网站首页  词典首页

请输入您要查询的英文单词:

 

单词 hashing
释义

hashing

美 [hæ???]
英 [hæ???]
  • v.“hash”的现在分词
  • 网络散列法;杂凑;哈希
v.
1.
“hash”的现在分词
na.
1.
犬兔追逐游戏

例句

释义:
1.
You can see how much Shiro simplifies hashing and encoding, saving you a bit of sanity in the process.
你可以看到Shiro对哈希和编码简化了不少,挽救了你处理在这类问题上所消耗的脑细胞。
www.infoq.com
2.
"The whole nature of sitting down and hashing out ideas and collaborating is a bit stymied by the construct of the cubicles, " he says.
他表示:“这种办公环境的设计,破坏了坐下来考虑创意并进行合作的本质。”
www.ftchinese.com
3.
Class' hashing a few classmates may know news that I become sick, all looking at me with the very strange taste.
班上有几个同学可能知道我得病的消息,都用很奇怪的眼光看着我。
blog.sina.com.cn
4.
By hashing over and translating much material that you would not even use, you went through a process of a direct relationship with us.
靠再三回顾和翻译很多你甚至不使用的素材,你就进入与我们有直接联系的过程中。
www.showxiu.com
5.
Specifies all the hash algorithms used for hashing files and for generating the strong name.
指定用于哈希文件和用于生成强名称的所有哈希算法。
www.kuenglish.info
6.
This hashing behavior of the returned comparer is not limited by an overall node count when hashing F# records, lists and union types.
在对F#记录、列表和联合类型进行哈希处理时,返回的比较器的此哈希处理行为不受总体节点计数所限。
msdn.microsoft.com
7.
What Lewin and Leighton invented was a mathematical scheme called "consistent hashing' that radically sped up the process. "
列文和莱顿发明的是一种被称作“一致性哈希”的数学规划,这可以从根本上提高进程的速度。
www.bing.com
8.
A number of software vendors and committees have been hashing them out for several years.
一些软件供应商和委员会已经对此讨论多年。
www.ibm.com
9.
At all points in between, the message is protected, either for integrity (using hashing) or for privacy (using encryption).
在消息生成和消息使用之间的所有时点上,消息都受到保护,不管是为了完整性(使用散列表)还是为了私密性(使用加密)。
www.ibm.com
10.
Perfecting hashing is difficult and to deal with that hashtable implementations support collision resolution.
要写出一个完美的哈希函数是很困难的,特别是要处理哈希表中的冲突。
www.bing.com
1.
Supplies a hash code for an object, using a hashing algorithm that ignores the case of strings.
使用忽略字符串大小写的哈希算法,为对象提供哈希代码。
msdn2.microsoft.com
2.
hash (Hashing) search and search for a general law (searching) is not the same.
杂凑法(Hashing)的搜寻与一般的搜寻法(searching)是不一样的。
3333355555.com
3.
When the system boots, it measures its own hashing and PCR loading code and writes the hash to the first PCR of the TPM.
当系统启动时,它会测量自己的哈希和PCR加载代码,并将哈希写入TPM的第一个PCR。
www.microsoft.com
4.
Uses hashing to transmit client credentials in an encrypted manner so the password is not transmitted in clear text.
使用哈希算法以加密的方式传输客户端凭据,这样,密码将不以明文形式传输。
www.kuenglish.info
5.
With combination of different key lengths and different hashing algorithms, IBM NAS provides encryption types as shown in Table 1.
通过组合使用不同的密钥长度和散列算法,IBMNAS提供表1所示的加密类型。
www.ibm.com
6.
Public recrimination may just be part of the process of hashing out a grand bargain in private.
公众指责的可能只是出来的散列私下大交易过程的一部分。
www.englishtang.com
7.
Congress, the White House, and Wall Street are still hashing out final details of the plan.
美国国会、白宫以及华尔街仍在商议拯救计划的最终细节。
www.bing.com
8.
Returns a hash code for the given object, using a hashing algorithm that ignores the case of strings.
使用忽略字符串大小写的哈希算法返回给定对象的哈希代码。
www.kuenglish.info
9.
