sin ejemplosSe encuentra en 3 diccionarios
El diccionario inglés-ruso de ciencias informáticas- dicts.lingvocomputer_en_ru.description
- dicts.lingvocomputer_en_ru.description
hashing
хеширование, рандомизация, перемешивание
Telecoms (En-Ru)
hashing
хэширование
Recibe acceso a todos los diccionarios temáticos gratuitos
Ejemplos de los textos
Variations of the searching technique known as hashing have been implemented in many compilers.Во многих компиляторах реализованы варианты технологии поиска, известной под названием хеширование.Aho, Alfred V.,Sethi, Ravi,Ullman, Jeffrey / Compilers: Principles, Techniques, and ToolsАхо, Альфред В.,Ульман, Джеффри,Сети, Рави / Компиляторы: принципы, технологии, инструментыКомпиляторы: принципы, технологии, инструментыАхо, Альфред В.,Ульман, Джеффри,Сети, Рави© Addison-Wesley Publishing Company, Inc., 1985© 2001© Издательский дом "Вильямс", 2001Compilers: Principles, Techniques, and ToolsAho, Alfred V.,Sethi, Ravi,Ullman, Jeffrey© 2001 by PEARSON EDUCATION NORTH ASIA LIMITED and PEOPLE'S POSTS & TELECOMMUNICATIONS PUBLISHING HOUSE© 1986
Data is hashed into slots that have the same hashing value.Данные хешируются в слоты, которые имеют одинаковое значение хеша.Henderson, Ken / The Guru's Guide to Transact-SQLХендерсон, Кен / Профессиональное руководство по Transact-SQLПрофессиональное руководство по Transact-SQLХендерсон, Кен© ООО «Питер Принт», 2005© 2000 by Addison-WesleyThe Guru's Guide to Transact-SQLHenderson, Ken© 2000 by Addison-Wesley
A password-cracking program can attempt to determine the password (or a substitute for the password) by hashing combinations of letters and numbers using MD4 until it gets a result that matches the hash in Active Directory.Программа взлома паролей может попытаться определить пароль (или эквивалентную замену), хешируя комбинации букв и цифр по алгоритму MD4, пока не будет получен результат, совпадающий с хешем в базе данных Active Directory.Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2Внутренный мир Windows Server 2003, SP1 и R2Бозуэлл, Уилльям© Издательский дом "Вильямс", 2006© Pearson Education, Inc., 2003Inside Windows Server 2003Boswell, William© 2003 by Pearson Education, Inc.
You'll need to play with the size of the hash table (1,024 in my example) to avoid artificial RESOURCE BUSY messages, due to different strings hashing to the same number.Нужно "поиграть" с размером хеш-таблицы (в моем примере — 1024), чтобы избежать сообщений RESOURCE BUSY, связанных с получением одного и того же хеш-значения по разным строкам.Kyte, Tom / Expert One-on-One OracleКайт, Том / Oracle для профессионаловOracle для профессионаловКайт, Том© Перевод на русский язык. ООО «ДиаСофтЮП», 2003© Wrox Press Ltd, 2002Expert One-on-One OracleKyte, Tom© Wrox Press Ltd, 2002
Changes to the data structure can be made that will speed up open hashing and allow closed hashing to handle larger sets.Путем внесения изменений в структуру данных можно изменять объем пространства, за нимаемого данными при открытом хеширование, и увеличить его при закрытом хешировании.Ахо, Альфред В.,Ульман, Джеффри,Хопкрофт, Джон / СтруктурыAho, Alfred V.,Ullman, Jeffrey,Hopcroft, John / Data Structures and AlgorithmsData Structures and AlgorithmsAho, Alfred V.,Ullman, Jeffrey,Hopcroft, John© Addison-Wesley Publishing Company, IncСтруктурыАхо, Альфред В.,Ульман, Джеффри,Хопкрофт, Джон© Издательский дом "Вильямс", 2000© Addison-Wesley Publishing Company, Inc© 2000
Since the hashing scatters the elements around in the table, they are visited in seemingly random order.Поскольку при создании ключей элементы добавляются не упорядоченно, то их обход происходит в случайном порядке.Horstmann, Cay S.,Cornell, Gary / Core Java™ 2. Volume II - Advanced FeaturesХорстманн, Кей С.,Корнелл, Гари / Java 2. Том II. Тонкости программированияJava 2. Том II. Тонкости программированияХорстманн, Кей С.,Корнелл, Гари© Издательский дом "Вильямc", 2002© Prentice Hall, Inc., 2002Core Java™ 2. Volume II - Advanced FeaturesHorstmann, Cay S.,Cornell, Gary© 2002 Sun Microsystems, Inc.
