Примери коришћења Hash functions на Енглеском и њихови преводи на Српски
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Latin
-
Cyrillic
Having two hash functions and, therefore, two possible locations for any one value,
Hash functions are an essential ingredient of the Bloom filter,
There must also be k different hash functions defined, each of which maps or hashes some set element to one of the m array positions with a uniform random distribution.
can be used for other purposes than clue hash functions.
I mean, cryptographic algorithms and hash functions, and people called miners,
For larger m and/or k, independence among the hash functions can be relaxed with negligible increase in false positive rate(Dillinger& Manolios(2004a), Kirsch& Mitzenmacher(2006)).
including encryption, hash functions, digital signatures,
Continuity is desirable for hash functions only in some applications, such as hash
Although there are instances where bucket sizes happen to be large based on the values and the hash functions used, this is rare.
They mention savings of 98% of memory in the case of using one hash function(175 MB to 3 MB) and 92% when two hash functions are used(13 MB).
And the realization is that we need more than just generic block ciphers and generic hash functions.
including encryption, hash functions, digital signatures,
NIST added three additional hash functions in the SHA family.
A perfect hash function has many of the same applications as other hash functions, but with the advantage that no collision resolution has to be implemented.
in FIPS PUB 180-4, adding the hash functions SHA-512/224 and SHA-512/256,
uniformly and independently selecting two universal hash functions h 1{\displaystyle h_{1}} and h 2{\displaystyle h_{2}} to build a double
while after 2010 must use a family of hash functions SHA-2 for these uses"(emphasis in original).
Hash functions can also be used to locate table records whose key is similar,
will result in statement 5 being executed more often than other more sophisticated rolling hash functions such as those discussed in the next section.
must use the SHA-2 family of hash functions for these applications after 2010".