搜索资源列表
MonAlgorithmCode
- algorithm , tree hash table, b tree, Tas de Fibonnaci-algorithm, tree hash table, b tree, Tas de Fibonnaci
MyMD5
- 信息安全MD5哈西加密算法用c语言编程实现-information security encryption algorithm MD5 hash using C language programming
SocketPool-0712
- 基于JXTA的P2P交通仿真程序,SimpleJxtaApp.java为主控文件,RoadGui为图形界面,MD5为Hash码生成文件,Cartest01为车辆Agent文件,另外一个对等组工具文件PeerGroupTool。-based on the JXTA P2P traffic simulation program, SimpleJxtaApp.java for controlling documents, RoadGui for the graphic interface, MD5 H
ANtsP2P_beta1.5.6_p0.9.3_src_nb
- ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others. Features Open Source
H_a_s_h
- hash表操作,提供表中查找插入操作,并比较相同关键字下HASH长度为多少时最好.-hash table operation, the provision of the table you insert operation, and the same as the keyword under HASH For what length of the best.
11_SHA
- 安全散列算法采用单向Hash函数将需加密的明文\"摘要\"成一串128bit的密文-security hash algorithm uses one-way hash function would require encryption expressly "summary" as a bunch of 128bit The ciphertext
CMd5_Unicode
- 先前的md5_correct关于Unicode的说法不正确,此版本为验证过的真正支持Unicode的版本,修正了其他的小问题。注意文件格式仅支持ansi格式,其他格式的支持不是本类的重点。关键词:md5,CMd5,Unicode,hash-previous md5_correct on Unicode is not correct. This version tested for the genuine support of Unicode version, the amendment of o
md5jiamichengxu
- 这是一个md5的杂凑算法,对于一般的文本和文件均可以进行运算,产生128位的杂凑值-the md5 hash algorithm for general text and documents can be conducted efficiently, 128 have the hash value
list_hash
- hash表和单向链表的实现代码,相当实用.-hash table and the realization of one-way linked list code useful.
testHashtable
- 测试哈希表,对初学者有帮助,请看测试部分-test hash table, for beginners help, please look at the testing of some
LZWandLZW2
- 关于压缩与解压缩的源码 自己编的 适合数据结构学习 用到了散列-on the compression and decompression of the source code developed for the data structure used in the study of hash
JumpQueue
- 对买票插队现象的一个数学上的分析,假设由一个人又很多朋友的情况,利用了哈希表.-queue to buy a phenomenon of mathematical analysis, the assumption that people from a lot of friends, use of the hash table.
23952
- My (so called) HiP compression algorithm as console mode utility. It s a hybrid of Lempel-Ziv 77 and Adaptive Huffman encoding (Huffman + LZ77 ZIP = HiP) with a word prefix hash algorithm etc.-My (so called) a compression algorithm HiP '
MD5hash
- VB md5的HASH算法 适合与RSA一块使用 -VB md5 HASH the RSA algorithm with a suitable use
jeromel
- 利用Hash技术统计单词的频度。扫描一个C源程序,用Hash表存储该程序中出现的关键字,并统计该程序中的关键字出现的频度。用线性探测法解决Hash冲突。设Hash函数为:Hash(Key)=[(Key的首字母序号)*100+(Key的尾字母序号)] Mod 41 -use statistical word frequency. Scanning a C source files, using the hash table storage procedures of the keyword s
108108
- 也就是说,您可以将类似Java哈希表这样的复杂类型作为一个参数进行传递。而在目前的RPC系统中,您只能依靠客户机将此类对象分解成基本数据类型,-other words, you can hash table similar to Java such a complex type as a parameter transmission. And the current RPC system, you can only rely on the client will be decomposed in
109
- 也就是说,您可以将类似Java哈希表这样的复杂类型作为一个参数进行传递。而在目前的RPC系统中,您只能依靠客户机将此类对象分解成基本数据类型,-other words, you can hash table similar to Java such a complex type as a parameter transmission. And the current RPC system, you can only rely on the client will be decomposed in
sanlie
- 这个程序处理散列文件的插入、删除和查找操作。-hash this procedure to insert the document, delete and search operation.
hashfunction
- 应用密码学中hash function的详细介绍-hash function which detailed descr iption of
RoleRight
- 这是关于哈希表的Java源代码,有兴趣的朋友可以-This the hash table on the Java source code, interested friends can s