• 此外,本文还线性散列技术一般性扩充通过模拟实验研究了方法性能。

    In addition, a general expansion of lip ear hashing and the results of simulation of performance of the method are given as well.

    youdao

  • 技术中,用以解决溢出问题一种方法,利用相邻存储存放溢出部分。

    A technique used to solve overflow problems in hashing. It uses a neighbour storage area to store the overflow items.

    youdao

  • 此外,本文还线性散列技术一般性扩充通过模拟实验研究了方法性能。

    In addition, a general expansion of lip ear hashing and the results of simulation of performance of the method...

    youdao

  • 此外,本文还线性散列技术一般性扩充通过模拟实验研究了方法性能

    In addition, a general expansion of lip ear hashing and the results of simulation of performance of the met...

    youdao

  • 无论是浏览器安全保护代码管理乃至检测存储介质重复文件散列技术都在其中发挥重要作用

    Whether it is browser security protection, code library management, and even the detection of duplicate files stored in the media, hashing technology plays an important role.

    youdao

  • 文中介绍一个基于内容图像检索系统设计实现利用改进几何散列技术能够获得快速而且准确的相似形状检索。

    This paper presents the design and implementation of a content-based image retrieval system which acquires effective and efficient similar shape retrieval using a modified geometric hashing technique.

    youdao

  • 利用下推连接技术星型连接计划使得散列连接更加有效主要原因是,初期减少事实(探测表)的行数。

    A star join plan utilizing push-down hash join technology makes hash joins more effective primarily due to reduction of fact table (probe table) rows early on.

    youdao

  • 星型连接计划利用下推散列连接技术

    Star join plan utilizes push-down hash join technology.

    youdao

  • 存在名为内容寻址存储(content -addressable storage,CAS)的类似技术使用数据以便标识名称地址

    A similar technology exists called content-addressable storage (CAS) that USES a hash of the data to identify its name and address.

    youdao

  • 研究基于RS A密钥算法智能卡认证技术基础上提出了基于散列函数的智能卡访问认证方法

    On the basis of study of secret key algorithm RSA based smart card identity identification technology then puts forward HASH function based smart card identity identification method.

    youdao

  • 函数密码学基础要素之一主要应用方向是数据完整性校验身份认证技术

    The hashing function is one of the basic foundations of the cryptography. It widely used in data integrality and identity authentication.

    youdao

  • 第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

  • 第二章介绍基本应用密码学算法密码协议包括对称加密算法、非对称加密算法、散列函数、数字签名技术密钥管理协议

    In chapter 2, the basic algorithms and protocol of applied cryptography are introduced here, including symmetric-key cryptography, public-key cryptography, hash functions and key management protocols.

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定