搜索资源列表
corrected
- 第五届知识发现和数据挖掘国际会议提供的数据进行实验测试,包括DOS、U2R、R2L、probing等四大类22种有代表性的攻击以及大量正常数据。用corrected.gz数据作为测试数据
corrected
- 第五届知识发现和数据挖掘国际会议提供的数据进行实验测试,包括DOS、U2R、R2L、probing等四大类22种有代表性的攻击以及大量正常数据。用corrected.gz数据作为测试数据-Fifth Knowledge Discovery and Data Mining International Conference on data provided by laboratory tests, including DOS, U2R, R
predatorysearch
- Alexandre Linhares于1998 提出了一种新的仿生计算方法,即捕食搜索算法。捕食搜索策略很好地协调了局部搜索和全局搜索之间的转换,已成功应用于组合优化领域的旅行商问题和超大规模集成电路设计问题。-The predatory search strategy consists of scanning the solution space in a straightforward manner, but, as each ne
0612448-HASHTABLE
- Hashing using linear probing
ess.0.86.tar
- eSS is a remote security scanner for linux that scans remote nodes for known security flaws. It does some of the simple probing technics automatically like banner grabbing, OS guessin , and it includes a multithrea
find
- 哈希表的设计 [问题描述] 真对你所在的集体(比如你所在的班级)中的人名设计一个哈希表,使得平均查找长度不超过R,完成相应的建表和查表的程序。 [基本要求] 假设人名为中国人姓名的汉语拼音形式,待填入的哈希表的人名共有30个,取平均查找长度的上限为2。哈希函数用除留余数方法构造,用伪随机探测再散列处理冲突。 -Hash table design [descr iption of the problem] rea
6
- 考虑具体问题的关键字集合,如{19,14,23,1,68,20,84,27,55,11,10,79}这样一组数据和给定的哈希表长m 或哈希表的装填因子a,选用除留余数法和线性探测再散列技术解决冲突所形成的哈希表-Keywords set to consider specific issues, such as (19,14,23,1,68,20,84,27,55,11,10,79) such a set of data and a gi
ds_6
- 1.定义哈希表数据结构。 2.除留余数法做为哈希函数、 H(key) = key P 用线性探测再散列解决冲突方法,编写函数,实现哈希造表的过程,并输出哈希表。 3.编写函数,求查找成功时的平均查找长度(ASL)。-1. Define hash table data structure. 2. In addition to leaving the remainder as the hash function method
Probe
- This a project that helps in probing about system resources while a function is executed.-This is a project that helps in probing about system resources while a function is executed.
stab-1.3.1.tar
- STAB is a new active probing tool for locating thin links on a network path. A thin link is a link with less available bandwidth than all links preceding it on the path. The last thin link on the path is the link with th
pathchirp-2.4.1.tar
- pathChirp is an active probing tool for estimating the available bandwidth on a communication network path. Based on the concept of "self-induced congestion," pathChirp features an exponential flight pattern of probes we
hash
- 为班级30个人的姓名设计一个哈希表,假设姓名用汉语拼音表示。要求用除留余数法构造哈希函数,用线性探测再散列法处理冲突,平均查找长度上限为2.-The names of 30 people for the class to design a hash table, assuming that the name in pinyin. Required to remain with the addition of more than a fe
d
- 设定哈希函数 H(key) = key MOD 11 ( 表长=11 ),输入一组关键字序列,根据线性探测再散列解决冲突的方法建立哈希表的存储结构,显示哈希表,任意输入关键字,判断是否在哈希表中。-Set the hash function H (key) = key MOD 11 (table length = 11), enter a keyword sequence, then hash based on the linear p
probing
- 这是一个描述哈希表线性探测处理冲突的范例-This is a linear probing hash table example of conflict
QUADRATI
- c++ program for hashing using quadratic probing method
king.tar
- king dns probing tool . to check the performance of DNS servers
chazhao
- 哈希表的查找。用线性探测在散列的方法建立哈希表,然后对其中的元素进行查找-Hash table lookup. Hashing by linear probing method to establish the hash table, and then find the elements of which
FAULT
- 自适应检测在计算机网络故障诊断中的应用 (英文版)-APPLICATION OF ADAPTIVE PROBING FOR FAULTDIAGNOSIS IN COMPUTER NETWORKS
On-Probing-Signal-Design-MIMORadar
- MIMO paper on probing signal design
Linear-Probing
- ini adalah program Linear Probing