about icon-addNote android4 Answer apple4 icon-appStoreEN icon-appStoreES icon-appStorePT icon-appStoreRU Imported Layers Copy 7 icon-arrow-spined icon-ask icon-attention icon-bubble-blue icon-bubble-red ButtonError ButtonLoader ButtonOk icon-cake icon-camera icon-card-add icon-card-calendar icon-card-remove icon-card-sort chrome-extension-ru chrome-extension-es-mx chrome-extension-pt-br chrome-extension-ru comment comment icon-cop-cut icon-cop-star Cross Dislike icon-editPen icon-entrance icon-errorBig facebook flag flag_vector icon-globe icon-googlePlayEN icon-googlePlayRU icon-greyLoader icon-cake Heart 4EB021E9-B441-4209-A542-9E882D3252DE Created with sketchtool. Info Kebab icon-lamp icon-lampBig icon-learnHat icon-learning-hat Dislike Loup Loup icon-more icon-note icon-notifications icon-pen Pencil icon-play icon-plus-light icon-plus icon-rosie-cut Rune scrollUp Share-icon Shevron-Down Shevron Left Shevron Right sound sound1 sound2 sound3 sound4 sound2 icon-star Swap icon-translate Trash icon-tutor-ellipsis icon-tutor-flip Tutor folder icon icon-tutor-learned icon-twoWayArrow Mezhdunarodny_logotip_VK vk icon-word pen_icon Logo Logo Logo
sin ejemplosSe encuentra en 3 diccionarios

El diccionario inglés-ruso de ciencias informáticas
  • dicts.lingvocomputer_en_ru.description

hashing

хеширование, рандомизация, перемешивание

Telecoms (En-Ru)

