搜索资源列表
hah
- 1. 栈结构通常采用的两种存储结构是(A)。 A、顺序存储结构和链表存储结构 B、散列和索引方式 C、链表存储结构和数组 D、线性链表结构和非线性存储结构 -1. Stack structure of the two commonly used storage structure is (A). A, list the order of storage structure and storage structure B, hashing and indexing C
SHA
- SHA散列算法,功能完整,有助于SHA散列算法研究-SHA hashing algorithm, full-featured help hash algorithm SHA
anagram1.c.tar
- from this program u can find out the anagrams of a word.this program basically use hashing.
DuplicateFinder_src
- A utility to find any duplicate file in your hard drives using MD5 hashing.
mikechambers-as3corelib-release.93-2-gc99a4ea
- The corelib project is an Actionscr ipt 3 Library that contains a number of classes and utilities for working with Actionscr ipt 3. These include classes for MD5 and SHA 1 hashing, Image encoders, and JSON serialization as well as general String, Num
6
- 1.定义哈希表数据结构。 2.除留余数法做为哈希函数、 H(key) = key P 用线性探测再散列解决冲突方法,编写函数,实现哈希造表的过程,并输出哈希表。 3.编写函数,求查找成功时的平均查找长度(ASL)。-1. Define the hash table data structure. 2. In addition to leaving the remainder as the hash function method, H (key) = key P re-ha
hashing_chaining
- hashing by chaining data structure
rihter
- HASHing System will automatically delete the directory of debug and release, so please do not put files on these two directory.
123
- (1) 假定每个记录有下列数据项:电话号码、用户名、地址。 (2) 一是从数据文件old.txt(自己现行建好)中读入各项记录,二是由系统随机产生各记录,并且把记录保存到new.txt文件中以及显示到屏幕上,记录条数不要少于30,然后分别以电话号码和用户名为关键字建立哈希表。 (3) 分别采用伪随机探测再散列法和再哈希法解决冲突。 (4) 查找并显示给定电话号码的记录;查找并显示给定用户名的记录。 (5) 将没有查找的结果保存到结果文件Out.txt中,显
src
- Program to implement Open hashing with each bin being a static single linked list
RSA-Signature-Validate-Crypto
- 文章和附件中的代码给用户一个产品用户激活的框架的源代码。包括:RSA算法实现、集成Cypto++环境、产品激活、客户端/服务器命名管道、产生和序列化RSA密码、RSA签名和验证以及产品密钥/序列号生成。 -This article signs the Product Key, which may prove to be too restrictive to the reader. In this case, see Installation IDs Based on Truncated Ha
coding-sol
- simple program for c++ learners which can be helpfull hashing code
yy6
- 1.定义哈希表数据结构。 2.除留余数法做为哈希函数、 H(key) = key P 用线性探测再散列解决冲突方法,编写函数,实现哈希造表的过程,并输出哈希表。 3.编写函数,求查找成功时的平均查找长度(ASL)。 -1. Define the hash table data structure. 2. In addition to leaving the remainder as the hash function method, H (key) = key P re-h
array
- 矩阵的简单计算,包括加,减,乘,除。实现矩阵的代码操作-The algorithm has several optional matrices, and the image can be restored through reverse transform. Thus, it is very difficult to decode the hashing algorithm
crisscross-latest.tar.tar
- CrissCross是一种小型的跨平台C + +库,用于处理控制台和文件I / O , CPU的识别( CPUID ) ,散列( MD2 , MD4 , MD5编码,了SHA - 1 ,SHA- 256 ,SHA- 512 ,Tiger) ,Socket( TCP和目前唯一的UDP )和数据结构( LList , DArray , RedBlackTree , AVLTree , SplayTree等) 。其目的是运行在Windows , Linux , FreeBSD的, OpenBSD系统,
hash
- 本程序使用哈希和再哈希算法进行程序设计,希望能帮助到你。-This program uses a hashing algorithm to hash and re-programming, hoping to help you.
JavaApplication1
- The Hash Table. The way of hashing is Double hashing. It menas you use hash 2 times
espalhamentos
- program hashing , main function
DigitalSignatureHelper
- The System.Security.Cryptography namespace provides cryptographic services, including secure encoding and decoding of data, as well as many other operations, such as hashing, random number generation, and message authentication. For more information,
hash
- 散列查找法范例,当你需要的时候,可以适当修改下,就可以用,fortran语言-Hashing method to find an example, when you need it, can, under appropriate modifications, you can use, fortran language