hashing

美 [hæʃɪŋ]英 [hæʃɪŋ]
  • v.“hash”的现在分词
  • 网络散列法;杂凑;哈希

hashinghashing

hashing

散列法

石油词汇英语翻译(GH)--石油百科 ... hashed 散列的 hashing 散列法 Haskell matrix 哈斯克尔矩阵 ...

杂凑

杂凑(Hashing) 是电脑科学中一种对资料的处理方法,通过某种特定的函数/算法(称为杂凑函数/算法)将要检索的项与用来检 …

哈希

这就是哈希Hashing),Hashing方法的串查 寻最早是在1971年被Harrison介绍,之后得到了充分地分 析。1992年到1996年…

杂凑法

杂凑法(hashing)、图和树。

哈希算法

哈希算法Hashing)(基本天天见,小到hash表,大到MinHash,LSH,SimiHash这样可以的方法)堆排序(Heaps)(使用不 …

散列算法

 散列算法hashing) 一种单向函数和数据完整性技术,使用一种公式/算法来改变长的消息和共享密钥转换为长度固定的 …

杂凑搜寻法

计算机与网络英语词汇(H) ... hash value 杂凑值 hashing 杂凑搜寻法 hatched pattern 规划的图样 ...

1
You can see how much Shiro simplifies hashing and encoding, saving you a bit of sanity in the process. 你可以看到Shiro对哈希和编码简化了不少,挽救了你处理在这类问题上所消耗的脑细胞。
2
"The whole nature of sitting down and hashing out ideas and collaborating is a bit stymied by the construct of the cubicles, " he says. 他表示:“这种办公环境的设计,破坏了坐下来考虑创意并进行合作的本质。”
3
Class' hashing a few classmates may know news that I become sick, all looking at me with the very strange taste. 班上有几个同学可能知道我得病的消息,都用很奇怪的眼光看着我。
4
By hashing over and translating much material that you would not even use, you went through a process of a direct relationship with us. 靠再三回顾和翻译很多你甚至不使用的素材,你就进入与我们有直接联系的过程中。
5
Specifies all the hash algorithms used for hashing files and for generating the strong name. 指定用于哈希文件和用于生成强名称的所有哈希算法。
6
This hashing behavior of the returned comparer is not limited by an overall node count when hashing F# records, lists and union types. 在对F#记录、列表和联合类型进行哈希处理时,返回的比较器的此哈希处理行为不受总体节点计数所限。
7
What Lewin and Leighton invented was a mathematical scheme called "consistent hashing' that radically sped up the process. " 列文和莱顿发明的是一种被称作“一致性哈希”的数学规划,这可以从根本上提高进程的速度。
8
A number of software vendors and committees have been hashing them out for several years. 一些软件供应商和委员会已经对此讨论多年。
9
At all points in between, the message is protected, either for integrity (using hashing) or for privacy (using encryption). 在消息生成和消息使用之间的所有时点上,消息都受到保护,不管是为了完整性(使用散列表)还是为了私密性(使用加密)。
10
Perfecting hashing is difficult and to deal with that hashtable implementations support collision resolution. 要写出一个完美的哈希函数是很困难的,特别是要处理哈希表中的冲突。
11
Supplies a hash code for an object, using a hashing algorithm that ignores the case of strings. 使用忽略字符串大小写的哈希算法,为对象提供哈希代码。
12
hash (Hashing) search and search for a general law (searching) is not the same. 杂凑法(Hashing)的搜寻与一般的搜寻法(searching)是不一样的。
13
When the system boots, it measures its own hashing and PCR loading code and writes the hash to the first PCR of the TPM. 当系统启动时,它会测量自己的哈希和PCR加载代码,并将哈希写入TPM的第一个PCR。
14
Uses hashing to transmit client credentials in an encrypted manner so the password is not transmitted in clear text. 使用哈希算法以加密的方式传输客户端凭据,这样,密码将不以明文形式传输。
15
With combination of different key lengths and different hashing algorithms, IBM NAS provides encryption types as shown in Table 1. 通过组合使用不同的密钥长度和散列算法,IBMNAS提供表1所示的加密类型。
16
Public recrimination may just be part of the process of hashing out a grand bargain in private. 公众指责的可能只是出来的散列私下大交易过程的一部分。
17
Congress, the White House, and Wall Street are still hashing out final details of the plan. 美国国会、白宫以及华尔街仍在商议拯救计划的最终细节。
18
Returns a hash code for the given object, using a hashing algorithm that ignores the case of strings. 使用忽略字符串大小写的哈希算法返回给定对象的哈希代码。
19
hash-send-sort. The beauty of using hashing is that the data can be sent to its destination while the map is still processing it. 美丽的使用散列是数据可以送到目的地而地图仍然是处理它。
20
Gets or sets the hashing algorithm that Message Queuing uses when authenticating a message or creating a digital signature for a message. 获取或设置消息队列在验证消息或为消息创建数字签名时使用的哈希算法。
21
Unlike cryptography , which allows data to be encrypted and then decrypted , hashing data is a one- way process . 与加密不同,加密允许数据加密后再解密,而哈希数据只允许单向进行。
22
A technique used to solve overflow problems in hashing. It uses a neighbour storage area to store the overflow items. 在散列技术中,用以解决溢出问题的一种方法,它利用相邻的存储区来存放溢出部分。
23
Windows-based computers utilize two methods for the hashing of user passwords, both having drastically different security implications. 运行Windows的计算机使用两种方法对用户密码创建哈希,这两种方法在本质上有着不同的安全意义。
24
Gets or sets the hashing algorithm used when authenticating messages or creating a digital signature for a message . 有关对访问报表服务器的用户进行身份验证的信息将在其他主题中介绍。
25
On the source computer, Message Queuing uses the hashing algorithm when creating a digital signature for a message. 在源计算机上,消息队列在为消息创建数字签名时使用哈希算法。
26
Message Queuing on the source computer uses the hashing algorithm when creating a digital signature for a message. 为消息创建数字签名时,源计算机上的消息队列使用此哈希算法。
27
First, the hashing algorithm is applied to the code they wish to distribute. 首先,对所要分发的代码应用散列算法。
28
Property contains the strength of the hashing algorithm used on this connection. 属性包含该连接所使用的哈希算法的长度。
29
The KCC is allowed to use hashing when creating a replication schedule. 创建复制日程时,允许KCC使用哈希。
30
However, by running source-side deduplication users are adding hashing, a processor-intensive algorithm, to the client. 不过,如果采用源端重复数据删除技术,用户就要为客户端添加散列算法,这是需要大量占用处理器资源的一种算法。