雜湊法(hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識(shí)別字(identifier)在記憶體的位址是經(jīng)由函數(shù)(function)轉(zhuǎn)換而得的。此種函數(shù),一般稱之為雜湊函數(shù)(hashing function)或鍵值對(duì)應(yīng)位址轉(zhuǎn)換(key to address transformation)。對(duì)於有限的儲(chǔ)存空間,能夠有效使用且在加入或刪除時(shí)也能快的完成,利用雜湊法是最適當(dāng)不過了。因?yàn)殡s湊表搜尋在沒有碰撞(collision)及溢位(overflow)的情況下,只要一次就可擷取到。
上傳時(shí)間: 2013-12-23
上傳用戶:dancnc
linearing hashing (with c++)
標(biāo)簽: linearing hashing with
上傳時(shí)間: 2013-12-16
上傳用戶:moshushi0009
CKHash is an implementation of Cuckoo hashing that can receive the input in the form of strings directly
標(biāo)簽: implementation the hashing receive
上傳時(shí)間: 2013-12-25
上傳用戶:dapangxie
雜湊法(hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識(shí)別字(identifier)在記憶體的位址是經(jīng)由函數(shù)(function)轉(zhuǎn)換而得的。此種函數(shù),一般稱之為雜湊函數(shù)(hashing function)或鍵值對(duì)應(yīng)位址轉(zhuǎn)換(key to address transformation)。對(duì)於有限的儲(chǔ)存空間,能夠有效使用且在加入或刪除時(shí)也能快的完成,利用雜湊法是最適當(dāng)不過了。因?yàn)殡s湊表搜尋在沒有碰撞(collision)及溢位(overflow)的情況下,只要一次就可擷取到。
上傳時(shí)間: 2016-01-14
上傳用戶:dancnc
A C++ Program to show an example of hashing using Mid-Square Method. 應(yīng)用Mid-Square理論的哈希算法
標(biāo)簽: Mid-Square Program hashing example
上傳時(shí)間: 2014-01-04
上傳用戶:familiarsmile
A detailed expanation about the new Cuckoo hashing algorithm.
標(biāo)簽: expanation algorithm detailed hashing
上傳時(shí)間: 2017-04-17
上傳用戶:wendy15
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
標(biāo)簽: perceptual implementation algorithms fingerpr
上傳時(shí)間: 2013-12-08
上傳用戶:星仔
program which uses hashing techniques for storing and retrieving the data. Input to the program: Some random numbers. Input will be from a file. Output: First the program reads all the input and store it properly using some hash techniques. Once your program reads the complete input,it waits for the user input (prompt to the user). User now enters some number.program displays if this number exists in the list or not. it also display the time taken in the search operation.
標(biāo)簽: program techniques retrieving the
上傳時(shí)間: 2017-04-27
上傳用戶:shus521
it is c implementation of hashing .. all types of hashing covered in this program
標(biāo)簽: implementation hashing hashing covered
上傳時(shí)間: 2013-12-24
上傳用戶:小寶愛考拉
This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a shared secret key. The cryptographic strength of HMAC depends on the properties of the underlying hash function. The HMAC specification in this standard is a generalization of Internet RFC 2104, HMAC, Keyed-hashing for Message Authentication, and ANSI X9.71, Keyed Hash Message Authentication Code.
標(biāo)簽: message authentication keyed-hash describes
上傳時(shí)間: 2014-01-07
上傳用戶:鳳臨西北
蟲蟲下載站版權(quán)所有 京ICP備2021023401號(hào)-1