散列和 的英文怎麼說

中文拼音 [sǎnliè]
散列和 英文
hashsum
  • : 散動詞1. (由聚集而分離) break up; disperse 2. (散布) distribute; disseminate; give out 3. (排除) dispel; let out
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  • : 和動詞(在粉狀物中加液體攪拌或揉弄使有黏性) mix (powder) with water, etc. : 和點兒灰泥 prepare some plaster
  1. Manufactures acid dyes, mordant dyes, direct dyes, and leather dyes

    -以分染料系染料中間體為主的擁有自營進出口權的國家大型企業
  2. A hash addressing scheme based on the values i and j of the array element a(i, j) can be used, which hashes to a relatively small table of array elements.

    可以採用地址方案,它根據數組元素Aij的值ij,把數組元素在相對小的表中。
  3. The discussion of main parallel technologies on construction of parallel sliq algorithm is presented in this paper. the computing result of algorithm complexity of sequential and parallel algorithm indicates : when the data set is large enough, as to continuous attributes, the parallel algorithm almost get speedup value equal to the number of processors , while as to categorical attribute the improvement of parallel algorithm is limited

    通過對串并行演算法時間復雜度的計算表明,當數據集充分大時,由於連續屬性的排序計算操作分到各個處理機單元上進行,顯著降低了計算時間,從而可以得到近似於處理機個數的加速比,對于離屬性,本并行演算法對串演算法的性能提高有限
  4. The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways

    本文提出的個性化kdc代理根據用戶輸入的圖片個性信息,自動產生基密鑰,分別運用公開密鑰系統進行交換,使通話各方各自產生完全相同的主密鑰,巧妙地解決了密鑰分配加密解密同步的問題,並利用單向函數的性質,基於相同的演算法產生用於加密解密的一次一密會話密鑰。
  5. Chapter 2 clarifies the cryptographical foundation of e - commerce system. it mainly introduces a hybrid cryptosystem using rc2 and rsa algorithm in our application and some message hash function producing message digest provided by ms ca ( microsoft certificate authority ) such as sha - 1, md4 and md5

    主要論述了系統採用的rc2rsa相結合的混合密碼體制,另外對msca ( microsoftcertificateauthority )所提供的幾種產生消息摘要的消息函數如: sha - 1 、 md4 、 md5等也進行了分析。
  6. On the base of above it, this paper discuss the synthesis of optimum distributed arrays by nonuniform spacing in the sense of dolph - chebyshev. having derived the equations of optimum element distribution, we analyze the exponentially spaced array, which are optimum when the elements are isotropic and equally weighted, and the array by general raised cosine function. the formulate for estimating the sidelobe envelope, beamwidth of the array pattern and clean region width are obtained

    推導了最佳陣元分佈方程,分別對陣元無方向性等加權時的最佳分式陣? ?指數間隔陣採用廣義升餘弦加權的最佳分式陣進行了分析,推導了天線方向圖旁瓣包絡、波束寬度,干凈掃描區寬度的估計公式,給出了近軸旁瓣電平與陣參數的關系。
  7. Aeroengine distributed simulation systems based on both serial components level and parallel full engines level are developed

    分別開發了基於部件級串整機並發的航空發動機分式模擬系統。
  8. A hash addressing scheme based on the values i and j of the array element a ( i, j ) can be used, which hashes to a relatively small table of array elements

    可以採用地址方案,它根據數組元素a i j的值ij ,把數組元素在相對小的表中。
  9. 3. based information entropy, multi - precision similarity matching and multi - dimension hash index are proposed

    提出了基於信息熵的多精度相似匹配多維索引技術。
  10. Xquery is designed to work just as well accessing legacy data stores such as relational and object databases, and the resulting abstraction and complexity gives it a very different feel from that of popular xml repositories, which are often just collections of xml as plain files or in simple hash databases

    Xquery的設計考慮了訪問關系數據庫對象數據庫這類遺留數據存儲,結果其抽象性復雜性使其完全不同於流行的xml存儲庫,後者常常是純文本或者簡單的數據庫形式的xml集合。
  11. Likewise, diffusion-controlled processes such as gas permeability are all dependent, to some extent, on molecular orientation and crystallinity.

    同樣,擴控制諸如透氣在一定程度上取決于分子排結晶度。
  12. First, considering the characteristics of mining association rules, an effective hash function is constructed and its constructional principles, realizable methods and efficiencies are analysed, studied, discussed and proved in detail and at the same time several new concepts such as radix - scale degree, combination - existence degree, combination - denseness degree and so on are defined too

    技術部分針對關聯規則數據挖掘的特點構造了一個有效的函數,在對它的構造原理、實現方法效率等進行詳細地分析、研究論證的同時,還提出了「基規模度」 、 「組合存在度」 、 「組合稠密度」等幾個新的概念。
  13. He covers scalar, array, and hash variables

    范圍涵蓋了標量、數組變量。
  14. By default mmus are implemented and they are constructed of 64 - entry hash based 1 - way direct - mpped data tlb and 64 - entry hash based 1 - way direct - mapped instruction tlb

    默認的存儲器管理單元實現由基於64個入口的單通道直接映射的數據后備式轉換緩沖區基於64個入口的單通道直接映射的指令后備式轉換緩沖區組成。
  15. In this paper, we provide a summary of all the possible topologies of data grid replica location mechanisms based on the research status of related activities, and design a new kind named distributed replica information index location mechanism ( dilm ), which is based on the topology of improved ring and integrates four techniques : overlay network, bloom filter, soft - state protocol and md5

    本文介紹了數據格網復制定位研究的現狀,總結了數據格網復制定位可能的拓撲結構種類,提出了一種新的數據格網復制定位機制? ?分式復制索引定位機制dilm 。 dilm基於改進環型拓撲結構,包含以下4種技術:重疊網路技術、 bloomfilter壓縮技術、軟狀態協議md5演算法。
  16. As one part of the work, the induced current on perfect conductor surface is computed with mom method and graphed by origin. the factors, such as choice of basis function and sliced mounts of one cell, which affect solution accuracy are summarized. all of these provide a good basis for the latter computation of array scattering field

    其中第一部分工作從電場積分方程出發,利用矩量法計算了理想導體貼片上的感應電流,進而得到平面陣曲面陣射場,研究了陣單元尺寸、排布形式入射波的角度,以及曲面陣的陣面形狀等因素對陣射場的影響規律。
  17. He examines advanced features of the appconfig module : validation, autoaction, modifying hash and array variables, and " radio button " - style mutually exclusive options

    他研究了appconfig模塊的高級特性:驗證、自動操作、修改散列和數組變量以及「單選按鈕」樣式的互斥選項。
  18. Each one returns a function that takes as parameters a reference to a hash of defined classes, and the atom name itself

    每個原子都返回一個函數,該函數將參數作為對已定義類的散列和原子名本身的引用。
  19. This is because the wordnet xml server approach takes advantage of specialized hashing and indexing used by the wordnet database, rather than shredding that into a more general rdf database

    這是因為wordnet xml服務器利用了wordnet數據庫所用的專用散列和索引,而不是查詢一般的rdf數據庫。
  20. Unfortunately, we have to get the address exactly right, down to the byte, or the program will crash. coming up with the right address using the trial and error approach may take a while. to make things easier, we can insert lots of null operations in front of the shell code

    但是,問題的大部分是因為數據很可能有統計偏差,因此大量精力花在了使用七個密碼散列和一個相當慢(但非常好)的偽隨機數發生器來消除此類問題上。
分享友人