搜索资源列表
Silbershatz-Database System Concetps ch12-Indexing and hashing
- Silbershatz-Database System Concetps ch12-Indexing and hashing.PDF
HASHES.ZIP
- 雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因
Hash
- 雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因
Image-Hashing-based-on-Human-Visual-System
- 提出一种基于视觉特性的图像摘要算法,增大人眼敏感的频域系数在计算图像Hash时的权重,使得图像Hash更好地体现视觉特征,并提高鲁棒性。将原始图像的分块DCT系数乘以若干由密钥控制生成的伪随机矩阵,再对计算的结果进行基于分块的Watson人眼视觉特性处理,最后进行量化判决产生固定长度的图像Hash序列。本算法比未采用视觉特性的算法相比,提高了对JPEG压缩和高斯滤波的鲁棒性。图像摘要序列由密钥控制生成,具有安全性。-Based on t
Hash
- 1. 本程序是针对我们班级中“人名”设计的哈希表,平均查找长度不超过R。 2. 程序中人名为汉语拼音形式,共30个我周围较熟悉的同学,取平均查找长度的上限为2.哈希函数用除留余数法构造,用伪随机探测再散列法处理冲突。 3. 人名的长度均不超过19个字符,测试数据为查找“hanbiao”。 本程序以用户和计算机的对话方式执行,即在计算机终端上显示“提示信息”之后,由用户在键盘上输入程序中规定的运算命令;相应的输入数据(滤去输入
hash
- Hashing is a technique that allows insertions, deletions and searches of records according to keys in constant average time. In this tutorial, we will construct a hash table and implement its operations.-Hashing is a
45678900000000000
- 假设人名为中国人姓名的汉语拼音形式。待填入哈希表的人名共有30个,取平均查找长度的上限为2。哈希函数用除留余数法构造,用伪随机探测再散列法处理冲突。-The assumption that the names of people known as China s Hanyu Pinyin form. Hash table to be populated with the names of a total of 30, taking th
binaryextract
- 二值图像的信息隐藏,用到md5加密和改进后的置乱算法-Binary Image Information Hiding, use md5 encryption and improved hashing algorithm
115157707arnoldcipher
- 本程序介绍猫脸图象置乱算法,主要用于水印图象。-Introduction This procedure cat face image hashing algorithm, mainly for watermark image.
DS-41
- A C++ Program to show an example of Hashing using Mid-Square Method. 应用Mid-Square理论的哈希算法-A C++ Program to show an example of Hashing using Mid-Square Method. Application of Mid-Square Hash Algorithm Theory
HXBSZ
- 1、设每个记录有下列数据项:电话号码、用户名、地址; 2、从键盘输入各记录,分别以电话号码和用户名为关键字建立哈希表; 3、采用再哈希法解决冲突; 4、查找并显示给定电话号码的记录; 5、查找并显示给定用户名的记录。 6、在哈希函数确定的前提下,尝试各种不同类型处理冲突的方法(至少两种),考察平均查找长度的变化。 -1, for each record the following data items: tele
datrie_cvs20061001.tar
- This an implementation of double-array structure for representing trie, as proposed by Junichi Aoe [1]. Trie is a kind of digital search tree, an efficient indexing method with O(1) time complexity for searching
cuckoo-undergrad.pdf
- A detailed expanation about the new Cuckoo hashing algorithm.
hashing__
- program which uses hashing techniques for storing and retrieving the data. Input to the program: Some random numbers. Input will be from a file. Output: First the program reads all the input and store it proper
e2lsh
- Nearest Neighbor Methods in Learning and Vision: Theory and Practice书中章节Locality-Sensitive Hashing Scheme Based on p-Stable Distributions 中LSH-Local Sensitive Hashing算法的C语言在Red Linux下实现-Book <Nearest Neighbor Methods
AVEC_2DCOSTRANS
- matlab perceptual image hashing
0612448-HASHTABLE
- Hashing using linear probing
MD5HashDemo
- Using MD5 Hashing in VB.NET
Hashing-sample
- this project calculate hashing value to entered text
Hashing
- simple txt for c# hashing code