Welcome![Sign In][Sign Up]
Location:
Search - hash

Search list

[.netHashDemo

Description: 在MFC框架下调用.NET函数实现hash算法-In the MFC framework calls. NET realize hash function algorithm
Platform: | Size: 4325376 | Author: yifei | Hits:

[ADO-ODBChash_src

Description: 一个开源的hash表的实现。The source code of structure hashtable.-An open source realize the hash table. The source code of structure hashtable.
Platform: | Size: 1024 | Author: 朱炽衡 | Hits:

[Windows DevelopDemo

Description: The demo is a simple console application that tests that the various hash tables work, illustrating things such as... ...how to reuse the generic hasher classes for other Key types. ...how to use another HashTable as Collection. ...tow to use your own, customized, template parameters. Check its source to find out more.
Platform: | Size: 14336 | Author: ncu | Hits:

[CA authHash

Description: 雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因為雜湊表搜尋在沒有碰撞(collision)及溢位(overflow)的情況下,只要一次就可擷取到。-Hash method (Hashing) search and general search method (searching) is not the same. In the hash law, the key (key value) or identifier (identifier) address in memory by the function (function) derived from the conversion. Such a function, commonly known as hash function (Hashing function) or key corresponds to the address converter (key to address transformation). For a limited storage space, can be used effectively and in time to add or delete can be completed faster, the use of hash is the most appropriate of all. Because the hash table search in the absence of a collision (collision) and overflow (overflow) circumstances, as long as one can be retrieved.
Platform: | Size: 35840 | Author: 張建良 | Hits:

[Linux-UnixJudy

Description: 一种类似于hash算法,但可顺序遍历成员,节省空间的映射算法实现,包括文档和源码-A hash algorithm is similar to, but can be a member of the order of traversal, mapping a space-saving algorithm, including documentation and source code
Platform: | Size: 1125376 | Author: wuyang | Hits:

[Data structshash.tar

Description: 一個C語言hash表的實現 hash.c hash.h Makefile test2.c test.c -A C language hash table realize hash.chash.h Makefile test2.c test.c
Platform: | Size: 3072 | Author: gangjh | Hits:

[Industry researchImage-Hashing-based-on-Human-Visual-System

Description: 提出一种基于视觉特性的图像摘要算法,增大人眼敏感的频域系数在计算图像Hash时的权重,使得图像Hash更好地体现视觉特征,并提高鲁棒性。将原始图像的分块DCT系数乘以若干由密钥控制生成的伪随机矩阵,再对计算的结果进行基于分块的Watson人眼视觉特性处理,最后进行量化判决产生固定长度的图像Hash序列。本算法比未采用视觉特性的算法相比,提高了对JPEG压缩和高斯滤波的鲁棒性。图像摘要序列由密钥控制生成,具有安全性。-Based on the visual characteristics of the image digest algorithm, increasing the human eye-sensitive frequency-domain coefficients in the calculation of the image when the weight of Hash, Hash makes images better reflect the visual characteristics, and improve robustness. Will block the original image multiplied by the number of DCT coefficients generated by the key control of pseudo-random matrix, then the results of calculation based on the sub-block of Watson HVS treatment, and finally quantify the judgments arising from fixed-length sequence of images Hash . Than the algorithm did not use the visual characteristics of the algorithm, improve the JPEG compression and Gaussian filtering robustness. Abstract image sequence generated by the key control, with security.
Platform: | Size: 167936 | Author: kurt | Hits:

[Otherhashtable

Description: hash算法,提供添加、删除、查找等功能-hash algorithm, to provide add, delete, search and other functions
Platform: | Size: 6144 | Author: lp | Hits:

[Otherhashp

Description: hash算法,提供新增、删除、查找等功能-hash algorithm, to provide add, delete, search and other functions
Platform: | Size: 2048 | Author: lp | Hits:

[OS Developmemcached-1.2.2.tar

Description: memcached是一个高性能的分布式的内存对象缓存系统,通过在内存里维护一个统一的巨大的hash表,它能够用来存储各种格式的数据,包括图像、视频、文件以及数据库检索的结果等。最初为了加速 LiveJournal 访问速度而开发的,后来被很多大型的网站采用。起初作者编写它可能是为了提高动态网页应用,为了减轻数据库检索的压力,来做的这个缓存系统。它的缓存是一种分布式的,也就是可以允许不同主机上的多个用户同时访问这个缓存系统, 这种方法不仅解决了共享内存只能是单机的弊端, 同时也解决了数据库检索的压力,最大的优点是提高了访问获取数据的速度!基于memcached作者对分布式cache的理解和解决方案。
Platform: | Size: 165888 | Author: dipeng | Hits:

[MPItbb20_010oss_src.tar

Description: Intel Threading Building Blocks多核并行运算库的源码。TBB是Intel开发的多核运算库,用并行处理算法循环,并附带了一个版本的hash map-Intel Threading Building Blocks multicore parallel computing library source. TBB is the Intel multi-core computing database development and use of parallel processing algorithms circle, and comes with a version of the hash map
Platform: | Size: 711680 | Author: bobxu | Hits:

[Other Databaseslinearhash

Description: 数据库系统实现,linear hash算法-Database systems, linear hash algorithm
Platform: | Size: 1932288 | Author: 朱清华 | Hits:

[Crack Hackexample

Description: encryption the text or decryption the hash text
Platform: | Size: 5120 | Author: jack | Hits:

[JSP/Javahash

Description: 这是一个URL检索的算法,其中有天网的Hfip散列,ELFhash、hf、Hashcode四种散列方法可供调用,主程序为Stringhash.java。-err
Platform: | Size: 29696 | Author: 陈方然 | Hits:

[Data structshash

Description: 采用迭代器模式实现hash算法,并自带CPPUNIT测试功能。-Iterator mode used hash algorithm and test function own CPPUNIT.
Platform: | Size: 5120 | Author: 李国强 | Hits:

[Windows Developshs2

Description: SECURE HASH STANDARD (SHS)使用160-bit SHA 散列算法,主要用于数字签名 DSA-SECURE HASH STANDARD (SHS) using 160-bit SHA hash algorithm, mainly used for digital signature DSA
Platform: | Size: 14336 | Author: zxang | Hits:

[Compress-Decompress algrithmssha1sourcecode

Description: 本代码是SHA1用C语言实现的源代码,SHA1与MD5是目前最为常用的HASH算法,可用于认证及签名等-This code is SHA1 with C language source code, SHA1 and MD5 is currently the most commonly used HASH algorithm, can be used for authentication and signatures
Platform: | Size: 53248 | Author: cl | Hits:

[Compress-Decompress algrithmsmd5sourcecode

Description: 本代码是C语言实现的MD5算法的源代码。MD5和SHA1是目前最为常用的HASH算法,可用于认证签名等。-This code is the C language source code of MD5 algorithm. MD5 and SHA1 is the most commonly used HASH algorithm, can be used for certification signatures.
Platform: | Size: 25600 | Author: cl | Hits:

[Data structsHashTable

Description: 用c++实现的hashtable的基本所有操作,有关one-way hash的再另行上传-With c++ Realized hashtable of all the basic operations, the one-way hash of a separate and upload
Platform: | Size: 12288 | Author: 杨光 | Hits:

[Crack HackSHA_MatLab

Description: SHA (安全Hash算法)是一种单向散列算法,可用于数字加密或数字签名,是比MD5更加安全的单向散列算法,与MD5算法一起时被应用最广泛的两种算法。-SHA (secure Hash algorithm) is a one-way hash algorithm, can be used for digital encryption or digital signature is more secure than the MD5 one-way hash algorithm, in conjunction with the MD5 algorithm was the most widely used two algorithms.
Platform: | Size: 5120 | Author: 张汉江 | Hits:
« 1 2 ... 4 5 6 7 8 910 11 12 13 14 ... 50 »

CodeBus www.codebus.net