切换至中文 Over 1 million code package, 10 million code file free download
  • [Visual Basic (VB)] MapXClip.rar vb+ mapX cutting tool written. GST documents can hash to map png picture
    Category: GIS program Upload User:wuhefu Size:8K
  • [Unix_Linux] uthash.rar LINUX realize in the next operation on the hash table, such as adding records, search, delete, etc.
    Category: Linux-Unix program Upload User:yaohui114 Size:18K
  • [Visual C++ (VC++)] MD5_1.rar ... . MD5 to 512 groups to deal with the importation of information and each group was also divided into 16 groups of 32 seats, After a series of processing, the output from the algorithm 4 32 subgroups, 4 32 this group will generate a cascade 128 hash value.
    Category: Crypt_Decrypt algrithms Upload User:fanhw64 Size:7K
  • [C#(.net)] GetCRC32(CS).Rar CRC32-hash algorithm in C# version of the source code. The code is dynamically generated table method.
    Category: Crypt_Decrypt algrithms Upload User:tinaboss Size:15K
  • [Visual C++ (VC++)] find.rar ... as in your class) in the design of a hash table of names, bringing the average search length ... as the Chinese pinyin form, fill in the hash table to be a total of 30 names ... search length of the upper limit of 2. Hash function with the addition of more than a ...
    Category: Windows Develop Upload User:root68 Size:113K
  • [Java/JSP] HashSHA1String.rar use encryption characters-to preserve password field.
    Category: Crypt_Decrypt algrithms Upload User:xujunmao Size:1K
  • [C/C++] HashTableinDS.rar ... basic requirements were known as the Chinese name of Chinese pinyin form. Hash Table question Enter the names of a total of 30, you take the average length of a maximum of two. Hash functions with a few exception I stay constructed using pseudo-random ...
    Category: Other systems Upload User:xxf9399 Size:2K
  • [Visual C++ (VC++)] ghmmm.rar window hash value reduction tools, anti-De Bruin's very handy
    Category: Windows Kernel Upload User:xllamp Size:10K
  • [Java/JSP] RFC1994_PPP.rar ... the end-to-end authentication. This paper defines a PPP authentication methods, The method using random "challenge" and the basis for "challenge" and calculated key encryption Hash "responsive" to complete certification.
    Category: Windows Develop Upload User:txylqp Size:15K
  • [C/C++] Phone book management system.zip ... btree: binary tree search method l_search: linear search method r_search: Recursive half Find Law zcsear: Find a hash collision law o_sear: interpolation search Enhancement Act sort is bubbling method are enhanced for: heaps: HEAPSORT tired binary ...
    Category: Compiler program Upload User:peter0224 Size:5K