hash-send-sort. The beauty of using hashing is that the data can be sent to its destination while the map is still processing it.
美丽的使用散列是数据可以送到目的地而地图仍然是处理它。
blog.sina.com.cn
10.
Gets or sets the hashing algorithm that Message Queuing uses when authenticating a message or creating a digital signature for a message.
获取或设置消息队列在验证消息或为消息创建数字签名时使用的哈希算法。
msdn2.microsoft.com
1.
Unlike cryptography , which allows data to be encrypted and then decrypted , hashing data is a one- way process .
与加密不同,加密允许数据加密后再解密,而哈希数据只允许单向进行。
www.bing.com
2.
A technique used to solve overflow problems in hashing. It uses a neighbour storage area to store the overflow items.
在散列技术中,用以解决溢出问题的一种方法,它利用相邻的存储区来存放溢出部分。
dict.ebigear.com
3.
Windows-based computers utilize two methods for the hashing of user passwords, both having drastically different security implications.
运行Windows的计算机使用两种方法对用户密码创建哈希,这两种方法在本质上有着不同的安全意义。
www.bing.com
4.
Gets or sets the hashing algorithm used when authenticating messages or creating a digital signature for a message .
有关对访问报表服务器的用户进行身份验证的信息将在其他主题中介绍。
www.bing.com
5.
On the source computer, Message Queuing uses the hashing algorithm when creating a digital signature for a message.
在源计算机上,消息队列在为消息创建数字签名时使用哈希算法。
msdn2.microsoft.com
6.
Message Queuing on the source computer uses the hashing algorithm when creating a digital signature for a message.
为消息创建数字签名时,源计算机上的消息队列使用此哈希算法。
msdn2.microsoft.com
7.
First, the hashing algorithm is applied to the code they wish to distribute.
首先,对所要分发的代码应用散列算法。
www-128.ibm.com
8.
Property contains the strength of the hashing algorithm used on this connection.
属性包含该连接所使用的哈希算法的长度。
msdn2.microsoft.com
9.
The KCC is allowed to use hashing when creating a replication schedule.
创建复制日程时,允许KCC使用哈希。
msdn2.microsoft.com
10.
However, by running source-side deduplication users are adding hashing, a processor-intensive algorithm, to the client.
不过,如果采用源端重复数据删除技术,用户就要为客户端添加散列算法,这是需要大量占用处理器资源的一种算法。
149408197.blog.163.com
1.
Most digital signature systems use a combination of public key cryptography and cryptographic hashing algorithms.
大多数数位签章系统将公钥密码学和密码杂凑演算法结合使用。
www-128.ibm.com
2.
The associated hashing algorithm is used for providing integrity services.
相关联的散列算法用来提供完整性服务。
www.ibm.com
3.
In this installment, they turn to common approaches to data integrity and authentication, starting with hashing algorithms.
在这一部分中,他们从介绍杂凑演算法开始,致力于研究用于资料完整性和认证的常用方法。
www-128.ibm.com
4.
Source code is compiled into assemblies and placed in the Bin directory, with names that are derived from a hashing algorithm.
源代码编译到程序集中,且放置在Bin目录中,其名称派生于哈希算法。
msdn2.microsoft.com
5.
Identifies the hashing algorithm to be used to hash the input.
标识用于对输入执行哈希操作的哈希算法。
msdn.microsoft.com
6.
They may use hashing techniques or arithmetically offset the character set to unreadable or unprintable characters.
它们可能使用哈希技术,或者对字符集进行算术偏移,将字符变为不可读字符或不可输出字符。
msdn2.microsoft.com
7.
But new research at the University of Michigan shows that hashing out marital disagreements is actually good for your health.
但根据美国密歇根大学的一项最新研究表明,夫妇因磕磕碰碰的琐事而争吵其实有助于健康。
www.bing.com
8.
This algorithm is for hashing only and does not provide any encryption or decryption.
此算法仅用于哈希算法,并且不提供任何加密或解密。
msdn2.microsoft.com
