hashing 基本解释
v. 反复推敲; 仔细考虑; 把……弄糟(乱); 斩碎; 斩(肉); 剁(肉); 细切(肉)
hash的现在分词
hashing 词性变化
hashing 词组短语
- polynomial hashing
- directory hashing
- extendible hashing
- hashing addressing
- hashing function
- hashing method
- hashing technique
- recursive linear hashing
- uniform hashing
hashing 双语例句
- 1、
PHP's built-in crypt() function implements one-way encryption or one-way hashing.
PHP的内置crypt()功能可实现单向加密或单向散列。 - 2、
Distributing both tables by hashing on their join key ( pdb_id) also ensures that all atom rows for a given PDBML document are stored in the same database partition as the PDBML document itself.
通过对上述两个表的连接键(pdbid)进行散列处理来分布两个表也能确保给定PDBML文档中所有原子行均能作为本身的PDBML文档存储在相同的数据库分区中。 - 3、
The associated hashing algorithm is used for providing integrity services.
相关联的散列算法用来提供完整性服务。 - 4、
Secure hashing in Java code involves some rigmarole that I'd rather skip over in this article.
Java代码的安全哈希法需要使用一些rigmarole,但是在本文中我将不对它进行介绍。 - 5、
If, after hashing the password, the server can log the user in, a successful bind is reported back to PAM.
在对密码进行散列操作之后,如果服务器可以让用户登录,就会向PAM报告说已经成功进行了绑定。 - 6、
Select Encryption algorithm and hashing algorithm you want to use in your IPSec tunnels to encrypt the data.
选择在IPSec隧道中加密数据所用的加密算法和散列算法。 - 7、
A traditional big data environment includes an analytical program, a data store, a scalable file system, a workflow manager, a distributed sorting and hashing solution, and a data flow programming framework.
传统的大数据环境包括一个分析程序、一个数据存储、一个可扩展文件系统、一个工作流管理器、一个分布式排序和散列解决方案以及一个数据流编程框架。 - 8、
The former is the hashing routine, while the latter is used for lookup.
前者是一个散列例程,而后者用于执行查找。 - 9、
So, it's important to use more computationally complex hashing algorithms.
所以,使用在计算上更复杂的哈希算法很重要。 - 10、
Some weaknesses have been found in a more recent hashing algorithm, known as SHA-1.
另外,一些比较新的散列算法(SHA-1)也已经被发现有弱点。 - 11、
Shiro addresses these issues in a clean and intuitive hashing API.
Shiro用一种干净而直观的哈希API解决了上述问题。 - 12、
Image hashing method via combination of NMF and PCA
组合NMF和PCA的图像哈希方法 - 13、
The system uses circular links to allot IP addresses and ports, with double hashing and session timers with improved state automata to look up mapping items.
利用循环链表分配地址和端口,利用双散列和优化的定时器机制相结合实现映射表项的维护和查找。 - 14、
You can see how much Shiro simplifies hashing and encoding, saving you a bit of sanity in the process.
你可以看到Shiro对哈希和编码简化了不少,挽救了你处理在这类问题上所消耗的脑细胞。 - 15、
Thus, it is very difficult to decode the hashing algorithm; the security is enhanced via using the selected matrix and iteration time as the secret keys.
将所选用的矩阵和迭代次数作为浮水印的密钥,提高了算法的安全性。 - 16、
Prove elementary properties of modular arithmetic and explain their applications in Computer Science, for example, in cryptography and hashing algorithms.
验证“模算术”(一种整数的算术系统)的基本性质和解整数系统性质释它在计算机科学中的应用,如在密码学和散列算法。 - 17、
Topological Reconstruction and Errors Repair of an STL Model Using hashing
利用散列对STL文件进行拓扑重建和修复 - 18、
The idea behind hashing is fast access to data.
哈希的理念是更快地存取数据。 - 19、
A text image watermarking algorithm using encryption and hashing function is presented to choose Chinese characters sequence which need to be embedded watermarking.
提出了一种利用加密算法并结合散列函数选择文本中嵌入水印的汉字序列的算法。 - 20、
This mode adds "distribution" based on consistent hashing.
该模式增加了“分布式”特性,这是一种基于哈希一致性的技术。 - 21、
The system is not able to verify this signature because it does not support the hashing or signing algorithm.
系统无法验证此签名,因为它不支持哈希算法或签名算法。 - 22、
An operational database is designed and tuned from known tasks and workloads, such as indexing and hashing using primary keys, searching for particular records, and optimizing "canned" queries.
操作数据库是为已知的任务和负载设计的,如使用主关键字索引和散列,检索特定的记录,和优化“罐装的”查询。 - 23、
Developers can use this application block to incorporate hashing and symmetric encryption in their applications.
此应用程序块允许开发人员在其应用程序中包含加密和哈希功能。 - 24、
This algorithm is for hashing only and does not provide any encryption or decryption.
此算法仅用于哈希算法,并且不提供任何加密或解密。 - 25、
Topological reconstruction and errors repair of an STL model using hashing is addressed in this paper.
本文为关于STL的错误修复与其他处理提供了一种高效的方法。 - 26、
These methods are linear probing, quadratic probing, and double hashing.
这三种方法分别是线性探测、二次探测和再哈希法。 - 27、
The retrieval or storage of a record by the transformation ( through a hashing algorithm) of a user-specified value into a location within the file.
一种检索或存储记录的方法,通过散列算法将用户指定的值转换成文件中的一个地址。 - 28、
The consistent hashing algorithm is used in distribute storage system at present.
一致性哈希算法目前在分布式存储中应用广泛。 - 29、
In addition to the standard hashing relationship, there is now a linked list that traverses through the collection.
除标准的散列关系之外,现在还有一个可遍历整个集合的链表。

