搜索资源列表
code
- Minhashing和LSH算法。用于查找和比较一个pair是否是相似的。并分析false negative和false positive的值-Minhashing and Locality-Sensitive-Hashing (LSH). The algorithms are approximate in that they find only candidate pairs that are likely similar. Therefore, there are two types of
libmemcached-1.0.4.tar
- libmemcached 是一个 memcached 的库,客户端库,C 和 C++ 语言实现的客户端库,具有低内存占用率、线程安全、并提供对memcached功能的全面支持。它还采用 多种命令行工具: memcat , memflush , memrm , memstat ,并memslap (负载代)。程序库一直在设计,让不同的散列方法对密钥,分割的钥匙,并使用统一的散列分配。-libmemcached is a library for memcached client library, C
LoginSystem
- JSP Login System with forgot password and security function hashing password and so on.
Classify-using-a-Hash-code
- 基于 Pyramid Matching的 图像hashing识别(IEEE 最新文章) -Classifying Sets of Attributed Scattering Centers Using a Hash Coded Database
ASH
- this about hashing algorithm-this is about hashing algorithm
rot13
- rot13 password hashing algorythm for use as you please have fun
LZ77
- Simple Hashing LZ77 Sliding Dictionary Compression Program.
CPP
- c++,入门代码大全。适合入门与初学者,以及有一定基础的人下载- Chapter 1 Introduction 1 Chapter 2 Algorithm Analysis 5 Chapter 3 Lists, Stacks, and Queues 9 Chapter 4 Trees 29 Chapter 5 Hashing 41 Chapter 6 Priority Queues (Heaps) 45 Chapter 7 Sorting 53 Chapter 8 The Disjoint Se
md5
- md5 code.hash input=text file output=text file function:md5 hashing
MD5
- This is JAVA implementation of popular Hashing algorithm, MD5.
HMAC
- 任何的mac算法都可以使用标准的hash功能,比如MD5或者sha-1,这种情况下,强度取决于hash功能,和最后的结果的比特串。密匙是关键。-HMAC is a message authentication code (MAC) and can be used to verify the integrity and authentication of a message. It involves hashing a message with a secret key. As with any
EcryyptoAPPIn
- 加密函数库:包含多种加密\\解密算法,数字签名,散列算法 -Encryption library: contains a variety of encryption \ \ decryption algorithms, digital signatures, hashing algorithm
md5
- MD5即Message-Digest Algorithm 5(信息-摘要算法 5),用于确保信息传输完整一致。是计算机广泛使用的散列算法之一(又译摘要算法、哈希算法),主流编程语言普遍已有MD5实现。 将数据(如汉字)运算为另一固定长度值,是散列算法的基础原理,MD5的前身有MD2、MD3和MD4。 -MD5 Message-Digest Algorithm 5 (Information- Digest algorithm 5), is used to ensure comple
hash11
- 基本要求 假设人名为中国人姓名的汉语拼音形式。待填入哈希表的人名共有30个,取平均查找长度上限为2。哈希函数用除留余数法构造,用伪随机探测再散列法处理冲突。 测试数据 取周围较熟悉的30个人的姓名。-Assuming the basic requirements of people who named the name of the Chinese Pinyin form. Hash table to be filled a total of 30 names, taking the
Similarity-Search-via-Hashing
- 图像高维特征的hash化,大大提高检索速度-Image of high-dimensional feature hash, and greatly improve the retrieval speed
CustomHashFuncs
- This an introductory program that can be used to hash data. I believe that these custom functions can help a user to learn about the way in which hashing is performed.-This is an introductory program that can be used to hash data. I believe that thes
hash_module
- This sample class is designed to provide hashcode of 2D image. Image is converted to grayscale, shrink to 32x32 and then is calculated DCT which acts as a source for hashing.
addrcheck
- 对单播地址,多播地址,广播地址进行检查,其中对多播地址的检查用于哈希算法-The unicast address, the multicast address, a broadcast address to be checked, wherein the inspection of the multicast address is used for hashing algorithm
HashingToolbox
- it s from the hashing toolbox itis used to hash an image using the transformation wavelet you can have the whole hashing toolbox on the internet and it s fr-it s from the hashing toolbox itis used to hash an image using the transformation wavelet you
CS2208_DSLab_Programs
- CS2208 - Data Structures Lab (Anna University) EXERCISES 1a. Implement singly linked lists. 1b. Implement doubly linked lists. 2. Represent a polynomial as a linked list and write functions for polynomial addition. 3. Implement stack and