9.
However it is most important and will watch the house, this comforts for me a little, hashing no white to keep it.
不过最重要的是它会看家,这多少给了我一点安慰,没有白白喂养它。
blog.sina.com.cn
10.
The application could compare two folders for differences using hashing and merge the different folders.
使用哈希法对比文件夹并可以来合并文件夹。
blog.sina.com.cn
1.
In addition to the standard hashing relationship, there is now a linked list that traverses through the collection.
除标准的散列关系之外,现在还有一个可遍历整个集合的链表。
www-128.ibm.com
2.
This is the decisive detection which pushes planet concept to be redefined: Affair's hashing already not arrived to solve can't of degree.
这是推动行星概念被重新定义的决定性发现:事情已经到了非解决不可的程度。
ks.cn.yahoo.com
3.
Source code is compiled into assemblies, with names that are derived from a hashing algorithm.
元素中的任何代码。源代码编译到程序集中,其名称派生于哈希算法。
msdn2.microsoft.com
4.
GetHashCode is suitable for use in hashing algorithms and data structures like a hash table.
GetHashCode适合在哈希算法和数据结构(如哈希表)中使用。
msdn2.microsoft.com
5.
Specifies that all UNION operations are performed by merging, hashing, or concatenating UNION sets.
指定所有UNION运算由合并、哈希或串联UNION集执行。
msdn2.microsoft.com
6.
You'll need a sharp knife and a wooden board for hashing up that meat.
你需要一把利刀和一块菜板来切碎那块肉。
www.hotdic.com
7.
Secure hashing in Java code involves some rigmarole that i'd rather skip over in this article.
Java代码的安全哈希法需要使用一些rigmarole,但是在本文中我将不对它进行介绍。
www.ibm.com
8.
In this paper, a new geometric hashing method fitting for the 3D object recognition under perspective transformation is proposed.
现有的几何哈希法仅适合于仿射变换下的二维景物识别,论文提出了适合透视投影变换下三维物体识别的几何哈希方法。
www.dictall.com
9.
Property contains the hashing algorithm used by this connection.
属性包含该连接使用的哈希算法。
msdn2.microsoft.com
10.
"You save. I looking at. " Yi snow cajolery says hashing to profoundly ponder in eye.
“你去救。我看着。”伊雪戏谑的说,眼里有着深深的玩味。
lionwind990718.sclub.tw
1.
True enables Analysis Services to use a faster algorithm for string hashing and comparison.
可使AnalysisServices使用更快的字符串哈希算法和比较算法。
msdn2.microsoft.com
2.
signature: The policy signed with a hashing algorithm and base 64 encoded.
signature:采用哈希算法签名并采用base64编码的策略。
www.ibm.com
3.
Shiro addresses these issues in a clean and intuitive hashing API.
Shiro用一种干净而直观的哈希API解决了上述问题。
www.infoq.com
4.
These methods are linear probing, quadratic probing, and double hashing.
这三种方法分别是线性探测、二次探测和再哈希法。
blog.sina.com.cn
5.
The target Queue Manager then uses the same hashing algorithm to authenticate the message when it is received.
然后,目标队列管理器在接收消息时使用相同的哈希算法对该消息进行身份验证。
msdn2.microsoft.com
6.
If the hashing cipher is run through code a second time and the message digest changes, it means the code changed after being signed.
当再一次对该代码应用此散列密码时,如果产生的消息摘要发生变动,则意味着经签名后的代码发生了变动。
www-128.ibm.com
7.
Select Encryption algorithm and hashing algorithm you want to use in your IPSec tunnels to encrypt the data.
选择在IPSec隧道中加密数据所用的加密算法和散列算法。
www.ibm.com
8.
Hashing allows client connect attempts to always be routed to the same server.
散列方式允许客户机连接尝试永远被路由到相同的服务器。
www-128.ibm.com
9.
The padding mode used in the hashing algorithm.
哈希算法中使用的填充模式。
msdn2.microsoft.com
10.
Hasn't the committee finished hashing over the question yet?
委员会仔细讨论完这个问题没有?
