Welcome![Sign In][Sign Up]
Location:
Search - hash function

Search list

[OS Develophash

Description: 一些经典的HASH函数及测试数据-some classics of the hash function and test data.
Platform: | Size: 47956 | Author: lll | Hits:

[ELanguageDrakeCompiler

Description: 这可是我的倾情制作,离卖弄的语法分析器,是自己写的实现程序,不使用他人的结果,直接从原始语法里进行推理计算的,而且这个使用c语言实现的,很多底层函数都是自己来写,像hash表里的hash函数,还有像动态自增长分配等。当然这个还很不完善,但是已经作了很多工作,差就差在没有找到理想的脚本支持语言,最后没有办法只能用函数指针的数组来进行语义调用了。-this but my DEDECATES production, from the play of parser, written in their own procedures, not to use the results of others directly from the original grammar conducted calculated reasoning, but the use of the c language, many are bottom of their function to write, like hash exterior of the hash function , as from the dynamic growth of distribution. Of course, this is far from perfect, but has made a lot of work, they just lacked the poor fail to find an ideal script language support, no way to the final only with an array of function pointers for the Semantic call.
Platform: | Size: 91136 | Author: | Hits:

[OS Develophash

Description: 一些经典的HASH函数及测试数据-some classics of the hash function and test data.
Platform: | Size: 48128 | Author: lll | Hits:

[Crack Hackhash

Description: 这是一个用matlab写的hash函数,相信对用matlab做实验仿真的同学有所帮助-This is a hash function written in matlab, I believe that using matlab simulation experiments help students
Platform: | Size: 1024 | Author: 王量 | Hits:

[source in ebookHash

Description: 1. 本程序是针对我们班级中“人名”设计的哈希表,平均查找长度不超过R。 2. 程序中人名为汉语拼音形式,共30个我周围较熟悉的同学,取平均查找长度的上限为2.哈希函数用除留余数法构造,用伪随机探测再散列法处理冲突。 3. 人名的长度均不超过19个字符,测试数据为查找“hanbiao”。 本程序以用户和计算机的对话方式执行,即在计算机终端上显示“提示信息”之后,由用户在键盘上输入程序中规定的运算命令;相应的输入数据(滤去输入中的非法字符)和运算结果显示在其后。 -1. This procedure is for our classes, name designed hash table, the average length of no more than to find R. 2. Procedure human form known as Hanyu Pinyin, a total of 30 around me who are more familiar with the students, taking the average to find the length of the upper limit of 2. Hash function used in addition to stay more than a few law structure, with pseudo-random hashing method to detect and then deal with the conflict. 3. The names of persons not of the length of more than 19 characters, the test data to find hanbiao . The procedures to users and the computer implementation of dialogue, that is displayed on computer terminals in the message after, by the user at the keyboard, enter the procedure provided for computing the order corresponding input data (least squares input of illegal characters) and The results showed that in subsequent operations.
Platform: | Size: 198656 | Author: ck | Hits:

[Web Serverhash

Description: PHP服务器端HASH功能的源代码。编译后在服务器端使用。-PHP server-side source code HASH function. Compiled in the server-side use.
Platform: | Size: 121856 | Author: barry | Hits:

[Data structsHASH

Description: 扫描一个C源程序,用Hash表存储该程序中出现的关键字,并统计该程序中的关键字出现频度。用线性探测法解决Hash冲突。设Hash函数为: Hash(key)=[(key的第一个字母序号)*100+(key的最后一个字母序号)] MOD 41-Scan a C source program, using Hash Table to store the keywords appear in the procedure, and statistical procedures in the frequency of the keyword appears. Linear detection method to resolve the conflict Hash. Based Hash function: Hash (key) = [(key the first letter of the serial number)* 100+ (Key serial number of the last letter)] MOD 41
Platform: | Size: 9216 | Author: zhang | Hits:

[OtherHASHLIST1

Description: 题 目: 哈希表设计 初始条件: 针对某个集体(比如你所在的班级)中的“人名”设计一个哈希表,使得平均查找长度不超过R,完成相应的建表和查表程序。 假设人名为中国人姓名的汉语拼音形式。待填入哈希表的人名共有30个,取平均查找长度的上限为2。哈希函数用除留余数法构造,用伪随机探测再散列发处理冲突。 -Title: Hash Table Design initial conditions: for a collective (such as your classes) the names to design a hash table, making an average to find the length of not more than R, the completion of the construction schedule and look-up table procedure. The assumption that the names of people known as China s Hanyu Pinyin form. Hash table to be populated with the names of a total of 30, taking the average to find the length of the upper limit of 2. Hash function used to stay more than a few laws in addition to construction, using pseudo-random hash to detect re-issued dealing with conflict.
Platform: | Size: 732160 | Author: 陈宗浩 | Hits:

