Welcome![Sign In][Sign Up]
Location:
Search - hash

Search list

[Data structs统计单词个数

Description: 利用哈希表统计文本文件中单词的个数,哈希函数的实现为取模法,利用链地址法解决冲突。-use Hash Table Statistics text file number of words, the realization of Hash Functions for Remainder law, the use of chain law addresses solution to the conflict.
Platform: | Size: 5120 | Author: 米子 | Hits:

[Crack HackHash2131

Description: 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming language to achieve complete hash of functionality (2) the importation of any eight-byte (64 spaces) data, draw the corresponding eight hash code (Abstract)
Platform: | Size: 1884160 | Author: | Hits:

[TreeView2004052512573625343213132123

Description: 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -1) understanding hash functions in network security applications (2) master Hash Function Principle 2 require (1) using any programming language to achieve complete hash of functionality (2) the importation of any eight-byte (64 spaces) data, draw the corresponding eight hash code (Abstract)
Platform: | Size: 836608 | Author: | Hits:

[Crack Hack2005112814355760

Description: 高亮语法类 1)了解HASH函数在网络安全中的应用 (2)掌握HASH函数实现的原理 二、要求 (1)用任何语言编程完成实现HASH函数的功能 (2)输入任何8个字节(64位)的数据,得出对应的8位HASH代码(摘要) -syntax highlighter category 1) to understand the hash function in network security applications (2) real grasp Hash Function the two principles are, requirements (1) using any programming language to achieve complete hash of functionality (2) the importation of any eight-byte (64-bit ) data, draw the corresponding eight hash code (Abstract)
Platform: | Size: 56320 | Author: | Hits:

[Data structs排序算法、字典和B-树的C++语言实现

Description: 排序算法、字典和B-树的C++语言实现 代码内容 包括以下算法: qui.c sort: quicksort qsort.c sort: qsort ins.c sort: insert sort shl.c sort: shell sort has.c dictionary: hash tables bin.c dictionary: binary tree rbt.c dictionary: red-black trees skl.c dictionary: skip lists ext.c external sort btr.c btree 语言 C++ 编译平台 Visual C++ 作者 Thomas Niemann 备注 来自Sorting and Searching Algorithms:A Cookbook-algorithm, dictionaries and B-Tree C language code include the following algorithm : qui.c sort : quicksort qsort.c sort : qsort ins.c sort : insert sort shl.c sort : shell sort has.c dictionary : hash tables bin.c dictionary : binary tree rbt.c dictionary : red-black trees skl.c dictionary : skip lists ext.c external sort btr.c BTREE Part C language Visual C platform translated author Thomas Niemann Remarks from the Sorting and S earching Algorithms : A Cookbook
Platform: | Size: 24576 | Author: 罗鹏魁 | Hits:

[ConsoleHashTest

Description: 本源码演示Hash类的使用方法,是一个控制台应用程序。-Hash demonstration of the source categories of use, is a console application.
Platform: | Size: 15360 | Author: 张广召 | Hits:

[Other resourcespider_v1.2

Description: 网络蜘蛛1.3版, 功能变更: 1. 关于对处理过URL和待处理URL的存储检索。 利用文件系统存储这些信息,利用Hash碰撞分页算法,加上最新数据的内存缓存,实现高效的信息检索。平均检索的效率0.01s 2. 修改前面版本URL替换产生的中文问题。 -network spider version 1.3, the functional changes : 1. On the right URL and processed pending the URL storage and retrieval. Use of document storage systems such information, the use of tabs collision Hash algorithm, with the latest data cache memory to achieve efficient information retrieval. Average retrieval efficiency 0.01s 2. Earlier versions of the URL changes replace the Chinese language.
Platform: | Size: 1044480 | Author: 周某人 | Hits:

[ADO-ODBCSimpleDatabase

Description: 1、实现了一个简单的数据库 2、采用HASH表建立索引 3、可以从database.dat中读取表结构,生成数据库, 4、[FORM]开始的段创建表和读入缺省值 5、[DATA]保存数据库数据 6、支持多索引 7、具体使用可以看示例-achieve a simple two databases using hash table index 3, which can be read from database.dat table structures, database generation, 4, [FORM] the beginning of the creation of tables and read into default values 5, [DATA] preservation Database 6 , supports multi-7 index, the use of specific examples can be seen
Platform: | Size: 44032 | Author: 王伟 | Hits:

[Crack HackHASHES.ZIP

Description: 雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因為雜湊表搜尋在沒有碰撞(collision)及溢位(overflow)的情況下,只要一次就可擷取到。 -hash (Hashing) search and search for a general law (searching) is not the same. The hash law, the pair (key value) or identification characters (identifier) in the memory address of the sender is by function (function) generated from the conversion. Such functions, commonly known as hash functions (Hashing function) keys corresponding addresses or conversion (key to address transformation). For the limited storage space, which can be effectively used in acceding to or deleted can be completed faster, using hash method is the most appropriate. Because hash table search in the absence of collisions (collision) and overflow (overflow) circumstances, as long as one can capture that.
Platform: | Size: 24576 | Author: HCJ | Hits:

[ADO-ODBChashtodatabase

Description: 用HASH表操作数据库中的数据。数据的操作过程及其他。-hash table operation with the data in the database. The process of data and others.
Platform: | Size: 3072 | Author: gmq | Hits:

[P2P176869120_HashAlgorithmTest

Description: 哈希算法测试。对我学习帮助挺大,上传共享。-Hash algorithm testing. I learn to help getting bigger, upload share.
Platform: | Size: 72704 | Author: | Hits:

[Data structssparsehash-0.2

Description: google的hash table库实现,非常高效-the hash table for achieving very high efficiency
Platform: | Size: 720896 | Author: 张志 | Hits:

[Otheryeetoomd5_source_2.0.1.1

Description: vc6.0, mfc下开发的关于计算文件和字符串md5 hash值应用程序的源程序-vc6.0. mfc developed for the calculation of paper and string md5 hash value of the application's source
Platform: | Size: 29696 | Author: | Hits:

[GUI DevelopwinHash

Description: 用TC实现一个HASH算法,用户可以在操作界面进行操作并实现算法的统计。-achieve a hash algorithm, the user interface can operate and achieve the statistical algorithms.
Platform: | Size: 163840 | Author: 倪恩伟 | Hits:

[Multimedia Developzlib-1.1.4

Description: 1。zlib压缩算法,在LZ77的基础上实现,并 利用Huffman编码特点,采用hash表;2。zlib的解压算法。-1. Zlib compression algorithm, the LZ77 achieved on the basis of, and use of Huffman coding features, using hash table; 2. Zlib the decompression algorithm.
Platform: | Size: 241664 | Author: 石蒲 | Hits:

[GUI Developcmd51

Description: hash函数 用于签名算法的实现等等 用于加解秘-hash function for the signature algorithm for the realization of such increases deciphered
Platform: | Size: 182272 | Author: xueke | Hits:

[OtherstudentNoSQL

Description: 我们的作业,没有连接数据库。而使用的是哈希表。希望对大家能有帮助!-our operations, is not linked to the database. The use of the Hash Table. We hope to be able to help!
Platform: | Size: 9216 | Author: 严绍峻 | Hits:

[Data structs060626

Description: 哈希表设计 针对某个集体中人名设计一个哈希表,使得平均查找长度不超过R,并完成相应的建表和查表程序。-Hash Table design is a design collective Names Hash Table 1, bringing the average length not exceeding find R, and completion of the corresponding construction and Lookup Table procedures.
Platform: | Size: 6144 | Author: guoxingxi | Hits:

[Linux-Unixmemoryyyyy

Description: 存储管理实验 内存页面调度算法比较 理解内存页面调度的机理,掌握几种理论调度算法实现,并通过实验比较各种调度算法的优劣。此外通过实验了解HASH表数据结构的使用。 -experimental memory storage management pages scheduling algorithm better understanding of memory pages scheduling mechanism, Several theories master scheduling algorithm, and through experiments comparing the merits of scheduling algorithm. In addition experimental hash table to understand the data structure used.
Platform: | Size: 15360 | Author: | Hits:

[Algorithmcsha1_demo

Description: 可用于P2P分布式网络的哈希算法, 带有例子,直接复制出HASH类即可方便使用.-for peer-to-peer distributed network of Hash algorithms, with examples. direct cloning HASH category will be easier to use.
Platform: | Size: 32768 | Author: 纪灵 | Hits:
« 1 2 3 4 5 6 78 9 10 11 12 ... 50 »

CodeBus www.codebus.net