The user password can be used as the key for decrypting the container description either directly or in the hashing form.В качестве ключа для расшифровки описания контейнера может быть использован пароль пользователя непосредственно или в хешированном виде.http://www.patentlens.net/ 17.10.2011http://www.patentlens.net/ 17.10.2011
It was all my parents could talk about lately, incessantly hashing and rehashing the reasons why my sister and Kyle—already in their thirties and with four years of marriage behind them—had yet to reproduce.Родители в последнее время только об этом и говорили, то так, то эдак прикидывали, почему у сестры и Кайла – ведь им уже за тридцать и они женаты четыре года – все еще нет детей.Weisberger, Lauren / Devil Wears PradaВайсбергер, Лорен / Дьявол носит "Prada"Дьявол носит "Prada"Вайсбергер, Лорен© Lauren Weisberger, 2002© 2006 Fox "Devil Wears Prada" TM © All Rights Reserved© ООО Издательство "АСТ МОСКВА", 2009Devil Wears PradaWeisberger, Lauren© 2003 by Lauren Weisberger
To avoid this, we use a form of hashing.Для того чтобы избежать этого, применим хеширование.Manning, Christopher D.,Raghavan, Prabhakar,Schuetze, Hinrich / An Introduction to Information Retrieval. Part3Маннинг, Кристофер,Рагхаван, Прабхакар,Шютце, Хайнрих / Введение в информационный поиск. Часть 3Введение в информационный поиск. Часть 3Маннинг, Кристофер,Рагхаван, Прабхакар,Шютце, Хайнрих© Издательский дом "Вильямс", 2011© Cambridge University Press, 2008An Introduction to Information Retrieval. Part3Manning, Christopher D.,Raghavan, Prabhakar,Schuetze, Hinrich© 2009 Cambridge UP
The simple hashing function of Fig. 4.11 may treat certain sets of inputs, such as the consecutive strings in Example 4.5, in a nonrandom manner.В приведенном примере хеш-функция распределяет элементы исходного множества по множеству сегментов не равномерно.Ахо, Альфред В.,Ульман, Джеффри,Хопкрофт, Джон / СтруктурыAho, Alfred V.,Ullman, Jeffrey,Hopcroft, John / Data Structures and AlgorithmsData Structures and AlgorithmsAho, Alfred V.,Ullman, Jeffrey,Hopcroft, John© Addison-Wesley Publishing Company, IncСтруктурыАхо, Альфред В.,Ульман, Джеффри,Хопкрофт, Джон© Издательский дом "Вильямс", 2000© Addison-Wesley Publishing Company, Inc© 2000
Hashing means a variation of encryption without possibility for decryption (one-way encryption).Хеширование - разновидность шифрования без возможности расшифровки (однонаправленное шифрование).http://www.patentlens.net/ 17.10.2011http://www.patentlens.net/ 17.10.2011
Hashing was invented to speed things up.Хеширование было придумано как раз для того, чтобы ускорить поиск.Graham, Ronald L.,Knuth, Donald E.,Patashnik, Oren / Concrete Mathematics: A Foundation for Computer ScienceГрэхем, Р.,Кнут, Д.,Паташник, О. / Конкретная математика. Основание информатикиКонкретная математика. Основание информатикиГрэхем, Р.,Кнут, Д.,Паташник, О.© 1994, 1989 by Addison-Wesley Publishing Company, Inc.© перевод, В. В. Походзей, А.В. Ходулёв, 1998Concrete Mathematics: A Foundation for Computer ScienceGraham, Ronald L.,Knuth, Donald E.,Patashnik, Oren© 1989 by Addison-Wesley Publishing Company
