of memcached servers, the memcached client derives a numerical value from the key using a consistent hashing algorithm.
当想要从一列memcached服务器存储或获取信息时,memcached客户机就会用一个一致的散列算法从这个键获取一个数值。
It then passes the extracted Base 64 encoded cipher value, the decryption key, and the algorithm name to a method named decrypt (examined in Cryptography).
接着它将抽取出的用Base 64编码的密码值、解密密钥以及算法名称传递给名为Decrypt的方法(见密码术中的研究)。
Ron Rivest developed the RC4 algorithm to generate random bytes based on a 256 byte key.
RonRivest开发了基于256字节的密钥生成随机数的RC4加密算法。
Instead, aSSL uses the RSA algorithm to enable the client to negotiate a random 128-bit key with one or more servers.
相反,aSSL使用RSA算法使客户机能够通过一个或多个服务器处理随机的 128bit 密匙。
Kerberos defines an algorithm for processing a user's password to produce a secret key. The Kerberos client will use this key for decryption during the process of getting the TGT.
Kerberos定义了一种对用户密码进行处理以生成一个密钥的算法。
The third command creates a 1024-bit Digital Signature Algorithm (DSA) key (-b 1024 -t dsa), turns off output (-q), and specifies the name of the key and that there is no password.
第三个命令创建了一个 1024位的DigitalSignatureAlgorithm (DSA)密钥(-b 1024-t dsa),关闭输出(-q),指定密钥的名称,在这里不指定密码。
Listing 2 shows a sample algorithm which creates such a key by string concatenation.
清单2显示了一个通过字符串串联创建此类键的示例算法。
It is a combination of a digest algorithm, a key dependent algorithm, and possibly other algorithms.
这是摘录算法、金钥从属算法和可能的其它算法的组合。
Through a mathematical algorithm, a private key is like your electronic identification card; the public key is like the lock or gate mechanism that you present your ID card to.
通过一个数学算法,一个私钥如同您的电子身份证;公钥如同您向其出示身份证的锁或门机制。
The hashing algorithm is applied to the value of the partitioning key, and generates a partition number between zero and 4095.
散列算法应用于分区键的值,产生 0 到 4095之间的一个分区号。
The use of a nearby anchor is the key to the doomsday algorithm.
在末日算法中使用最近的锚日是关键。
The basic algorithm used to search for a key is shown in Listing 3.
搜索密钥的基本算法见清单3。
The key is typically a random sequence of bits; its size categorizes the strength of the encryption algorithm.
密钥一般是 0 或 1的一个随机序列;其大小区分了加密算法的能力。
Despite these examples, most words in the Metaphone algorithm return a single key.
除了这些例子之外,Metaphone算法中的多数单词还是返回单一键。
Kerberos defines an algorithm to generate a secret key from the user's password.
Kerberos定义了一种利用用户的密码生成密钥的算法。
Therefore, an algorithm that permits a "close-enough" match is required to compensate for the average user's inability to precisely match a given set of intra-key timings.
因此,需要使用允许 “足够接近(close-enough)”的匹配算法来弥补普通用户不能精确匹配给定的一组击键计时这个问题。
Therefore, the key problem is how to design a video compression algorithm aimed at network characteristics efficiently.
而其关键的问题是如何针对网络特点更有效地设计视频压缩算法。
Therefore, the key problem is how to design a video compression algorithm aimed at network characteristics efficiently.
而其关键的问题是如何针对网络特点更有效地设计视频压缩算法。
应用推荐