[JSP/JavaHASHexampleJAVA

Description: Hash函数实例,所用文章为5000单词以内,所以初始为求出所取单词的hash值,然后对1901求余,所得的余数作为一个数组的下标,数组的每一个数又是一个链表,凡余数相同的单词放入同一链表.此为所构造的hash函数.-Hash function examples used in the article for the 5000 words or less, so the initial word is derived by taking the hash value, and then seek to 1901 while the remainder of the proceeds as a subscript array, the array of each number is also a linked list, Where more than the same number of words placed in the same list. This is the structure of the hash function.
Platform: | Size: 3072 | Author: 王争社 | Hits:

[VC/MFChash

Description: 散列表又叫哈希表,它是通过哈希函数来确定数据元素存放位置的一种特殊表结构。程序实现对指定文本文件中的单词进行检索,并可得哈希值-Hash table is also called the hash table, it is through the hash function to determine the location of data elements stored a special table structure. Procedures to achieve the specified text file in a word search, and a hash value
Platform: | Size: 4096 | Author: like | Hits:

[Documentshash

Description: 这是一篇基于Hash函数敏感性的医学图像精确认证.本文提出了一种基于提升格式的整数小波变换和Hash函数敏感性相结合的易碎水印方法-This is a Hash Function Based on the sensitivity of the medical image accurate authentication. In this paper, a lifting scheme based on integer wavelet transform and Hash function that combines the sensitivity of fragile watermarking method
Platform: | Size: 616448 | Author: hj | Hits:

[DocumentsHashTIN

Description: 基于Hash函数的TIN拓扑关系重建,Hash函数的构造方法,基于Hash函数的TIN拓扑关系重建算法-Hash function based on the relationship between TIN topology reconstruction, Hash function construction method, based on the Hash function reconstruction algorithm TIN topological relations
Platform: | Size: 322560 | Author: 李叶林 | Hits:

[Crack Hackhash

Description: 实现了hash散列函数的功能并有验证结果-Achieved a hash function hash function as well as to verify the results of
Platform: | Size: 80896 | Author: leslie | Hits:

[Crack Hacksha_core

Description: 安全散列函数的VERILOG实现,通过了fpga验证,在系统正可以直接当IP盒应用-Secure Hash Function VERILOG achieve, through the FPGA verification, the system is can be directly applied when the IP box
Platform: | Size: 69632 | Author: 金鑫 | Hits:

[Crack Hackmd6_c

Description: 目前最新的MD6 Hash 算法源码,下一代的安全散列验证算法。-The new MD6 hash function,the next generation hash function.
Platform: | Size: 34816 | Author: yuisikyo | Hits:

[Crack Hacksha2-1.0

Description: SHA-2 (Secure Hash Algorithm 2) hash function, written in C language.
Platform: | Size: 65536 | Author: gKir | Hits:

[Crack HackHASH

Description: 数字签名中哈希函数的分析与研究,主要分析哈希函数的结构。-Hash function in the digital signature analysis and research, the main structure of the hash function.
Platform: | Size: 94208 | Author: 马利 | Hits:

[Crack Hackhash

Description: 亲测,很好用的hash function-Pro-test, a good hash function used
Platform: | Size: 1024 | Author: KKy | Hits:

[Software EngineeringHash-Function

Description: 哈西算法 实用 hash in algorithm-hash function is a very important algorithm in the cs field. it is a function can do hash and haxi correct.
Platform: | Size: 5051392 | Author: msfiona | Hits:

[Other安全Hash算法SHA-1的实现

Description: Hash函数是提供数据完整性保障的一个重要工具。本次实验,我们希望通过上机操作,使 同学们对安全Hash算法SHA-1的基本原理有一个全面的理解。通过本次实验,使学生掌握对 Hash函数的应用,为后面数字签名方案的学习打下基础。(The Hash function is an important tool for providing data integrity protection. In this experiment, we hope to have a comprehensive understanding of the basic principles of the security Hash algorithm SHA-1 through the operation of the machine. Through this experiment, the students can grasp the application of the Hash function and lay the foundation for the learning of the later digital signature scheme.)
Platform: | Size: 6144 | Author: 斩月 | Hits:
« 12 3 4 5 6 7 8 9 10 ... 21 »

CodeBus www.codebus.net