哈希 的英文怎麼說

中文拼音 []
哈希 英文
hachi
  • : 哈構詞成分。
  • : Ⅰ動詞(希望) hope Ⅱ形容詞(事物出現得少) rare; scarce; uncommonⅢ名詞(姓氏) a surname
  1. Hash bailout usually occurs because of skewed data

    哈希釋放通常是由於偏斜數據造成的。
  2. Are also used to describe hash bailout

    兩詞也用於描述哈希釋放。
  3. Hash recursion and hash bailout cause reduced performance in your server

    哈希遞歸和哈希釋放會導致服務器的性能降低。
  4. Event class can be used to monitor when a hash recursion or cessation of hashing hash bailout has occurred during a hashing operation

    事件類可用於監視在哈希操作過程中何時發生哈希遞歸或哈希終止(哈希釋放) 。
  5. Hash recursion or bailout occurs when there is not enough memory to process queries in place and they need to spill to disk

    當沒有足夠的內存就地處理查詢,因此這些查詢需要溢出到磁盤時,會發生哈希遞歸或哈希釋放。
  6. Hash bailout occurs when a hashing operation reaches its maximum recursion level and shifts to an alternate plan to process the remaining partitioned data

    哈希操作達到其最大遞歸級數並轉換到替換計劃以處理剩餘的分區數據時發生哈希釋放。
  7. Hash functions are fundamental to modern cryptography

    哈希函數是現代密碼系統的基礎。
  8. An unsigned integer representing the hash algorithm

    表示哈希演算法的無符號整數。
  9. Creates the signature from the specified hash value

    通過指定的哈希值創建簽名。
  10. This is because the key signature contains a hash of the file, and modifying the file renders the hash invalid

    這是因為,該密鑰簽名包含該文件的哈希,修改該文件會呈現無效的哈希
  11. In sequential pattern, we describe mfr and the algorithm on how to find frequent access paths. in mining association rules, we introduce famous apriori algorithm and propose the optimized dhp algorithm with hashing

    在關聯規則的挖掘中,深入的分析了經典的apriori演算法,並運用哈希技術改進它得到dhp演算法,其中詳細闡述了該演算法改進的思路。
  12. Class to perform a modulo operation on the hash code returned by the

    方法返回的哈希代碼執行求模操作。
  13. Node id of the root of the hash team involved in the repartition

    重新分區所涉及的哈希組的根節點id 。
  14. The general purpose hash function algorithm library contains implementations for a series of commonly used additive and rotative string hashing algorithms in the c + + programming language

    通用哈希函數運演算法則庫包括一系列通常使用的附加的或者循環的字元竄散列法運演算法則,在c + +程序語言中。
  15. This methodology will enable designers to map network - processing applications onto the current np architectures without the time consuming process of manually optimizing through experimentation. it will accelerate the design flow for products, leading to shorter design turn around time

    在基於多處理器的實時優化調度上,提出了一種基於包處理時間預測的負載均衡哈希調度演算法flbhda ( forecasting - basedloadbalancehashdispatchalgorithm ) 。
  16. They may use hashing techniques or arithmetically offset the character set to unreadable or unprintable characters

    它們可能使用哈希技術,或者對字符集進行算術偏移,將字元變為不可讀字元或不可輸出字元。
  17. Message authentication algorithms generate message hashes and signatures used to detect tampering and forgery

    消息身份驗證演算法生成用於檢測篡改和偽造情況的消息哈希值和簽名。
  18. Indicates whether a hash will be encrypted together with the cleartext

    指示是否將哈希與明文一起加密。
  19. Hash tables that use dynamically allocated linked lists can degrade performance

    使用動態分配的鏈接表的哈希表可以降低性能。
  20. Hashed passwords stored in a text file cannot be used to regenerate the original password, but they are potentially vulnerable to a dictionary attack

    存儲在文本文件中的哈希密碼不能用於重新生成原始密碼,但它們可能容易受到字典式攻擊。
分享友人