Welcome![Sign In][Sign Up]
Location:
Search - hash

Search list

[OtherHashTableinDS

Description: 一:问题描述 针对某个集体(比如你所在的班级)中的“人名”设计一个哈希表,使得平均查找长度不超过R,完成相对的建表和查表程序。 二:基本要求 假设人名为中国人姓名的汉语拼音形式。待填入哈希表的人名共有30个,取平均查找长度的上限为2。哈希函数用除留余数法构造,用伪随机探测再散列法处理冲突。 三:实现提示 如果随机函数自行构造,则应首先调整好随机函数,使其分布均匀。人名的长度均不超过19个字符(最长的人名如:庄双双(ZHAGN SHUANG SHUANG)。字符的取码方法可直接利用C语言中的tosacii函数,并可对过长的人名先作折叠处理。 四:需求分析 本演示程序是对哈希表的建立和查找进行演示,主要数据来自自己编写的人名“A~~Z”等字母组成,拼音由开头的字母组成的词组,查找时用伪随机探测再散列法处理冲突。随机产生人名的位置。具体的程序内容在源程序里面有比较详细的解析。程序的运行在下列有详细的介绍。 -one : Problem description against any collective (such as your own classes) of "names" design a hash table. you make the average length of not more than R, completes the construction and Lookup Table procedures. Two : the assumption that the basic requirements were known as the Chinese name of Chinese pinyin form. Hash Table question Enter the names of a total of 30, you take the average length of a maximum of two. Hash functions with a few exception I stay constructed using pseudo-random re-hash detection method to resolve disputes. 3 : Achieving suggested random function on its own if the structure should first be adjusted his random function, it evenly distributed. Names not on the length of more than 19 characters (the longest names such as : both Chong (ZHAGN SHUANG SHUANG).
Platform: | Size: 2048 | Author: wjs | Hits:

[Data structshash_table

Description: C语言写的Hash算法,在各种平台上都编译通过,可以直接使用。-C language to write the Hash algorithms on various platforms are compiled, can be used directly.
Platform: | Size: 3072 | Author: coldplus | Hits:

[Windows Develophashbobo

Description: 适用于文件加解密求文件的hash值用来测试-increases apply to documents declassified documents for the hash value for testing
Platform: | Size: 8192 | Author: 芯秀海 | Hits:

[Othermimaxue_ppt

Description: 非常不错的密码学课件(PPT),共20个文件 1[1].密码学与计算机安全2002-01.ppt 2[1].密码学与计算机安全.ppt 3[1].古典替换密码.ppt 4[1].古典变换密码.ppt 5[1].古典变换密码与乘积密码.ppt 6[1].现代密码学.ppt 7[1].现代分组密码-des.ppt 8[1].数论理论介绍.ppt 9[1].公钥密码学.ppt 10[1].公钥加密算法(续).ppt 11[1].认证、哈希算法.ppt 13[1].数字签名算法.ppt 17[1].ssl协议.rar 18[1].古典替换密码cont.ppt 19[1].可信的计算机系统.ppt 20[1].密钥管理与证书.ppt-very good cryptography Courseware (PPT), A total of 20 documents a [1]. cryptography and computer security 2002- 01.ppt 2 [1]. Cryptography and computer security. ppt 3 [1]. Classical replace passwords. ppt 4 [1]. Classical transform password. 5 ppt [1]. Classical transform the product code and password. ppt 6 [1]. Modern cryptography. ppt 7 [1]. Modern a password-des.ppt 8 [1]. on the number theory. ppt 9 [1]. Public-key cryptography. pp t 10 [1]. Public-key encryption algorithm (continued). ppt 11 [1]. certification, Hash algorithm. ppt 13 [1]. Digital Signature Algorithm. ppt 17 [1]. ssl agreement. rar 1 8 [1]. Classical replace passwords cont.ppt 19 [1]. credible computer system. ppt 20 [ 1]. key management and certificate. ppt
Platform: | Size: 3093504 | Author: 孟繁宇 | Hits:

[Data structsMonAlgorithmCode

Description: algorithm , tree hash table, b tree, Tas de Fibonnaci-algorithm, tree hash table, b tree, Tas de Fibonnaci
Platform: | Size: 14336 | Author: lalabu | Hits:

[VC/MFCGOOD_HASH

Description: 一个简单的HASH表的建立与HASH过程演示.-a simple hash table HASH the establishment and demonstration process.
Platform: | Size: 1024 | Author: 张新 | Hits:

[Crack Hack11_SHA

Description: 安全散列算法采用单向Hash函数将需加密的明文"摘要"成一串128bit的密文-security hash algorithm uses one-way hash function would require encryption expressly "summary" as a bunch of 128bit The ciphertext
Platform: | Size: 358400 | Author: fasf | Hits:

[Data structslist_hash

Description: hash表和单向链表的实现代码,相当实用.-hash table and the realization of one-way linked list code useful.
Platform: | Size: 8192 | Author: likebj | Hits:

[Data structsjeromel

Description: 利用Hash技术统计单词的频度。扫描一个C源程序,用Hash表存储该程序中出现的关键字,并统计该程序中的关键字出现的频度。用线性探测法解决Hash冲突。设Hash函数为:Hash(Key)=[(Key的首字母序号)*100+(Key的尾字母序号)] Mod 41 -use statistical word frequency. Scanning a C source files, using the hash table storage procedures of the keyword statistics and the proceedings of the keyword frequency. Linear Hash detection solution for the conflict. Hash functions located : Hash (Key) = [(the first letters Key serial number)* 100 (Key tail alphabetical serial number)] Mo d 41
Platform: | Size: 21504 | Author: 芦林飞 | Hits:

