hashing造句31. A new cooperative Web caching system (CHRCS) based on consistent hashing function was proposed.
32. Therefore, I can't imagine, society's hashing no Internet will be what appearance.
33. With a good consistent hashing function, all servers should have more or less the same amount of data stored locally.
34. These methods are linear probing, quadratic probing, and double hashing.
35. Indicates that a hashing operation may have incurred a problem.
36. All the current geometric hashing methods are just suitable for the object recognition under affine transformation.
37. In order to support dynamic update, we mend the data structure of inverted index, and take a new update strategy of inverted index based on extendible hashing to make inverted index extendible.
38. In addition, SHA-1 (Secure Hashing Algorithm) is an NIST-sponsored hashing function and has been adopted by the U.S. government as a standard.
39. You should apply your hashing scheme to each of the sections separately, and compare the results.
40. The various hash index methods are intended to address different aspects of the hashing itself, like the handling of collisions or overflows.
41. The independent hash space preserved for each different hash function reduces the internal confliction among hashing.
42. The hashing function is one of the basic foundations of the cryptography. It widely used in data integrality and identity authentication.
43. Specifies all the hash algorithms used for hashing files and for generating the strong name.
44. This is because hashing an input value converts it into a new value that is mathematically impossible to undo to produce the original value.
45. This paper presents the design and implementation of a content-based image retrieval system which acquires effective and efficient similar shape retrieval using a modified geometric hashing technique.
46. However, with a good cryptographic hashing function, it should be extremely difficult in practice to find two intelligible strings that hash to the same value.
47. Such functions, commonly known as hash functions (Hashing function) keys corresponding addresses or conversion (key to address transformation).
48. Write a program that uses hashing to store a series of strings.
49. It then reads from the outer table BAD_CREDIT using the SHIP operator, hashing the join column values, and checking in the lookup table generated for the inner table.
50. To authenticate messages, the Message Queuing run-time DLL on the source computer uses a hashing algorithm when creating a digital signature for a message.
51. The virtual page number is hashed into a page table. This page table contains a chain of elements hashing to the same location.
52. This paper presents a content - based image retrieval technique based on salient points matching and geometric hashing.
53. You'll need a sharp knife and a wooden board for hashing up that meat.
54. The join is performed by scanning the inner table of the hash join, CUSTOMERS, and generating a lookup table by hashing the join column values.
55. Section 7 discusses hashing global history and branch address information before indexing the predictor. Section 8 describes the technique for combining multiple predictors.
56. There is no function object for compared or hashing values.
57. Secondly, it detailedly describes a key technology in Byzantine modification detection— Homomorphic Hashing function, then it gives related arithmetic and proof .
58. A text image watermarking algorithm using encryption and hashing function is presented to choose Chinese characters sequence which need to be embedded watermarking.
59. In general , double hashing is the probe sequence of choice when open addressing is used.
60. The hashing algorithm is applied to the value of the partitioning key, and generates a partition number between zero and 4095.