www.hotdic.com
1.
SHA-512 hashing and Base64-encoding of passwords is just as easy.
完成SHA-512哈希和密码的Base64编码也一样简单。
www.infoq.com
2.
With separate chaining it's not so important to make the table size a prime number, as it is with quadratic probes and double hashing.
如果用链地址法的话,表容量是质数的要求就不像在二次探测和再哈希法制显得那么重要。
blog.sina.com.cn
3.
When each pilot drives each pilot's hashing to keep firmly in mind any negligences may result in trouble, even die . . .
每一位驾驶员开车时都必须牢记任何的疏忽都可能造成事故,甚…
heshuibei.com
4.
For example, let's consider the relatively common case of MD5-hashing a file and determining the hex value of that hash.
打个比方,考虑比较常见的情况,使用MD5哈希一个文件,并确定该哈希的十六进制值。
www.infoq.com
5.
The consistent hashing algorithm is used in distribute storage system at present.
一致性哈希算法目前在分布式存储中应用广泛。
lib.cqvip.com
6.
for a big bit hash , try using a symmetric cipher adapted to perform hashing.
对于大位数杂凑,尝试使用适合于执行杂凑法的对称加密术。
www.ichacha.net
7.
Next, after a hashing function produces a message digest, the developer signs the digest with their private RSA key.
接下来,在散列函数产生了消息摘要之后,开发人员用他们的RSA私钥对该摘要进行签名。
www-128.ibm.com
8.
Serves as a hash function for the current BitVector32. Section, suitable for hashing algorithms and data structures, such as a hash table.
用作当前BitVector32.Section的哈希函数,适合用在哈希算法和数据结构(如哈希表)中。
msdn2.microsoft.com
9.
This is because hashing an input value converts it into a new value that is mathematically impossible to undo to produce the original value.
这是因为散列可以将输入值转化为新的值,而这些新值不能从数学上逆向生成原始值。
www.ibm.com
10.
In order to enhance the security of hashing algorithm, the authors propose a generalized two dimensional matrix hashing algorithm.
为提高置乱算法的安全性,提出一种广义的二维矩阵置乱算法。
www.ceps.com.tw
1.
Since MD5 hashing has been broken, the client wisely stipulated that all keys must be signed using SHA-1 instead.
由于MD5散列法已经被破坏,客户明智地规定,所有密匙必须使用SHA-1签名。
www.ibm.com
2.
An alternative that often works well is simply hashing.
另一个经常工作来说是散列。
blog.sina.com.cn
3.
No defined hashing operations.
无定义的散列操作。
www.ibm.com
4.
Its HashPasswordForStoringInConfigFile method can do the hashing.
它的HashPasswordForStoringInConfigFile方法可以进行哈希运算。
msdn2.microsoft.com
5.
Hashing algorithms produce unique binary message digests based on the code they sign.
根据要签名的代码,散列算法产生唯一的二进制消息摘要。
www-128.ibm.com
6.
The former is the hashing routine, while the latter is used for lookup.
前者是一个散列例程,而后者用于执行查找。
www.ibm.com
7.
There is few country hashing so many attractive field tour resource more than American.
世界上很少国家能像美国这样有如此多样诱人的野外旅游资源。
iask.sina.com.cn
8.
The motive force of modern clock 's hashing a machine dint and electric power is 2 kinds.
现代钟表的原动力有机械力和电力两种。
dictsearch.appspot.com
9.
Conclusion We can avoid medical dispute of non-negligence by applying different therapy hashing on the ethical period.
结论:对家属处在不同伦理时期患者采取不同的救治方法和态度能有效避免无过失医疗纠纷。
www.showxiu.com
10.
Return an F# comparer object suitable for hashing and equality.
返回适合于哈希处理和相等比较的F#比较器对象。
msdn.microsoft.com
1.
The underlying provider will take care of all necessary password hashing or decryption.
底层的提供者会处理好必要的密码散列或解密。
www.cnblogs.com
2.
The MD5 algorithm is the de facto hashing standard for digests.
MD5算法是事实上的标准摘要哈希算法。
www.ibm.com
3.
