词汇 | example_english_hash-function |
释义 | hash functioncollocation in Englishmeanings of hashand functionThese words are often used together. Click on the links below to explore the meanings. Or, see other collocations with function. hash noun uk /hæʃ/ us /hæʃ/ a mixture of meat, potatoes, and vegetables cut into small pieces and baked ... See more at hash function noun uk /ˈfʌŋk.ʃən/ us /ˈfʌŋk.ʃən/ the natural purpose (of something) or the duty (of ... See more at function Examples of hash functionThese examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. Tuning of the hashfunction parameters leads to many variations. The complexity of the function called depends on the connectionist model used, and may be comparable to a simple hashfunction sometimes. Uses a brute-force search to construct a perfect hashfunction for a set of 16 keywords. 150 lines. There is however a simple and much faster algorithmic solution - using a trivial hashfunction table lookup. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. For example, each encryption key can be generated from the underlying key material using a cryptographic hashfunction or other key derivation function. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The most secure don't store passwords at all, but a one-way derivation, such as a polynomial, modulus, or an advanced hashfunction. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. There exists a known weakness in the hash based key stretching algorithms that use an iterative hashfunction. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Only the collision attacks are of practical complexity; none of the attacks extend to the full round hashfunction. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. See hashfunction for a much more detailed discussion. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A rolling hash is a hashfunction specially designed to enable this operation. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. When a collision attack is discovered and is found to be faster than a birthday attack, a hashfunction is often denounced as broken. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Because the check value has a fixed length, the function that generates it is occasionally used as a hashfunction. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The technique is known as a trivial hashfunction or, when used specifically for branch tables, double dispatch. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Cuckoo hashing, another technique for implementing hash tables, guarantees constant time per lookup (regardless of the hashfunction). From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A poor hashfunction can exhibit poor performance even at very low load factors by generating significant clustering. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. A key collision is the hashfunction mapping of different keys to the same position in a hash table. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. On top of that, it is possible for the secondary hashfunction to evaluate to zero. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. The downside is extra latency from computing the hashfunction. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. This analysis makes the (unrealistic) assumption that the hashfunction is completely random, but can be extended also to 5-independent hash functions. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. Central to this is the capacity of the hashfunction, which is the state bits that are not touched by input or output. From Wikipedia This example is from Wikipedia and may be reused under a CC BY-SA license. These examples are from corpora and from sources on the web. Any opinions in the examples do not represent the opinion of the Cambridge Dictionary editors or of Cambridge University Press or its licensors. Want to learn more? Go to the definition of hash Go to the definition of function See other collocations with function |
反思网英语在线翻译词典收录了377474条英语词汇在线翻译词条,基本涵盖了全部常用英语词汇的中英文双语翻译及用法,是英语学习的有利工具。