hashing

хэширование

Recibe acceso a todos los diccionarios temáticos gratuitos

Ejemplos de los textos

Variations of the searching technique known as hashing have been implemented in many compilers.
Во многих компиляторах реализованы варианты технологии поиска, известной под названием хеширование.
Aho, Alfred V.,Sethi, Ravi,Ullman, Jeffrey / Compilers: Principles, Techniques, and ToolsАхо, Альфред В.,Ульман, Джеффри,Сети, Рави / Компиляторы: принципы, технологии, инструменты
Компиляторы: принципы, технологии, инструменты
Ахо, Альфред В.,Ульман, Джеффри,Сети, Рави
© Addison-Wesley Publishing Company, Inc., 1985
© 2001
© Издательский дом "Вильямс", 2001
Compilers: Principles, Techniques, and Tools
Aho, Alfred V.,Sethi, Ravi,Ullman, Jeffrey
© 2001 by PEARSON EDUCATION NORTH ASIA LIMITED and PEOPLE'S POSTS & TELECOMMUNICATIONS PUBLISHING HOUSE
© 1986
Data is hashed into slots that have the same hashing value.
Данные хешируются в слоты, которые имеют одинаковое значение хеша.
Henderson, Ken / The Guru's Guide to Transact-SQLХендерсон, Кен / Профессиональное руководство по Transact-SQL
Профессиональное руководство по Transact-SQL
Хендерсон, Кен
© ООО «Питер Принт», 2005
© 2000 by Addison-Wesley
The Guru's Guide to Transact-SQL
Henderson, Ken
© 2000 by Addison-Wesley
A password-cracking program can attempt to determine the password (or a substitute for the password) by hashing combinations of letters and numbers using MD4 until it gets a result that matches the hash in Active Directory.
Программа взлома паролей может попытаться определить пароль (или эквивалентную замену), хешируя комбинации букв и цифр по алгоритму MD4, пока не будет получен результат, совпадающий с хешем в базе данных Active Directory.
Boswell, William / Inside Windows Server 2003Бозуэлл, Уилльям / Внутренный мир Windows Server 2003, SP1 и R2
Внутренный мир Windows Server 2003, SP1 и R2
Бозуэлл, Уилльям
© Издательский дом "Вильямс", 2006
© Pearson Education, Inc., 2003
Inside Windows Server 2003
Boswell, William
© 2003 by Pearson Education, Inc.
You'll need to play with the size of the hash table (1,024 in my example) to avoid artificial RESOURCE BUSY messages, due to different strings hashing to the same number.
Нужно "поиграть" с размером хеш-таблицы (в моем примере — 1024), чтобы избежать сообщений RESOURCE BUSY, связанных с получением одного и того же хеш-значения по разным строкам.
Kyte, Tom / Expert One-on-One OracleКайт, Том / Oracle для профессионалов
Oracle для профессионалов
Кайт, Том
© Перевод на русский язык. ООО «ДиаСофтЮП», 2003
© Wrox Press Ltd, 2002
Expert One-on-One Oracle
Kyte, Tom
© Wrox Press Ltd, 2002
Changes to the data structure can be made that will speed up open hashing and allow closed hashing to handle larger sets.
Путем внесения изменений в структуру данных можно изменять объем пространства, за нимаемого данными при открытом хеширование, и увеличить его при закрытом хешировании.
Ахо, Альфред В.,Ульман, Джеффри,Хопкрофт, Джон / СтруктурыAho, Alfred V.,Ullman, Jeffrey,Hopcroft, John / Data Structures and Algorithms
Data Structures and Algorithms
Aho, Alfred V.,Ullman, Jeffrey,Hopcroft, John
© Addison-Wesley Publishing Company, Inc
Структуры
Ахо, Альфред В.,Ульман, Джеффри,Хопкрофт, Джон
© Издательский дом "Вильямс", 2000
© Addison-Wesley Publishing Company, Inc
© 2000
Since the hashing scatters the elements around in the table, they are visited in seemingly random order.
Поскольку при создании ключей элементы добавляются не упорядоченно, то их обход происходит в случайном порядке.
Horstmann, Cay S.,Cornell, Gary / Core Java™ 2. Volume II - Advanced FeaturesХорстманн, Кей С.,Корнелл, Гари / Java 2. Том II. Тонкости программирования
Java 2. Том II. Тонкости программирования
Хорстманн, Кей С.,Корнелл, Гари
© Издательский дом "Вильямc", 2002
© Prentice Hall, Inc., 2002
Core Java™ 2. Volume II - Advanced Features
Horstmann, Cay S.,Cornell, Gary
© 2002 Sun Microsystems, Inc.
The user password can be used as the key for decrypting the container description either directly or in the hashing form.
В качестве ключа для расшифровки описания контейнера может быть использован пароль пользователя непосредственно или в хешированном виде.
It was all my parents could talk about lately, incessantly hashing and rehashing the reasons why my sister and Kyle—already in their thirties and with four years of marriage behind them—had yet to reproduce.
Родители в последнее время только об этом и говорили, то так, то эдак прикидывали, почему у сестры и Кайла – ведь им уже за тридцать и они женаты четыре года – все еще нет детей.
