• As you saw in Part 1, this public key would be based on the RSA algorithm.

    1部分可以看到这个公钥基于rsa算法生成的。

    youdao

  • Once the input vectors have passed the "equal size" and "size greater than 1" tests, the heart of the algorithm is executed.

    一旦输入向量通过了“大小相等“值大于1测试执行算法核心部分。

    youdao

  • I just want to support one encryption algorithm (DES in CBC mode) whose INTEGER identifier is 1, 2, or 3, depending upon the message digest algorithm of the client's choice.

    希望支持一种加密算法(CBC模式下DES),根据客户机所选择消息摘要算法,它的INTEGER标识号12或者3

    youdao

  • A flow chart representing the algorithm for getting the information from the STAB format follows in Figures 1 and 2.

    12中的流程图显示了stab格式收集信息算法

    youdao

  • Table 1 lists the sample content of BUSINESS.SF files in your feature and plug-in JAR files. The version, signature algorithm, JVM, and digest information are provided there.

    1列出特性JAR文件插件JAR文件中的BUSINESS.SF文件示例内容,包括版本签名算法J VM摘要信息

    youdao

  • The final step needed to complete Step 1 of the planned algorithm is to perform the actual filtering.

    算法完成步骤所需要最后一步操作,就是执行实际筛选

    youdao

  • On receiving a reply from the server, the algorithm in Listing 1 is followed.

    收到服务器回复之后,将执行清单1中的算法

    youdao

  • A typical parallel divide-and-conquer algorithm takes the form shown in Listing 1.

    典型并行divide - and - conquer算法形式如清单1

    youdao

  • At a chunkSize of 1, this will create a per-pixel correct rendering of the distortion algorithm, while each increase in chunkSize will drastically reduce the number of SDL_BlitSurface calls required.

    chunksize1得到失真算法像素矫正呈现增大chunkSize将大大减少SDL_BlitSurface的调用次数。

    youdao

  • The pipelined implementation shows that the new algorithm occupies about 1/16 of the old one.

    采用流水线结构硬件实现表明算法占用的资源大约原来的1/16。

    youdao

  • The type attribute indicates the hash algorithm, such as Message-Digest algorithm 5 (MD5) or Secure Hashing algorithm (SHA-1).

    类型属性指出hash算法例如消息摘要算法5 (MD5)安全哈希算法(SHA - 1)。

    youdao

  • The padding is terminated by a "00" byte. It's followed by "30 21 30 09 06 05 2B 0E 03 02 1A 05 00 04 14" which is the PKCS #1 v2.1 way of specifying the SHA-1 hash algorithm.

    填充字节00结束,后面的是"3021 300906052B0E03021A 05 000414",PKCS #1v2.就是这样指定SHA-1哈希算法。

    youdao

  • The way hashcash poses a challenge is by asking "minters" to produce strings (stamps) that when hashed with the Secure Hash Algorithm, SHA-1, have a number of leading zeros in their hash.

    hashcash提出质询的方式通过安全散列算法(SecureHash Algorithm)进行列时,要求minters生成 一个字符串戳记,stamps),它们的散列中很多前导零。

    youdao

  • What is important is that the algorithm guarantees that after a sequence of operations the expensive operations will be amortised and thereby rendering the entire operation O(1).

    重要算法保证一系列操作之后,耗时昂贵操作时间分摊从而使整改操作的时间复杂度为O1)。

    youdao

  • Today, Google cracked an old encryption algorithm called SHA-1, although this does not sound like the most significant milestone in the network security.

    今天谷歌破解了一种名为SHA-1的老式加密算法尽管此事听起来像是网络安全界重大里程碑

    youdao

  • Therefore, the hybrid intelligence algorithm is effective to solve 0-1 knapsack problems.

    因此,应用混合智能算法求解0 - 1背包问题比较有效的。

    youdao

  • The mathematical model of discrete optimal design of structures of RCCP is established, and introduced a binary algorithm on the (0, 1) program.

    建立了适合钢筋混凝土地下埋管离散变量模型给出了计算(0,1)规划一种二进制算法

    youdao

  • What's the algorithm for 2:1 balancing a linear octree?

    什么2:1平衡线性树的算法吗?

    youdao

  • Google still believes that its research should encourage all companies that are still using this algorithm to stay away from SHA-1, which has long been considered to be very secure.

    谷歌仍然认为研究应该会促使仍在使用这种算法所有公司远离长期以来认为安全性很差的SHA - 1

    youdao

  • An improved LR (1) parsing table and its construction algorithm are proposed.

    改进了传统的LR(1)分析提出了新的构造算法

    youdao

  • Adaptive Kalman filter algorithm study (1) Based on the study of the passive target tracking in modified polar coordinates, the nonlinear dynamic model is devised.

    自适应滤波算法(1)研究极坐标系水下目标被动跟踪问题,建立了被动跟踪动力学模型

    youdao

  • However, in the case of the use of SHA-1, such as the existence of certain defects in the hash algorithm, with abundant resources of the attacker is able to achieve this kind of collision results.

    然而使用SHA - 1存在一定缺陷散列算法情况下拥有充裕资源攻击者确实能够实现这种碰撞结果。

    youdao

  • Compared with 2.4 version kernel, 2.6 has been improved in real-time performance by adopting some new technologies, such as preemptible kernel, new o (1) schedule algorithm etc.

    相比2.4内核,2.6采用一些技术使得实时性了很大提高抢占式内核、新的O(1)调度算法

    youdao

  • And third, we give an algorithm transforming LL (1) analytic table into state table.

    第三部分介绍了LL(1)分析改成状态表的算法

    youdao

  • The main novel contributions of this paper are as follow: 1. Difference merged image algorithm based on CNN is presented.

    本文的主要研究贡献1提出基于CNN差分图象合并视频分割算法

    youdao

  • The equal error rate(EER) of the algorithm is 1.

    得到算法错误率(EER1

    youdao

  • This paper presents a hierarchical scheduling algorithm based on NUMA topology after analyzing the O(1) scheduling algorithm's support for NUMA.

    该文深入分析O1调度算法NUMA支持基础提出一种基于NUMA拓扑结构分级调度算法。

    youdao

  • This paper presents a hierarchical scheduling algorithm based on NUMA topology after analyzing the O(1) scheduling algorithm's support for NUMA.

    该文深入分析O1调度算法NUMA支持基础提出一种基于NUMA拓扑结构分级调度算法。

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定