快好知 kuaihz


hash table造句
1 The optimum size of hash table can only be determined if the approximate number of items to be stored is known. 2 Define hash table data structure . 2. 3 Synthetic match and Hash table are introduced to improve SPECK. 4 An optimized hash table algorithm-move-to-head (MTH) is introduced to improve the state inspection speed. 5 The scheme firstly builds a distributed hash table based on the physical topology of network, so that the topology mismatch problem of conventional DHT schemes can be eliminated. 6 We look up a hash table with linked list based upon the hash key for the logging token name. 7 HASH MAC algorithm for creating a hash table complete source code,[www.] has been tested. 8 This method uses a pre - computed hash table to serve as an index for short sequences. 9 Because hash table search in the absence of collisions (collision) and overflow (overflow) circumstances, as long as one can capture that. 10 Problem Description: Design hash table to achieve telephone number inquiry system. 11 Messages are extracted into a working file to be translated and compiled into a hash table. 12 By specifying an interface for accessing the buckets of the container the standard pretty much requires that the hash table uses chained addressing. 13 An array into which data is inserted using a hash function is called a hash table. 14 In addition, the branch predictor can also comprises a prediction Hash table with a plurality of predicted values, and each predicted value uniquely corresponds to a plurality of storage positions. 15 So, this implementation uses a prime number for the hash table size. 16 The mapping of unique node identifiers to hierarchical addresses is done using a distributed hash table that leverage the hierarchical network structure. 17 In such cases, integer division and modulus operations are performed in software —something to think about if you're designing a hash table or doing lots of math. 18 The groups created for each column are stored in a hash table along with the subitem text or initial letter. 19 The trace-driven simulations demonstrate that MTH has a better performance than the original hash table algorithm, which suits the high-speed state inspection firewall well. 20 Methods of constructing the bounding volume boxes tree and space division were given, and the data structure of Hash table was used to accelerate the collision detection in space division. 21 The load factor (the ratio of the number of items in a hash table to its size) is typically different in separate chaining than in open addressing.