I am trying to set up hash-based sharing, but it doesn't works.
我试图建立的基于散列的分片,但它不工作。
Ideally, use hash-based message authentication code (HMAC) because it's the most secure.
理想的情况下,使用基于哈布的消息验证码(HMAC),因为它最安全。
Nothing, if we never used an Integer as a key in a HashMap or other hash-based collection.
如果我们从未在HashMap或其它基于散列的集合中使用Integer作为关键字的话,什么也不会发生。
RDN Hash-based splitting: The directory server entry is used to calculate a unique hash value.
基于rdn散列的分割:使用目录服务器条目计算一个惟一的散列值。
Creates an instance of the default implementation of a Hash-based Message Authentication Code (HMAC).
创建基于哈希的消息验证代码(HMAC)实现的实例。
All hash-based collections assume that an object's hash value does not change while it is in use as a key in the collection.
所有基于散列的集合假设,当对象的散列值用于作为集合中的关键字时它不会改变。
The existing solutions use hash-based flow sampling algorithm, which assumes that the uniform random hash functions are available.
现有解决方案使用基于哈希流抽样算法,其基本假设是存在均匀随机哈希函数。
We also added a — sha1 flag, which produces.class files named based on the sha1 hash of the actual Ruby source.
我们还添加了一个——sha1标志,它能根据实际Ruby源代码的SHA1散列值命名生成的。class文件。
In a previous article, we discussed ReplCache, which is an implementation of a grid data container using consistent hash based distribution.
在之前的文章中,我们讨论了ReplCache,它使用了基于哈希一致性的分布式技术实现了一个网格数据容器。
In this script, after you understand the user you want to analyze (based on their screen name), you create a user hash.
在这个脚本中,您在理解要分析的用户后(基于他们的屏幕姓名),创建一个用户散列表。
Many objects, or the structures they use, are based on some kind of hash or array structure.
很多对象,或它们使用的结构,都基于某种散列或数组结构。
To guard against such an attack, root and signer certificates based on the MD5 hash should not be trusted.
为防止此类攻击,基于md5哈希的根证书和签名者证书不应受信任。
The sender creates a message digest (also called hash value, fingerprint/thumbprint, or watermark) based on the contents of the message.
发送方根据消息的内容创建消息摘要(也称为哈希码、指纹或者水印)。
The technique we use to generate the token is based on computing an MD5 hash from the content of the page.
我们用来产生记号的技术是基于从页面内容计算MD 5哈希值。
If the (optional) single-instance-storage feature is turned on, an additional hash code (based on the mail content and other fields) must be generated.
如果打开单事务存储特性(可选),那么必须生成一个附加的散列码(根据邮件内容和其他字段)。
The "abbrev" field in the hash entry is used to define command-line switches, so later I can define an -artist switch that can be abbreviated to -i based on the % freedb_searches information.
在该散列条目中的“abbrev”字段被用来定义命令行开关,这样,随后我可以基于% freedb_searches信息定义一个- artist开关,它可以被简写为- i。
There are two approaches to defining equality and hash value: identity-based, which is the default provided by Object, and state-based, which requires overriding both equals() and hashCode().
有两种方法来定义对象的相等性和散列值:基于标识,它是 Object提供的缺省方法;基于状态,它要求Overrideequals() 和hashCode() 。
With a hash index you can find a record in a given file in constant time by generating a hash value for the record and then looking up the record in the file based on that hash value.
借助hash索引,可以通过为记录生成一个hash值,然后根据这个hash值在文件中查找该记录,从而在固定的时间内在给定的文件中找到一条记录。
Automatic, hash-function based data partitioning and distribution.
支持自动地基于hash函数的数据分片策略。
The scheme firstly builds a distributed hash table based on the physical topology of network, so that the topology mismatch problem of conventional DHT schemes can be eliminated.
首先直接基于网络的物理拓扑结构来构建一种分布式哈希表,从而有效地消除了现有DHT方案的拓扑结构不匹配问题。
Based on partially blind signature and hash chain, a new electronic voting protocol was designed.
基于部分盲签名和散列链设计了一种新的电子投票方案。
On the basis of study of secret key algorithm RSA based smart card identity identification technology then puts forward HASH function based smart card identity identification method.
在研究基于RS A密钥算法智能卡认证技术的基础上,提出了基于散列函数的智能卡访问认证方法。
A hash function is an algorithm that returns a numeric hash code based on a key.
哈希函数是基于键返回数值哈希代码的算法。
Hash function plays an important role in the query algorithm, and the query algorithms based on it achieves a constant time complexity in theory.
散列函数在查询算法中起着重要作用,基于此的查询算法在理论上可达到常数级时间复杂度。
A new Hash function based on scheme of one time password system is raised in this paper.
文中提出了一种新的基于单向哈希函数的一次性口令认证方案。
Based on the hash chain concept of micropayment, this model well solves the payment problem of VASs and can remove the cheat.
利用小额支付中的散列链概念,很好地解决了增值服务的支付问题,并具有一定的防欺骗性。
It compares these algorithms through experimentations. The results shows that the time efficiency of the algorithm based on 2 hash tables is higher than those obtained based on 3 hash tables.
通过实验对这几种算法进行了比较,结果表明基于2个哈希表分类的算法的时间效率要高于基于3个哈希表分类的算法。
An optimized direct hashing and pruning algorithm is proposed based on minimal perfect Hash scheme.
提出了一种基于最小完美哈希函数的关联规则的挖掘算法。
How to generate a unique object hash based on the class attributes?
如何生成一个基于类的属性的独特的对象的哈希?
How to generate a unique object hash based on the class attributes?
如何生成一个基于类的属性的独特的对象的哈希?
应用推荐