• Linear hashing is an effective dynamic hash method.

    线性方法一种有效动态列方法。

    youdao

  • In this method, one of the tables, usually the smaller one, is scanned and used to create a hash table in memory.

    方法中,需要扫描其中的一个通常扫描较小那个表,用它内存中创建哈希

    youdao

  • Join plan directives that force optimizer to use the designated join method to join tables in the query, either nested loop join, sort merge join, or dynamic hash join.

    连接计划指示强制优化器使用指定的连接方法连接查询中的要么嵌套循环连接、分类合并连接,要么是动态哈希连接。

    youdao

  • This join method is replaced by dynamic hash join for IDS version 7 and above.

    IDS版本7以及更高版本中,连接方法动态哈希连接所取代。

    youdao

  • As mentioned above, dynamic hash join is a new join method for IDS version 7 and above.

    正如上面所提到的,动态哈希连接IDS版本7以及更高版本中的连接方法

    youdao

  • Hash partitioning is the method by which the placement of each row in the partitioned table is determined. The method works as follows.

    散列分区用于确定每一分区中的位置方法

    youdao

  • The method is called DigestSearch because it USES the unique digest (one-way hash) value to represent a search word.

    方法称作DigestSearch是因为使用惟一摘要(单向散列)表示一个搜索

    youdao

  • The getCreateConnection() method uses a static hash table to determine if either an existing connection can be returned, or needs to be created.

    getCreateConnection()方法使用静态哈希确定是否可以返回现有连接需要进行创建

    youdao

  • You can just inherit from the Tie: : StdHash package (in the Tie: : Hash perldoc), which defines every method you will need, so you just need to override the ones you want.

    完全可以继承tiestdhash(位于Tie:Hashperldoc中),定义了需要的全部方法这样您只需覆盖想要方法。

    youdao

  • Update-the update method takes an integer ID to specify the row to update, as well as a hash table of fields to update with the specified values.

    update—update方法接受整数ID,以指定更新;或者接受字段哈希使用指定值更新字段。

    youdao

  • As with the jcarousel method, a hash of initialization parameters allows you to customize the behavior of the tabs method.

    jcarousel方法一样,可以通过传递初始化参数散列定制tabs方法的行为

    youdao

  • You have to supply the list of OIDs to obtain when using the get_request method as a reference to an array, and then pull the information back out from the hash that is returned.

    使用get _ request方法作为数组引用时必须提供获得OID列表然后返回散列中提取信息

    youdao

  • I used a hash map as a class attribute, but had to construct a key that included the country, the region, and the page start, as shown in the LoadCities method.

    使用散列映射作为属性但是必须构造一个包含国家地区页面起点,见LoadCities方法

    youdao

  • A hash join method is requested to perform the join between the 'SECURITY' and the 'ORDER' tables.

    请求使用一个hash连接方法执行SECURITYORDER之间连接。

    youdao

  • In the view, you need to define signal handlers using the define_signal method. It takes a hash defining a signal name and a view method to handle that signal.

    视图中,需要使用define_signal方法定义信号处理程序

    youdao

  • In this case, I create an array of hash tables — a common method to store structured data such as this.

    例中创建列表数组——用来存储这类结构式数据常见方法

    youdao

  • Each transition is a method invocation followed by a hash table.

    每个转换都列表之后一个方法调用

    youdao

  • The second method is to use the hash notation.

    第二方法使用表示法

    youdao

  • This method computes a hash value for each object.

    方法计算每个对象hash

    youdao

  • That variable, in turn, calls the __get method on the object that looks for the title item in the hash table and returns it.

    这个变量调用对象__get方法列表中查找title条目返回。

    youdao

  • LM Hash is vulnerable to this type of attack because it does not use today's common method of introducing "salt" to the encryption process.

    LMHash容易此类攻击攻破,是因为没有使用现今常用加密过程引入salt”的方式。

    youdao

  • No, there is no such method. The hash function is lossy.

    没有这样办法函数有损耗的。

    youdao

  • Why do we need to pop Hash to create this calculate method?

    为什么我们需要流行哈希创建这个计算方法

    youdao

  • On the basis of study of secret key algorithm RSA based smart card identity identification technology then puts forward HASH function based smart card identity identification method.

    研究基于RS A密钥算法智能卡认证技术基础上提出了基于散列函数的智能卡访问认证方法

    youdao

  • A method to handle hash collision with dual chain was introduced, and its affection on performance was analyzed, The design and implementation was given based on network processor IXP2400.

    介绍了条链处理冲突问题的方法分析了性能影响网络处理器IXP2400为例给出了具体设计实现

    youdao

  • This paper presents a curve-fitting method to construct Hash functions.

    本文给出一种构造哈希函数的曲线拟合法。

    youdao

  • This paper defines a PPP authentication methods, the method using random "challenge" and the basis for "challenge" and calculated key encryption Hash "responsive" to complete certification.

    本文定义了一种PPP认证方法方法利用随机挑战依据“挑战”和密钥计算出加密哈希应答完成认证

    youdao

  • The final chapter expounds on correction methods of random sequences, and proposes a method of using the hash algorithm to correct the original outputs of TRNG.

    本文最后分析了随机序列修正方法提出了哈希算法随机数发生器原始输出进行修正的方法

    youdao

  • The final chapter expounds on correction methods of random sequences, and proposes a method of using the hash algorithm to correct the original outputs of TRNG.

    本文最后分析了随机序列修正方法提出了哈希算法随机数发生器原始输出进行修正的方法

    youdao

$firstVoiceSent
- 来自原声例句
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定
小调查
请问您想要如何调整此模块?

感谢您的反馈,我们会尽快进行适当修改!
进来说说原因吧 确定