单词 | Hashing |
例句 | 1. I made a real hash of my exams. 2. They hashed over the problems of the new couples and decided to help them. 3. He hashed a phrase in order to colour the sentence. 4. They were asked to sit down together and hash out their differences by their father. 5. You have hashed up the matter that should be handled by me. 6. I'm sorry I hashed up the arrangements. 7. He made a complete hash of the last question. 8. The differences between them have been hashed out. 9. I made a real hash of the interview. 10. They agreed with my views that they hashed out. 11. I made a complete hash of my driving test. 12. The reorganization plan was hashed out September 16. 13. We thought we knew our parts,() but when the play began we hashed the whole thing. 14. I have to hash over your application to join the club if you persisted in your errors. 15. The Government made a total hash of things and squandered a small fortune. 16. I'm old, now I'm often hashing over the old fine days. 17. I hope all of us not to hash up old bitterness against one another. 18. We hashed out if we left the matter to him. 19. The first interview was all right but I rather think I hashed up the second one. 20. The process is often also described as hashing. 21. The optimum size of hash table can only be determined if the approximate number of items to be stored is known. 22. Brokerage's hashing no case can clinch a deal! 23. The idea hashing is fast access to data. 24. Hasn't the committee finished hashing over the question yet? 25. A contributor among multiple cooperating hashing operations. 26. A random string used in security hashing. 27. After signing a cooperation agreement May 11, the two airlines have been hashing out details. 28. The other is content assigning algorithm based on two - phase hashing. 29. Prove elementary properties of modular arithmetic and explain their applications in Computer Science, for example, in cryptography and hashing algorithms. 30. Some weaknesses have been found in a more recent hashing algorithm, known as SHA - 1 . 31. A new cooperative Web caching system (CHRCS) based on consistent hashing function was proposed. 32. Therefore, I can't imagine, society's hashing no Internet will be what appearance. 33. With a good consistent hashing function, all servers should have more or less the same amount of data stored locally. 34. These methods are linear probing, quadratic probing, and double hashing. 35. Indicates that a hashing operation may have incurred a problem. 36. All the current geometric hashing methods are just suitable for the object recognition under affine transformation. 37. In order to support dynamic update, we mend the data structure of inverted index, and take a new update strategy of inverted index based on extendible hashing to make inverted index extendible. 38. In addition, SHA-1 (Secure Hashing Algorithm) is an NIST-sponsored hashing function and has been adopted by the U.S. government as a standard. 39. You should apply your hashing scheme to each of the sections separately, and compare the results. 40. The various hash index methods are intended to address different aspects of the hashing itself, like the handling of collisions or overflows. 41. The independent hash space preserved for each different hash function reduces the internal confliction among hashing. 42. The hashing function is one of the basic foundations of the cryptography. It widely used in data integrality and identity authentication. 43. Specifies all the hash algorithms used for hashing files and for generating the strong name. 44. This is because hashing an input value converts it into a new value that is mathematically impossible to undo to produce the original value. 45. This paper presents the design and implementation of a content-based image retrieval system which acquires effective and efficient similar shape retrieval using a modified geometric hashing technique. 46. However, with a good cryptographic hashing function,(http:///hashing.html) it should be extremely difficult in practice to find two intelligible strings that hash to the same value. 47. Such functions, commonly known as hash functions (Hashing function) keys corresponding addresses or conversion (key to address transformation). 48. Write a program that uses hashing to store a series of strings. 49. It then reads from the outer table BAD_CREDIT using the SHIP operator, hashing the join column values, and checking in the lookup table generated for the inner table. 50. To authenticate messages, the Message Queuing run-time DLL on the source computer uses a hashing algorithm when creating a digital signature for a message. 51. The virtual page number is hashed into a page table. This page table contains a chain of elements hashing to the same location. 52. This paper presents a content - based image retrieval technique based on salient points matching and geometric hashing. 53. You'll need a sharp knife and a wooden board for hashing up that meat. 54. The join is performed by scanning the inner table of the hash join, CUSTOMERS, and generating a lookup table by hashing the join column values. 55. Section 7 discusses hashing global history and branch address information before indexing the predictor. Section 8 describes the technique for combining multiple predictors. 56. There is no function object for compared or hashing values. 57. Secondly, it detailedly describes a key technology in Byzantine modification detection— Homomorphic Hashing function, then it gives related arithmetic and proof . 58. A text image watermarking algorithm using encryption and hashing function is presented to choose Chinese characters sequence which need to be embedded watermarking. 59. In general , double hashing is the probe sequence of choice when open addressing is used. 60. The hashing algorithm is applied to the value of the partitioning key, and generates a partition number between zero and 4095. 61. Developers can use this application block to incorporate hashing and symmetric encryption in their applications. 62. The query processing in the distributed database systems is comprehensively summarized. This paper shows that using HASHING method for thereduction of semi-join communication cost is beneficial. 63. The placement is determined by an internal hashing function that takes the values in the column or columns defined as a partitioning key and returns the database partition number. 64. On the source computer, Message Queuing uses the hashing algorithm when creating a digital signature for a message. |
随便看 |
英语例句大全共收录104207条中英例句词条,基本覆盖所有常用英文单词的例句、长难句及中文翻译,是不可多得的英语学习材料。