Location:
Search - FAST hash
Search list
Description: This project is to show the tree I dreamed when I first met the ternary tree concept. When I came upon the ternary tree, I get awed! It s amazing that an idea so simplistic could be so strong and fast. But it had flaws... the first one is the memory consumption. The hash table implementation consumes far less memory than the ternary tree! The second flaw is the ternary tree can be fragmented and be extremely unbalanced (as the algorithm doesn t do any balancing step) so the tree also needs a way for balancing the nodes. I tried to reduce the memory consumption by grouping three nodes into one new \"int\" node. -This project is to show the tree I dreamed wh en I first met the ternary tree concept. When I ca me upon the ternary tree, I get awed! It's amazing that an idea so simplisti c could be so strong and fast. But it had flaws ... the first one is the memory consumption. The has h table implementation consumes far less memor y than the ternary tree! The second flaw is the te rnary tree can be fragmented and be extremely un balanced (as the algorithm does not do any balanc ing step) so the tree also needs a way for balanci Vi the nodes. I tried to reduce the memory consum ption by grouping three nodes into one new "int" node.
Platform: |
Size: 32291 |
Author: gaowen |
Hits:
Description: 算法源码集合:有hash表、笛卡尔集、哈弗曼树、矩阵乘法、快速排序-algorithm source code pool : hash tables, Descartes sets, Hafuman tree, matrix multiplication, fast scheduling, etc.
Platform: |
Size: 1110873 |
Author: 杨昆 |
Hits:
Description: This project is to show the tree I dreamed when I first met the ternary tree concept. When I came upon the ternary tree, I get awed! It s amazing that an idea so simplistic could be so strong and fast. But it had flaws... the first one is the memory consumption. The hash table implementation consumes far less memory than the ternary tree! The second flaw is the ternary tree can be fragmented and be extremely unbalanced (as the algorithm doesn t do any balancing step) so the tree also needs a way for balancing the nodes. I tried to reduce the memory consumption by grouping three nodes into one new "int" node. -This project is to show the tree I dreamed wh en I first met the ternary tree concept. When I ca me upon the ternary tree, I get awed! It's amazing that an idea so simplisti c could be so strong and fast. But it had flaws ... the first one is the memory consumption. The has h table implementation consumes far less memor y than the ternary tree! The second flaw is the te rnary tree can be fragmented and be extremely un balanced (as the algorithm does not do any balanc ing step) so the tree also needs a way for balanci Vi the nodes. I tried to reduce the memory consum ption by grouping three nodes into one new "int" node.
Platform: |
Size: 31744 |
Author: gaowen |
Hits:
Description: 本程序能将一串数字通过一个算法方便的进行排序,速度很快-This procedure can be a string of figures through an algorithm to sort a convenient, fast
Platform: |
Size: 132096 |
Author: caoti |
Hits:
Description: 本程序实现的学生信息管理系统,包括查找与排序,有折半查找与哈希表查找,起泡排序与快还排序-This procedure to achieve the student information management system, including search and sorting, a half to find with the hash table to find, sort and blistering fast also sort
Platform: |
Size: 2048 |
Author: 周劲波 |
Hits:
Description: 指针链表,指针数组,快速的查找;高效的hash碰撞链表-List pointer, pointer array, fast find and efficient hash collision list
Platform: |
Size: 9216 |
Author: 王义金 |
Hits:
Description: 实验数据结构关于哈希表的问题,连电话记得那才叫警方ig据id快ifvnidsidf-Experimental data on the hash table structure of the problem, remember that even the phone calls, according to id really fast ig Police ifvnidsidf
Platform: |
Size: 102400 |
Author: liguifang |
Hits:
Description: 論文探討關於以圖像做為密碼,以杜絕鍵盤側錄偷竊密碼-We have design and implemented a method that uses a
strengthened cryptographic hash function to compute fast and
secure passwords for arbitrarily many accounts while requiring
the user to memorize only few memorable points in the image.
Platform: |
Size: 402432 |
Author: |
Hits:
Description: 是一个正在进行的项目,提供强有力的和快速的加密形式的工具包使用的商业和开放源代码项目。库包括:随机数生成器,分组密码,散列函数,消息认证码-Is an ongoing project to provide a strong and fast encryption tool kit used in the form of commercial and open source projects. Library include: random number generator, block cipher, hash function, message authentication code
Platform: |
Size: 774144 |
Author: sportsboy_21 |
Hits:
Description: 利用了GBK编码的hash表,快速进行汉语分词的自然语言程序-Advantage of the GBK-encoded hash table, fast Chinese word segmentation of natural language program
Platform: |
Size: 2048 |
Author: 海铭 |
Hits:
Description: DES算法
DSA算法
ElGamal算法
Kohonen的SOFM(自组织特征映射)
LAM(线性联想记忆)算法
LZW 压缩算法
MD5算法
PGP的安全性(一)
PKCS #7
RSA算法
SSL是怎样工作的?