Weisberger, Lauren / Devil Wears PradaВайсбергер, Лорен / Дьявол носит "Prada"
Дьявол носит "Prada"
Вайсбергер, Лорен
© Lauren Weisberger, 2002
© 2006 Fox "Devil Wears Prada" TM © All Rights Reserved
© ООО Издательство "АСТ МОСКВА", 2009
Devil Wears Prada
Weisberger, Lauren
© 2003 by Lauren Weisberger
To avoid this, we use a form of hashing.
Для того чтобы избежать этого, применим хеширование.
Manning, Christopher D.,Raghavan, Prabhakar,Schuetze, Hinrich / An Introduction to Information Retrieval. Part3Маннинг, Кристофер,Рагхаван, Прабхакар,Шютце, Хайнрих / Введение в информационный поиск. Часть 3
Введение в информационный поиск. Часть 3
Маннинг, Кристофер,Рагхаван, Прабхакар,Шютце, Хайнрих
© Издательский дом "Вильямс", 2011
© Cambridge University Press, 2008
An Introduction to Information Retrieval. Part3
Manning, Christopher D.,Raghavan, Prabhakar,Schuetze, Hinrich
© 2009 Cambridge UP
The simple hashing function of Fig. 4.11 may treat certain sets of inputs, such as the consecutive strings in Example 4.5, in a nonrandom manner.
В приведенном примере хеш-функция распределяет элементы исходного множества по множеству сегментов не равномерно.
Ахо, Альфред В.,Ульман, Джеффри,Хопкрофт, Джон / СтруктурыAho, Alfred V.,Ullman, Jeffrey,Hopcroft, John / Data Structures and Algorithms
Data Structures and Algorithms
Aho, Alfred V.,Ullman, Jeffrey,Hopcroft, John
© Addison-Wesley Publishing Company, Inc
Структуры
Ахо, Альфред В.,Ульман, Джеффри,Хопкрофт, Джон
© Издательский дом "Вильямс", 2000
© Addison-Wesley Publishing Company, Inc
© 2000
Hashing means a variation of encryption without possibility for decryption (one-way encryption).
Хеширование - разновидность шифрования без возможности расшифровки (однонаправленное шифрование).
Hashing was invented to speed things up.
Хеширование было придумано как раз для того, чтобы ускорить поиск.
Graham, Ronald L.,Knuth, Donald E.,Patashnik, Oren / Concrete Mathematics: A Foundation for Computer ScienceГрэхем, Р.,Кнут, Д.,Паташник, О. / Конкретная математика. Основание информатики
Конкретная математика. Основание информатики
Грэхем, Р.,Кнут, Д.,Паташник, О.
© 1994, 1989 by Addison-Wesley Publishing Company, Inc.
© перевод, В. В. Походзей, А.В. Ходулёв, 1998
Concrete Mathematics: A Foundation for Computer Science
Graham, Ronald L.,Knuth, Donald E.,Patashnik, Oren
© 1989 by Addison-Wesley Publishing Company
Hashing is an especially good candidate for probabilistic analysis, because it is an extremely efficient method on the average, even though its worst case is too horrible to contemplate.
Хеширование особенно подходит для вероятностного анализа, поскольку метод хеширования исключительно эффективен в среднем, хотя его наихудший случай просто ужасен.
Graham, Ronald L.,Knuth, Donald E.,Patashnik, Oren / Concrete Mathematics: A Foundation for Computer ScienceГрэхем, Р.,Кнут, Д.,Паташник, О. / Конкретная математика. Основание информатики
Конкретная математика. Основание информатики
Грэхем, Р.,Кнут, Д.,Паташник, О.
© 1994, 1989 by Addison-Wesley Publishing Company, Inc.
© перевод, В. В. Походзей, А.В. Ходулёв, 1998
Concrete Mathematics: A Foundation for Computer Science
Graham, Ronald L.,Knuth, Donald E.,Patashnik, Oren
© 1989 by Addison-Wesley Publishing Company
For example, it would be disastrous if one thread tried to add to a hash table while another thread is rehashing the elements.
Например, если один поток пытается добавить элемент в хэш-таблицу, а другой в это же время пытается генерировать новые ключи, это неизбежно приведет к сбою.
Horstmann, Cay S.,Cornell, Gary / Core Java™ 2. Volume II - Advanced FeaturesХорстманн, Кей С.,Корнелл, Гари / Java 2. Том II. Тонкости программирования
Java 2. Том II. Тонкости программирования
Хорстманн, Кей С.,Корнелл, Гари
© Издательский дом "Вильямc", 2002
© Prentice Hall, Inc., 2002
Core Java™ 2. Volume II - Advanced Features
Horstmann, Cay S.,Cornell, Gary
© 2002 Sun Microsystems, Inc.
When you create a hash cluster, you will use the same CREATE CLUSTER statement you used to create the index cluster with different options.
При создании хеш-кластера используется тот же оператор CREATE CLUSTER, что и при использовании индексного кластера, но с другими опциями.
Kyte, Tom / Expert One-on-One OracleКайт, Том / Oracle для профессионалов
Oracle для профессионалов
Кайт, Том
© Перевод на русский язык. ООО «ДиаСофтЮП», 2003
© Wrox Press Ltd, 2002
Expert One-on-One Oracle
Kyte, Tom
© Wrox Press Ltd, 2002