Hashing is an especially good candidate for probabilistic analysis, because it is an extremely efficient method on the average, even though its worst case is too horrible to contemplate.Хеширование особенно подходит для вероятностного анализа, поскольку метод хеширования исключительно эффективен в среднем, хотя его наихудший случай просто ужасен.Graham, Ronald L.,Knuth, Donald E.,Patashnik, Oren / Concrete Mathematics: A Foundation for Computer ScienceГрэхем, Р.,Кнут, Д.,Паташник, О. / Конкретная математика. Основание информатикиКонкретная математика. Основание информатикиГрэхем, Р.,Кнут, Д.,Паташник, О.© 1994, 1989 by Addison-Wesley Publishing Company, Inc.© перевод, В. В. Походзей, А.В. Ходулёв, 1998Concrete Mathematics: A Foundation for Computer ScienceGraham, Ronald L.,Knuth, Donald E.,Patashnik, Oren© 1989 by Addison-Wesley Publishing Company
For example, it would be disastrous if one thread tried to add to a hash table while another thread is rehashing the elements.Например, если один поток пытается добавить элемент в хэш-таблицу, а другой в это же время пытается генерировать новые ключи, это неизбежно приведет к сбою.Horstmann, Cay S.,Cornell, Gary / Core Java™ 2. Volume II - Advanced FeaturesХорстманн, Кей С.,Корнелл, Гари / Java 2. Том II. Тонкости программированияJava 2. Том II. Тонкости программированияХорстманн, Кей С.,Корнелл, Гари© Издательский дом "Вильямc", 2002© Prentice Hall, Inc., 2002Core Java™ 2. Volume II - Advanced FeaturesHorstmann, Cay S.,Cornell, Gary© 2002 Sun Microsystems, Inc.
When you create a hash cluster, you will use the same CREATE CLUSTER statement you used to create the index cluster with different options.При создании хеш-кластера используется тот же оператор CREATE CLUSTER, что и при использовании индексного кластера, но с другими опциями.Kyte, Tom / Expert One-on-One OracleКайт, Том / Oracle для профессионаловOracle для профессионаловКайт, Том© Перевод на русский язык. ООО «ДиаСофтЮП», 2003© Wrox Press Ltd, 2002Expert One-on-One OracleKyte, Tom© Wrox Press Ltd, 2002
Traducciones de usuarios
Aún no hay traducciones del este texto.
¡Sé primero de traducirlo!
Expresiones
hashing addressing
адресация с использованием хеширования или хеш-функций
hashing addressing
хеш-адресация
hashing conflict
конфликт при хешировании
hashing function
хеш-функция
direct-access hashing
прямое хеширование
hashing addressing
хэш-адресация
hashing function
функция расстановки
hashing algorithm
алгоритм перемешивания
direct access hashing
прямое хеширование
hashing table
перемешанная таблица
hashing function
разделительная функция
hash address
хешированный адрес
hash addressing
адресация с использованием хеширования или хеш-функций
hash addressing
хеш-адресация
hash browns
картофельные оладьи
Forma de la palabra
hash
verb
Basic forms | |
---|---|
Past | hashed |
Imperative | hash |
Present Participle (Participle I) | hashing |
Past Participle (Participle II) | hashed |
Present Indefinite, Active Voice | |
---|---|
I hash | we hash |
you hash | you hash |
he/she/it hashes | they hash |
Present Continuous, Active Voice | |
---|---|
I am hashing | we are hashing |
you are hashing | you are hashing |
he/she/it is hashing | they are hashing |
Present Perfect, Active Voice | |
---|---|
I have hashed | we have hashed |
you have hashed | you have hashed |
he/she/it has hashed | they have hashed |
Present Perfect Continuous, Active Voice | |
---|---|
I have been hashing | we have been hashing |
you have been hashing | you have been hashing |
he/she/it has been hashing | they have been hashing |
Past Indefinite, Active Voice | |
---|---|
I hashed | we hashed |
you hashed | you hashed |
he/she/it hashed | they hashed |
Past Continuous, Active Voice | |
---|---|
I was hashing | we were hashing |
you were hashing | you were hashing |
he/she/it was hashing | they were hashing |
Past Perfect, Active Voice | |
---|---|
I had hashed | we had hashed |
you had hashed | you had hashed |
he/she/it had hashed | they had hashed |
Past Perfect Continuous, Active Voice | |
---|---|
I had been hashing | we had been hashing |
you had been hashing | you had been hashing |
he/she/it had been hashing | they had been hashing |
Future Indefinite, Active Voice | |
---|---|
I shall/will hash | we shall/will hash |
you will hash | you will hash |
he/she/it will hash | they will hash |
Future Continuous, Active Voice | |
---|---|
I shall/will be hashing | we shall/will be hashing |
you will be hashing | you will be hashing |
he/she/it will be hashing | they will be hashing |
Future Perfect, Active Voice | |
---|---|
I shall/will have hashed | we shall/will have hashed |
you will have hashed | you will have hashed |
he/she/it will have hashed | they will have hashed |
Future Perfect Continuous, Active Voice | |
---|---|
I shall/will have been hashing | we shall/will have been hashing |
you will have been hashing | you will have been hashing |
he/she/it will have been hashing | they will have been hashing |
Future in the Past Indefinite, Active Voice | |
---|---|
I should/would hash | we should/would hash |
you would hash | you would hash |
he/she/it would hash | they would hash |
Future in the Past Continuous, Active Voice | |
---|---|
I should/would be hashing | we should/would be hashing |
you would be hashing | you would be hashing |
he/she/it would be hashing | they would be hashing |
Future in the Past Perfect, Active Voice | |
---|---|
I should/would have hashed | we should/would have hashed |
you would have hashed | you would have hashed |
he/she/it would have hashed | they would have hashed |
Future in the Past Perfect Continuous, Active Voice | |
---|---|
I should/would have been hashing | we should/would have been hashing |
you would have been hashing | you would have been hashing |
he/she/it would have been hashing | they would have been hashing |
Present Indefinite, Passive Voice | |
---|---|
I am hashed | we are hashed |
you are hashed | you are hashed |
he/she/it is hashed | they are hashed |
Present Continuous, Passive Voice | |
---|---|
I am being hashed | we are being hashed |
you are being hashed | you are being hashed |
he/she/it is being hashed | they are being hashed |
Present Perfect, Passive Voice | |
---|---|
I have been hashed | we have been hashed |
you have been hashed | you have been hashed |
he/she/it has been hashed | they have been hashed |
Past Indefinite, Passive Voice | |
---|---|
I was hashed | we were hashed |
you were hashed | you were hashed |
he/she/it was hashed | they were hashed |
Past Continuous, Passive Voice | |
---|---|
I was being hashed | we were being hashed |
you were being hashed | you were being hashed |
he/she/it was being hashed | they were being hashed |
Past Perfect, Passive Voice | |
---|---|
I had been hashed | we had been hashed |
you had been hashed | you had been hashed |
he/she/it had been hashed | they had been hashed |
Future Indefinite, Passive Voice | |
---|---|
I shall/will be hashed | we shall/will be hashed |
you will be hashed | you will be hashed |
he/she/it will be hashed | they will be hashed |
Future Perfect, Passive Voice | |
---|---|
I shall/will have been hashed | we shall/will have been hashed |
you will have been hashed | you will have been hashed |
he/she/it will have been hashed | they will have been hashed |
hashing
noun
Singular | Plural | |
Common case | hashing | *hashings |
Possessive case | hashing's | *hashings' |