Ternary Search Trees
产生组合的非递归算法
大整数的乘法
对LZW算法的改进及其在图象无损压缩中的应用
复数快速傅立叶变换算法
加密算法与密钥管理
经典加密算法在VB中的实现(1)- Rsa
经典加密算法在VB中的实现(2)- MD5
经典加密算法在VB中的实现(3)- RC4
经典加密算法在VB中的实现(4)- DES
经典字符串HASH函数测试
离散的Hopfield算法
秘密天窗加密方法C++源程序
浅谈图像压缩算法
求全排列的非递归算法
如何实现DES算法
神经元网络 LVQ(学习矢量量化)算法
神经元网络的经典B-P算法1
神经元网络的经典B-P算法2
神经元网络的经典B-P算法3
实数快速fft变换算法
实数快速fft算法二
使用ASP加密算法加密你的数据
手写体数据变换成像素位图的算法
-DES algorithm
DSA algorithm
ElGamal algorithm
Kohonen s SOFM (Self Organizing Map)
LAM (Linear Associative Memory) algorithm
LZW compression algorithm
MD5 Algorithm
PGP Security (a)
PKCS# 7
RSA algorithm
SSL How does it work?
Ternary Search Trees
Produce combinations of non-recursive algorithm
Large integer multiplication
On the LZW algorithm and its application in image lossless compression
Complex fast Fourier transform algorithm
Encryption and Key Management
Classical encryption algorithm implementation in VB in (1)- Rsa
Classical encryption algorithm implementation in VB in (2)- MD5
Classical encryption algorithm implementation in VB in (3)- RC4
Classical encryption algorithm implementation in VB in (4)- DES
Classical string HASH function test
Discrete Hopfield algorithm
Secret Window encryption C++ source code
Of image compression algorithm
Perfectionist ordered non-recursive algorithm
How to implement DES algorithm
Neural network LVQ (learning vector qu
Platform: |
Size: 209920 |
Author: 蟲子 |
Hits:
Description: 布隆过滤器,Hash快速查表的改良快速算法,占用更少的空间-Bloom filter, Hash improved fast algorithm for fast look-up table, take up less space
Platform: |
Size: 1303552 |
Author: 李东辉 |
Hits:
Description: This document specifies EAP-IKEv2, an Extensible Authentication
Protocol (EAP) method that is based on the Internet Key Exchange
(IKEv2) protocol. EAP-IKEv2 provides mutual authentication and
session key establishment between an EAP peer and an EAP server. It
supports authentication techniques that are based on passwords,
high-entropy shared keys, and public key certificates. EAP-IKEv2
further provides support for cryptographic ciphersuite negotiation,
hash function agility, identity confidentiality (in certain modes of
operation), fragmentation, and an optional "fast reconnect" mode.
Tschofenig, et al. Experimental [Page 1]
Platform: |
Size: 37888 |
Author: 歪歪 |
Hits:
Description: HASH表 对于快速数据查找,能大大提高效率-HASH table lookup for fast data, can greatly improve efficiency
Platform: |
Size: 2048 |
Author: aa |
Hits:
Description: Smallest, fastest embedded nosql persisted dictionary using b+tree or MurMur hash indexing.
.-RaptorDB is a extremely small size and fast embedded, noSql, persisted dictionary database using b+tree or MurMur hash indexing. It was primarily designed to store JSON data
Platform: |
Size: 31744 |
Author: xie linfeng |
Hits:
Description: 常用的Delphi数据结构类库,包含哈希,链表,队列,堆栈等常用数据结构,好用,速度快.个人常用类库之一,并且修改原版中的部分Bug.全部源代码.-Commonly used Delphi data structures library, contains a hash, linked lists, queues, stacks, and other commonly used data structures, easy to use, fast. One of the frequently-used library, and modify the part of the original Bug. All the source code.
Platform: |
Size: 105472 |
Author: liwd |
Hits:
Description:
建立一个简单的学生信息管理系统,该系统为注册学生保存基本信息、选课信息以及课程成绩。系统要方便基本信息、选课信息、成绩的增加、删除、修改及查询。为实现快速查询,要求对基本信息、选课信息和成绩建立相应的索引,学生成绩采用平衡二叉树建索引,对学生姓名采用Hash建立索引,对学号实现折半查找。-Create a simple student information management system, which save the basic information for registered students, course information and course grade. System to facilitate the basic information, course information, the results increase, delete, modify and query. To achieve fast query, basic information, course information and results to establish the corresponding index, student performance using a balanced binary tree to build the index, the student name using Hash indexing, binary search on the student number.
Platform: |
Size: 4392960 |
Author: key |
Hits:
Description: 学生信息系统,实现了(冒泡,快速,选择,插入)四种排序方式和(顺序,哈希)两种查找方式,有界面,支持信息的手动输入。-Students information system, realize (bubbling, fast, choose, insert) four sort order and (order, hash) two search way, to have the interface, support information manual input.
Platform: |
Size: 962560 |
Author: 王震 |
Hits:
Description: 大量MD5的存储设计和内存设计,实现快速的查找功能。改写魔兽hash算法,为文件读写操作。-A large number of MD5 storage design and memory design, realize fast lookup functions. Rewritten Warcraft hash algorithm for file read and write operations.
Platform: |
Size: 2048 |
Author: 孙峰 |
Hits:
Description: Multi platform (linux, windows, etc.) fast efficient hash table lookup code written in C
Platform: |
Size: 9565 |
Author: steelclip |
Hits: