搜索资源列表
HASHES.ZIP
- 雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因為雜湊表搜尋在沒有碰撞(collision)及溢位(over
linearhashing
- linearing hashing (with c++)-linearing hashing (with c)
cmap
- 这是一个从区位码到Unicode码的变换模块,在汉字处理时经常会用到这种程序,它通过读取一个转换文件,构建一个散列查找表,用于完成从区位码到Unicode码的变换。通过反转码表或者更改码表,该模块还可用于反向变换,或者用于其它需要快速变换的地方。 该模块中包含了足够的源文件,都是以标准C编制的,可以在任何编译环境下进行编译,并提供了调用例子及测试文件。接口定义见cmap.cpp文件。-This is an area code from Unicode code to transfor
CKHash-0.3.tar
- CKHash is an implementation of Cuckoo Hashing that can receive the input in the form of strings directly
Hash
- 雜湊法(Hashing)的搜尋與一般的搜尋法(searching)是不一樣的。在雜湊法中,鍵值(key value)或識別字(identifier)在記憶體的位址是經由函數(function)轉換而得的。此種函數,一般稱之為雜湊函數(Hashing function)或鍵值對應位址轉換(key to address transformation)。對於有限的儲存空間,能夠有效使用且在加入或刪除時也能快的完成,利用雜湊法是最適當不過了。因為雜湊表搜尋在沒有碰撞(collision)及溢位(over
Image-Hashing-based-on-Human-Visual-System
- 提出一种基于视觉特性的图像摘要算法,增大人眼敏感的频域系数在计算图像Hash时的权重,使得图像Hash更好地体现视觉特征,并提高鲁棒性。将原始图像的分块DCT系数乘以若干由密钥控制生成的伪随机矩阵,再对计算的结果进行基于分块的Watson人眼视觉特性处理,最后进行量化判决产生固定长度的图像Hash序列。本算法比未采用视觉特性的算法相比,提高了对JPEG压缩和高斯滤波的鲁棒性。图像摘要序列由密钥控制生成,具有安全性。
hash
- Hashing is a technique that allows insertions, deletions and searches of records according to keys in constant average time. In this tutorial, we will construct a hash table and implement its operations.
fips-198a
- This standard describes a keyed-hash message authentication code (HMAC), a mechanism for message authentication using cryptographic hash functions. HMAC can be used with any iterative Approved cryptographic hash function, in combination with a
DS-41
- A C++ Program to show an example of Hashing using Mid-Square Method. 应用Mid-Square理论的哈希算法
ejemplo_xml.zip
- sha1 hashing , the output is in binary,sha1 hashing , the output is in binary
p-stable_lsh
- LSH代码,locality-sensitive hashing(局部敏感哈希),实现高位数据搜索平台,具有快速简便的优点-LSH Code, locality-sensitive hashing (local sensitive hash), to achieve high data search platform, has the advantages of quick and easy
hashtable
- 用除留余数法构造哈希表,用线性探测再散列的方法解决冲突-In addition to France to stay with the remainder constructed hash table, hashing with linear probing method of conflict resolution and then
234tree
- 2-3-4Trees and Red-Black Trees 2-3-4Trees and Red-Black Trees-2-3-4Trees and Red-Black Trees 2-3-4Trees and Red-Black Trees 2-3-4Trees and Red-Black Trees
Thesis_Robust_Image_Hashing
- 图像认证中的博士论文PDF和答辩PPT,关于Image Hashing技术,最新下载自美国名校The University of Texas at Austin的Brian L. Evans教授的实验室网站 -Thesis on robust image hashing downloaded from Professor Brian L. Evans in University of Texas at Austin in USA
MyCrypto
- AES MD5 SHA1 SHA256 crypto and hashing Open source units for Delphi and Kylix
hashingToolbox0_1beta
- matlab程序 图像哈希实现 用于图像认证领域-image hashing is used in authentication
hash
- 为班级30个人的姓名设计一个哈希表,假设姓名用汉语拼音表示。要求用除留余数法构造哈希函数,用线性探测再散列法处理冲突,平均查找长度上限为2.-The names of 30 people for the class to design a hash table, assuming that the name in pinyin. Required to remain with the addition of more than a few method to construct hash fun
spectral-hashing
- 基于spectral hash的特征binary化,大大提高图像检索的速度-Based on the characteristics of the spectral hash binary, greatly improving the image retrieval speed
pHash-0.4.tar
- pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash function
HawkVoiceDI
- HawkCrypt is a cryptographic library for password protecting data. It uses MD5 to produce 128 bit encryption keys and random 128 bit (16 byte) salt values. Blowfish is used to perform 128 bit encryption. It also provides MD5 hashing to add a 32