Specifies the type of hashing algorithm that is used for validating data.
指定用于验证数据的哈希算法的类型。
msdn2.microsoft.com
4.
Specifies the type of hashing algorithm that is used for decrypting data.
指定用于解密数据的哈希算法的类型。
msdn2.microsoft.com
5.
Write a program that uses hashing to store a series of strings.
写一个程序用哈西表存储一些字符串。
www.program-design.cn
6.
The idea behind hashing is fast access to data.
哈希的理念是更快地存取数据。
www.bing.com
7.
The credential pairs in the example are encrypted using the Secure Hash Algorithm-1 (SHA1) password-hashing format.
该示例中的凭据对是使用安全哈希算法1(SHA1)密码哈希格式加密的。
msdn2.microsoft.com
8.
In general, double hashing is the probe sequence of choice when open addressing is used.
使用开放地址策略时,探测序列通常用再哈希法生成。
blog.sina.com.cn
9.
Using skip_encryption to suppress password hashing is useful if the password is already hashed when the login is added to SQL Server.
如果在将登录名添加到SQLServer时已对密码进行了哈希运算,则使用skip_encryption来取消密码哈希运算将是有用的。
msdn2.microsoft.com
10.
The type attribute indicates the hash algorithm, such as Message-Digest algorithm 5 (MD5) or Secure Hashing Algorithm (SHA-1).
类型属性指出了hash算法,例如消息摘要算法5(MD5)或安全哈希算法(SHA-1)。
www.ibm.com
1.
Child's hashing to serve as guardian at the adult can go aboard under, the activity is inconvenient, the body is unwell and don't go aboard;
儿童必须在成人监护下方能上船,行动不便,身体不适不要上船;
zhishi.sohu.com
2.
Specifies the hashing algorithm for signing, which must be either
指定签名的哈希算法,必须为
msdn2.microsoft.com
3.
Scheduling of fault-tolerant weighted hashing in parallel firewall system
并行防火墙系统的容错加权散列调度算法
www.ilib.cn
4.
Two Effective Functions on Hashing URL in Collecting Chinese Information
两种适用于中文信息搜集的URL散列函数的研究
www.ilib.cn
5.
Association rule mining with the technology of hashing
运用哈希技术进行关联规则挖掘
www.ichacha.net
6.
Implementation of a Salt Figure Based on Hashing Algorithm
散列算法中一种盐值的实现
www.ilib.cn
7.
carrying out the fast filtrating for the message content by using the method of twice hashing;
采用两次散列的方法对短信内容进行快速过滤;
ip.com
8.
Adaptive Hashing of Chinese Characters
汉字自适应散列分组查找算法
www.ilib.cn
9.
Hashing Comparison in Web Crawling
Web信息采集中的哈希函数比较
www.ilib.cn
10.
Secure Encryption Keys and Hashing
保证加密密钥和哈希算法的安全
msdn2.microsoft.com
1.
Vector Graphic Retrieval Based on Modified Geometric Hashing
基于改进几何哈希法的矢量图形检索
www.ilib.cn
2.
Two Effective Functions on Hashing URL
两种对URL的散列效果很好的函数
www.ilib.cn
3.
Study on Image Hashing Based on Hashing and Grey Degree Spreading Algorithm
基于置乱和灰度扩散的图象置乱算法研究
www.ilib.cn
4.
Study on Content Assignment of Web Cluster Server Based on Two-Phase Hashing
基于两阶段散列的Web集群服务器内容分配研究
www.ilib.cn
5.
A new cooperative Web caching system based on consistent hashing
一种新的基于连续哈希函数的合作式Web缓存系统
www.ilib.cn
6.
Quick Finding Algorithm of MCU Based on Hashing Method
基于散列表的单片机快速查找算法
www.ilib.cn
7.
Image Hashing Based on Human Visual System
一种基于视觉特性的图像摘要算法
www.ilib.cn
8.
An Arithmetic of Nature Link between Two Relation based on Hashing Table
基于散列表存储结构的两关系自然连接算法设计
service.ilib.cn
9.
A Method for Rebuilding Topological Structure of Mesh in STL File Based on Hashing
基于散列的STL拓扑信息重建方法
www.ilib.cn
随便看

 

英汉双解词典包含2704715条英汉词条,基本涵盖了全部常用单词的翻译及用法,是英语学习的有利工具。

 

Copyright © 2004-2022 Newdu.com All Rights Reserved
更新时间:2025/1/13 4:28:10