您要查找的是不是:
- Distributed HASH function 分布式哈希函数
- Serves as a hash function for a particular type. 用作特定类型的哈希函数。
- Serves as a hash function for this object. 作为此对象的哈希函数。
- Some research is based on Distributed Hash Table (DHT) networks. 其中,有些研究是奠基在DHT网路之上。
- Supplies a hash code for an object, using a custom hash function. 使用自定义哈希函数为对象提供哈希代码。
- A hash function produces a fixed-size one-way hash value of the document. 哈希函数产生文档的固定长度单向哈希值。
- Sn. Exe computes the token using a hash function from the public key. Sn.;exe使用公钥中的哈希函数计算该标记。
- A hash function must always return the same hash code for the same key. 哈希函数必须始终为相同的键返回相同的哈希代码。
- The attacker also replaces our publicly distributed hash with the hash of the Trojaned copy of the release. 攻击者也将我们公开分发的杂凑替换成带有特洛伊副本的杂凑发行版。
- A hash function produces a fixed-size oneway hash value of the document. 哈希函数产生文档的固定长度单向哈希值。
- Most structured P2P networks are based on distributed hash tables(DHT), for example, Chord, CAN, Pastry and Tapestry. 大部分结构化P2P网络都基于分布式哈希表(Distributed Hash Tables,DHT)技术,比如著名的Chord、CAN、Pastry、Tapestry等。
- Hash A unary function object type that acts a hash function for a Value. 一元函数对象类型,用作Value的散列函数。
- Currently, the research of p2p is focused on resources location based on distributed hash table and transaction security based on trust mechanism between peers. 当前对等网络研究的重点是基于分布式哈希表的资源定位问题,以及基于节点间信任机制的交互安全问题。
- To address the problem, several research groups independently proposed structured P2P systems based on DHT (distributed hash table), which include Chord, CAN, Pastry and Tapestry. 目前已有的基于分布式哈希表(Distributed Hash Tables;DHT)技术的结构化P2P系统;最基本的功能是提供文件的精确定位.
- Hash functions usually produce constant-sized digests. 杂凑函数通常产生恒定大小的摘要。
- The hash function that van Lunteren devised for routing became essential for IBM's stream processor. 范卢特伦为路由设计的杂凑函数,遂成为IBM串流处理器的要件。
- In addition, a simpler hash function was given which sorked almost the same as the one in[1]. 此外,提出了一个与文献[]比计算量更小、列效果相当的散列函数。
- It is important that both the signer and the verifier use the same hash function to digest the data. 签名人和验证人必须使用相同的哈希函数对数据进行摘要。
- The cryptographic strength of HMAC depends on the properties of the underlying hash function. HMAC的加密强度取决于基础哈希函数的属性。
- The systems can employ HSE (High Speed Ethernet) to connect hosts which construct a Peer-to-Peer system;and DHT (Distributed Hash Table) is utilized to balance load and to issue data. 该集群通过高速以太网连接,节点采用对等结构构件系统,通过分布式哈希表进行数据发布、负载均衡及系统自动扩容。