散列法 的英文怎麼說

中文拼音 [sǎnliè]
散列法 英文
hash method
  • : 散動詞1. (由聚集而分離) break up; disperse 2. (散布) distribute; disseminate; give out 3. (排除) dispel; let out
  • : Ⅰ動1 (排列) arrange; form a line; line up 2 (安排到某類事物之中) list; enter in a list Ⅱ名詞1...
  • : Ⅰ名詞1 (由國家制定或認可的行為規則的總稱) law 2 (方法; 方式) way; method; mode; means 3 (標...
  1. Chapter nine, ten and eleven develop the discrete methods to price exotic options, in which chapter nine prices exotic options using the shooting target gird method, chapter ten prices the options using improved shooting target gird method when the underlying asset obeys cev process, and chapter eleven prices the double lookback options using five - bifurcation tree method. in the last chapter, application of option pricing theory is studied in executive stock option plan

    第九、十、十一章研究的是用離對變異期權進行定價,其中,第九章是用打靶格對一變異期權進行定價;第十章,用改進的打靶格對標的資產的價格服從cev過程的變異期權進行定價;第十一章用五叉樹模型對雙回望期權進行定價。
  2. This method eliminates the clustering problem in linear rehashing by picking the integer pii in a pseudorandom fashion.

    這種方是按偽隨機方式去挑選整數pii,它能消除線性再中所產生的堆聚問題。
  3. The general purpose hash function algorithm library contains implementations for a series of commonly used additive and rotative string hashing algorithms in the c + + programming language

    通用哈希函數運演算則庫包括一系通常使用的附加的或者循環的字元竄散列法運演算則,在c + +程序語言中。
  4. Hashing algorithms produce unique binary message digests based on the code they sign

    根據要簽名的代碼,演算產生唯一的二進制消息摘要。
  5. The agent of kdc according to the picture and individual character information which users input, the base key of producing automatically, make the conversation every side produce the self - same main key, has solved the problem of key distribute ingeniously. and it utilize irreversible hash function produce session key realize one - time key. the thesis has also analysed the application of different situations that the agent of kdc among the conversation modes in many ways

    本文提出的個性化kdc代理根據用戶輸入的圖片和個性信息,自動產生基密鑰,分別運用公開密鑰系統進行交換,使通話各方各自產生完全相同的主密鑰,巧妙地解決了密鑰分配和加密解密同步的問題,並利用單向函數的性質,基於相同的演算產生用於加密解密的一次一密會話密鑰。
  6. Md5 message - digest algorithm 5 ; rfc 1321 is a widely used cryptographic hash function with a 128 - bit hash value

    Md5 (消息摘要演算5 ; rfc 1321 )是一種廣泛應用的加密函數,使用了128位的值。
  7. Select a hashing algorithm from the following list

    請從下表中選擇演算
  8. First, considering the characteristics of mining association rules, an effective hash function is constructed and its constructional principles, realizable methods and efficiencies are analysed, studied, discussed and proved in detail and at the same time several new concepts such as radix - scale degree, combination - existence degree, combination - denseness degree and so on are defined too

    技術部分針對關聯規則數據挖掘的特點構造了一個有效的函數,在對它的構造原理、實現方和效率等進行詳細地分析、研究和論證的同時,還提出了「基規模度」 、 「組合存在度」 、 「組合稠密度」等幾個新的概念。
  9. Cryptography is one of the key technologys to protect confidential information as it is transmitted from one location to another. there are two primary encryption methods in use today : symmetric - key cryptography and public - key cryptography

    加密是確保安全的關鍵技術之一,本文討論了幾種典型的加密演算,包括分組加密、公鑰加密、函數。
  10. Round robin would distribute connection attempts evenly among the channels, while hashing would use the client s ip address to determine the destination channel

    輪流調度方式會將連接嘗試均勻地分佈到各個通道上,而則使用客戶機的ip地址來確定目標通道。
  11. In this paper, we provide a summary of all the possible topologies of data grid replica location mechanisms based on the research status of related activities, and design a new kind named distributed replica information index location mechanism ( dilm ), which is based on the topology of improved ring and integrates four techniques : overlay network, bloom filter, soft - state protocol and md5

    本文介紹了數據格網復制定位研究的現狀,總結了數據格網復制定位可能的拓撲結構種類,提出了一種新的數據格網復制定位機制? ?分式復制索引定位機制dilm 。 dilm基於改進環型拓撲結構,包含以下4種技術:重疊網路技術、 bloomfilter壓縮技術、軟狀態協議和md5演算
  12. This method eliminates the clustering problem in linear rehashing by picking the integer pii in a pseudorandom fashion

    這種方是按偽隨機方式去挑選整數pii ,它能消除線性再中所產生的堆聚問題。
  13. Considering the defects of typical algorithm for mining frequent itemsets, this dissertation puts forward hy algorithm which is designed to mine association rules and based on the hash technique and the optimized transaction reduction technique

    針對經典頻繁項集挖掘演算的不足,提出了進行關聯規則數據挖掘的基於技術和優化的事務壓縮技術的hy演算
  14. The paper propose a new means to mine multidimensional association rules based on multidimensional frequent items set by two steps. firstly we obtain inter - dimension association rules by combining data cube technique with apriori method efficiently

    本文中對基於多維的頻繁項集的演算進行了探索和演算優化,尤其是通過採用了維搜索和的技術方而使得系統的挖掘性能大大提高。
  15. The algorithm works by performing a series of transformations on the password and

    這個演算使用兩個md5值對密碼和
  16. The situation where two different texts return the same hash value from the same algorithm

    兩個不同文本從同一演算中返回相同值的情況。
  17. This platform utilizes several techniques, including cryptographic algorithms, one - way hash function, digital certification, secure protocol, watermarkng and etc. based on this platform, a new authentication and key exchange protocol is presented and has been well applied to this transmission platform

    該傳輸平臺使用了多項技術,包括密鑰演算、單項函數、數字證書、安全協議和數字水印等技術。針對該傳輸平臺,提出了一個新的認證和密鑰交換協議,並在傳輸平臺得到了很好的應用。
  18. The paper designs a data encryption system for network communication, which combines the private - key algorithm 3des with the public - key algorithm rsa to encrypt data and signs on files with public - key algorithm rsa and one - way hash function md5. the system can actualize encryption of data, digital signature and identification efficiently and ensure privacy, authenticity, integrity and nonrepudiation of data

    在此基礎上,本文設計了網路通信數據加密系統,該系統將對稱加密演算3des與非對稱加密演算rsa相結合對數據加密,用公鑰演算rsa和單向函數md5實現對文件的數字簽名,有效地實現了網路通信系統中的信息加密、數字簽名、身份認證等功能,保證了發送方所發送信息的秘密性、鑒別性、完整性及不可否認性。
  19. The secret hash digital signature is a new siganture method that combines the ideas of rsa public - key algorithm, md5 one - way hash function and permutation code at the same time

    保密數字簽名演算利用rsa公鑰密碼體制的原理、 md5單向函數和排碼加密的思想,構造了一種能夠快速實現數據保密、數字簽名的簽名方案。
  20. Namespace provides cryptographic services, including secure encoding and decoding of data, as well as many other operations, such as hashing, random number generation, and message authentication

    System . security . cryptography命名空間system . security . cryptography命名空間提供加密服務,包括安全的數據編碼和解碼,以及許多其他操作,例如散列法、隨機數字生成和消息身份驗證。
分享友人