此外,本文还对线性散列技术作了一般性扩充,并通过模拟实验研究了方法的性能。
In addition, a general expansion of lip ear hashing and the results of simulation of performance of the method are given as well.
在散列技术中,用以解决溢出问题的一种方法,它利用相邻的存储区来存放溢出部分。
A technique used to solve overflow problems in hashing. It uses a neighbour storage area to store the overflow items.
此外,本文还对线性散列技术作了一般性扩充,并通过模拟实验研究了方法的性能。
In addition, a general expansion of lip ear hashing and the results of simulation of performance of the method...
此外,本文还对线性散列技术作了一般性扩充,并通过模拟实验研究了方法的性能。
In addition, a general expansion of lip ear hashing and the results of simulation of performance of the met...
无论是浏览器安全保护、代码库管理乃至检测存储介质的重复文件,散列技术都在其中发挥着重要作用。
Whether it is browser security protection, code library management, and even the detection of duplicate files stored in the media, hashing technology plays an important role.
文中介绍了一个基于内容的图像检索系统的设计和实现,它利用改进的几何散列技术能够获得快速而且准确的相似形状检索。
This paper presents the design and implementation of a content-based image retrieval system which acquires effective and efficient similar shape retrieval using a modified geometric hashing technique.
利用下推连接技术的星型连接计划使得散列连接更加有效的主要原因是,在初期减少了事实表(探测表)的行数。
A star join plan utilizing push-down hash join technology makes hash joins more effective primarily due to reduction of fact table (probe table) rows early on.
星型连接计划利用下推散列连接技术。
存在名为内容寻址存储(content -addressable storage,CAS)的类似技术,其使用数据散列值以便标识其名称和地址。
A similar technology exists called content-addressable storage (CAS) that USES a hash of the data to identify its name and address.
在研究基于RS A密钥算法智能卡认证技术的基础上,提出了基于散列函数的智能卡访问认证方法。
On the basis of study of secret key algorithm RSA based smart card identity identification technology then puts forward HASH function based smart card identity identification method.
散列函数是密码学的基础要素之一,主要应用方向是数据完整性校验和身份认证技术。
The hashing function is one of the basic foundations of the cryptography. It widely used in data integrality and identity authentication.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
第二章介绍基本的应用密码学算法和密码协议,包括对称加密算法、非对称加密算法、散列函数、数字签名技术和密钥管理协议。
In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.
应用推荐