hashing
noun[U]
ITuk/ˈhæʃɪŋ/usthe use of anumbertorepresentapieceofcomputerdataso that it can beprotectedor befoundquickly:
Companies are usingdigitalhashingtechnologytokeeptheirdatasecure.
单词 | hashing |
释义 | hashing noun[U] ITuk/ˈhæʃɪŋ/usthe use of anumbertorepresentapieceofcomputerdataso that it can beprotectedor befoundquickly: Companies are usingdigitalhashingtechnologytokeeptheirdatasecure. Examplesofhashinghashing Another generalization of cuckoohashingconsists in using more than one key per bucket. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Cuckoohashing, another technique for implementing hash tables, guarantees constant time per lookup (regardless of the hash function). From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Like all other forms of open addressing, doublehashingbecomes linear as the hash table approaches maximum capacity. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Furthermore,hashingis applied to passwords for computer systems. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. In this type of attack, the program goes through all the possible plaintexts,hashingeach one and then comparing it to the input hash. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Thehashingfunction is not generally optimized for coverage - raw speed is more desirable. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Some secure environments employ cryptographichashing, simply to verify that the information has not been altered since it was last modified. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Linearhashingallows for the expansion of the hash table one slot at a time. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Linking-based time-stamping scales well -hashingis much faster than public key cryptography. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Hence consistenthashingis needed to avoid swamping of servers. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. |
随便看 |
|
英汉词典包含213609条英汉翻译词条,涵盖了常用英语单词及词组短语的翻译及用法,是英语学习的必备工具。