-
-
-
[
Unix_Linux]
uthash.rar
LINUX realize in the next operation on the hash table, such as adding records, search, delete, etc.
-
[
Visual C++ (VC++)]
MD5_1.rar
... . MD5 to 512 groups to deal with the importation of information and each group was also divided into 16 groups of 32 seats, After a series of processing, the output from the algorithm 4 32 subgroups, 4 32 this group will generate a cascade 128 hash value.
-
[
C#(.net)]
GetCRC32(CS).Rar
CRC32-hash algorithm in C# version of the source code. The code is dynamically generated table method.
-
[
Visual C++ (VC++)]
find.rar
... as in your class) in the design of a hash table of names, bringing the average search length ... as the Chinese pinyin form, fill in the hash table to be a total of 30 names ... search length of the upper limit of 2. Hash function with the addition of more than a ...
-
-
[
C/C++]
HashTableinDS.rar
... basic requirements were known as the Chinese name of Chinese pinyin form. Hash Table question Enter the names of a total of 30, you take the average length of a maximum of two. Hash functions with a few exception I stay constructed using pseudo-random ...
-
-
[
Java/JSP]
RFC1994_PPP.rar
... the end-to-end authentication. This paper defines a PPP authentication methods, The method using random "challenge" and the basis for "challenge" and calculated key encryption Hash "responsive" to complete certification.
-
[
C/C++]
Phone book management system.zip
... btree: binary tree search method l_search: linear search method r_search: Recursive half Find Law zcsear: Find a hash collision law o_sear: interpolation search Enhancement Act sort is bubbling method are enhanced for: heaps: HEAPSORT tired binary ...