[JSP/JavaHash-ipstatistic

Description: 以IP地址为例,介绍采用Hash技术统计分析海量数据,结果存入数据库,由于数据库文件太大,只上载了Java源代码-IP addresses as an example, the use of statistical analysis Hash Massive technical data, the results are stored in the database. As the database files too, with only contains the Java source code
Platform: | Size: 16384 | Author: | Hits:

[Other11912918hash.c++

Description: Hash.h 此类简单实现了一个hash表的功能,基本描述了哈西表的功能 -Hash.h simple to achieve such a hash table functions, the basic description of the hash function
Platform: | Size: 1024 | Author: z | Hits:

[Otherhashchar

Description: 自己写的一个HASH算法小程序,基本的查找修改功能实现了。-himself wrote a hash algorithm for small procedures, the basic search function to achieve the changes.
Platform: | Size: 8192 | Author: Nicole | Hits:

[Othercrypttoolkit

Description: hash函数的工具大全,主要介绍sha算法,内容详尽但需要一定英文基础。-hash function tool Daquan, introduced sha algorithm, as detailed in English but needed basis.
Platform: | Size: 31744 | Author: 岳云召 | Hits:

[Othersanliebiao

Description: 散列表又叫哈希表,它是通过哈希函数来确定数据元素存放位置的一种特殊表结构。程序实现对指定文本文件中的单词进行检索,并可得哈希值-hashtable known as hash table, it is through the hash function to determine the location of data elements stored in a special table structure. Program of the DOE document, the text word search, may have hashes
Platform: | Size: 12288 | Author: dfa | Hits:

[AI-NN-PRaprioriWritByJava

Description: 用JAVA编写的apriori中的动态项目集计数实现算法。采用Hash方法实现具体的划分,属于apriori的一种改进算法-with JAVA apriori prepared by the dynamic item counting algorithm. Hash methods used to achieve specific division is apriori an improved algorithm
Platform: | Size: 5120 | Author: kpeng | Hits:

[Crack HackGetCRC32(CS)

Description: CRC32哈希算法的C#版源码.采用的是动态生成码表的方法.-CRC32-hash algorithm in C# version of the source code. The code is dynamically generated table method.
Platform: | Size: 23552 | Author: 李哓 | Hits:

[VC/MFCvc.net

Description: 第一章:综合运用VC.NET与托管类 第二章: 正则表达式的运用 第三章: 注册表、文件IO 第四章:密码学、HASH代码、数据加密 第五章:XML ADO.NET 第六章: ADO.NET与dataset 第七章:高级ADO.net 第八章:ADO.NET与xml高级运用 第九章:远程处理 第十章:事件日志、进程控制、性能测试 第十一章:管理托管对象 -Chapter I: the integrated use of VC.NET with the Managed Classes chapter: the use of regular expressions in Chapter III: registry, file IO Chapter IV: Cryptography, HASH code, data encryption Chapter V: XML ADO.NET Article six chapters: ADO.NET and dataset Chapter VII: Advanced ADO.Net Chapter VIII: ADO.NET with xml senior use of Chapter IX: Remote handle Chapter X: event logs, process control, performance testing Chapter XI: Management Managed Object
Platform: | Size: 18260992 | Author: 方剑 | Hits:

[Crack Hackhash_c

Description: 计算HASH值的C语言源代码,包括7种算法。-Calculated HASH value of C language source code, including seven kinds of algorithm.
Platform: | Size: 5120 | Author: walker | Hits:

[assembly languageHashTable

Description: 实验五 哈希表 [实验目的] 1、哈希函数的选择 2、用链表创建哈希表 3、输出哈希表 [题目] 假设人名为中国人姓名的汉语拼音形式。待填入哈希表的人名共有30个,取平均查找长度的上限为2。哈希函数用除留取余数法构造。用链表来处理冲突。-Five experimental hash table [the experiment was] one, the choice of hash function 2, create a hash table with linked list 3, the output hash table [subject] assumptions of people known as the Chinese name for the Chinese Phonetic Alphabet forms. Hash table to be populated with the names of a total of 30, taking the upper limit of the average search length of 2. Hash function used in addition to collecting more than the number of law structure. Used to deal with the conflict list.
Platform: | Size: 2048 | Author: 薛崖 | Hits:

[ADO-ODBCGasServer

Description: 黑龙江省煤矿瓦斯监控系统办事处端的程序;使用ADO方式连接SQLSERVER数据库,用SOCKET方式交换瓦斯报警数据,同时连接WEB网页,使用线程池技术建立与数据库的多个连接。这是一个监控现场正在运行的程序。对于数据库软件开发非常有参考价值。使用哈希表(HASH)查找数据。-潞 脷脕煤 陆 脢 隆 脙 潞 驴 贸脥脽脣 鹿 录 脿 驴 脴脧渭脥 鲁 掳 矛脢脗
Platform: | Size: 187392 | Author: 人民币 | Hits:
« 1 2 3 4 5 6 7 89 10 11 12 13 ... 50 »

CodeBus www.codebus.net