Añadir a mi diccionario

hashing1/3
хеширование; рандомизация; перемешивание

Traducciones de usuarios

Aún no hay traducciones del este texto.
¡Sé primero de traducirlo!

Expresiones

hashing addressing
адресация с использованием хеширования или хеш-функций
hashing addressing
хеш-адресация
hashing conflict
конфликт при хешировании
hashing function
хеш-функция
direct-access hashing
прямое хеширование
hashing addressing
хэш-адресация
hashing function
функция расстановки
hashing algorithm
алгоритм перемешивания
direct access hashing
прямое хеширование
hashing table
перемешанная таблица
hashing function
разделительная функция
hash address
хешированный адрес
hash addressing
адресация с использованием хеширования или хеш-функций
hash addressing
хеш-адресация
hash browns
картофельные оладьи

Forma de la palabra

hash

verb
Basic forms
Pasthashed
Imperativehash
Present Participle (Participle I)hashing
Past Participle (Participle II)hashed
Present Indefinite, Active Voice
I hashwe hash
you hashyou hash
he/she/it hashesthey hash
Present Continuous, Active Voice
I am hashingwe are hashing
you are hashingyou are hashing
he/she/it is hashingthey are hashing
Present Perfect, Active Voice
I have hashedwe have hashed
you have hashedyou have hashed
he/she/it has hashedthey have hashed
Present Perfect Continuous, Active Voice
I have been hashingwe have been hashing
you have been hashingyou have been hashing
he/she/it has been hashingthey have been hashing
Past Indefinite, Active Voice
I hashedwe hashed
you hashedyou hashed
he/she/it hashedthey hashed
Past Continuous, Active Voice
I was hashingwe were hashing
you were hashingyou were hashing
he/she/it was hashingthey were hashing
Past Perfect, Active Voice
I had hashedwe had hashed
you had hashedyou had hashed
he/she/it had hashedthey had hashed
Past Perfect Continuous, Active Voice
I had been hashingwe had been hashing
you had been hashingyou had been hashing
he/she/it had been hashingthey had been hashing
Future Indefinite, Active Voice
I shall/will hashwe shall/will hash
you will hashyou will hash
he/she/it will hashthey will hash
Future Continuous, Active Voice
I shall/will be hashingwe shall/will be hashing
you will be hashingyou will be hashing
he/she/it will be hashingthey will be hashing
Future Perfect, Active Voice
I shall/will have hashedwe shall/will have hashed
you will have hashedyou will have hashed
he/she/it will have hashedthey will have hashed
Future Perfect Continuous, Active Voice
I shall/will have been hashingwe shall/will have been hashing
you will have been hashingyou will have been hashing
he/she/it will have been hashingthey will have been hashing
Future in the Past Indefinite, Active Voice
I should/would hashwe should/would hash
you would hashyou would hash
he/she/it would hashthey would hash
Future in the Past Continuous, Active Voice
I should/would be hashingwe should/would be hashing
you would be hashingyou would be hashing
he/she/it would be hashingthey would be hashing
Future in the Past Perfect, Active Voice
I should/would have hashedwe should/would have hashed
you would have hashedyou would have hashed
he/she/it would have hashedthey would have hashed
Future in the Past Perfect Continuous, Active Voice
I should/would have been hashingwe should/would have been hashing
you would have been hashingyou would have been hashing
he/she/it would have been hashingthey would have been hashing
Present Indefinite, Passive Voice
I am hashedwe are hashed
you are hashedyou are hashed
he/she/it is hashedthey are hashed
Present Continuous, Passive Voice
I am being hashedwe are being hashed
you are being hashedyou are being hashed
he/she/it is being hashedthey are being hashed
Present Perfect, Passive Voice
I have been hashedwe have been hashed
you have been hashedyou have been hashed
he/she/it has been hashedthey have been hashed
Past Indefinite, Passive Voice
I was hashedwe were hashed
you were hashedyou were hashed
he/she/it was hashedthey were hashed
Past Continuous, Passive Voice
I was being hashedwe were being hashed
you were being hashedyou were being hashed
he/she/it was being hashedthey were being hashed
Past Perfect, Passive Voice
I had been hashedwe had been hashed
you had been hashedyou had been hashed
he/she/it had been hashedthey had been hashed
Future Indefinite, Passive Voice
I shall/will be hashedwe shall/will be hashed
you will be hashedyou will be hashed
he/she/it will be hashedthey will be hashed
Future Perfect, Passive Voice
I shall/will have been hashedwe shall/will have been hashed
you will have been hashedyou will have been hashed
he/she/it will have been hashedthey will have been hashed

hashing

noun
SingularPlural
Common casehashing*hashings
Possessive casehashing's*hashings'