英语人>词典>汉英 : 凑 的英文翻译,例句
凑 的英文翻译、例句

词组短语
happen by chance
更多网络例句与凑相关的网络例句 [注:此内容来源于网络,仅供参考]

"Population figures are rounded to the nearest 100 while percentages are rounded to 1 decimal place and percentages are derived from the corresponding unrounded figures.

"1。",人口数目均整至最接近的百位数,百分率是由未进位的相关数字衍生而经过四舍五入的整至一个小数位。

The proposed HAGA method considerably improves the execution efficiency by accessing the fitness values of the searched solutions saved a priori in a hashing table during the optimization process.

本文所提出之杂基因演算法能够在最佳化搜寻过程中,将已搜寻过的解之适应值预先储存於杂表中以提供后续演化过程中资料之存取,因而大幅地改善基因演算法之执行效能。

In the combined approach, the HAGA determines the optimal displacement ratios and number of fictitious charges used in CSM, and then obtains the optimal contour design of support insulators to minimize and uniform the tangential electric field along the dielectric boundary.

在此复合式方法中,杂基因演算法先用来决定电荷模拟法中之假想电荷与配置比之最佳值;然后再用杂基因演算法来获得支持碍子之最佳化外型,以便能够将支持碍子介质边界上之切线电场强度分布均匀化且最小化。

Changing the title, even by a single letter, will change most of the digits in the hash code.

值也被称为杂码、杂结果、消息摘要或数字指纹。

A primary motivation for cryptographic hash functions is that they serve as compact representative images of input messages, which they can uniquely identify. For example, the MD5 hash code "72c067b50c90837c95186d019f686700" can be looked on as the "fingerprint" to represent this thesis title uniquely.

密码学杂函数也称Hash函数、哈希函数或单向散列函数,它可以将任意长度的消息压缩到固定长度的杂值。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure. Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis ofOCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂函数和动态Merkle杂树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

The security of PKI system itself is especially emphasized during the system design and implementation process, which is in accordance with the pervasive characteristic of PKI. Second, the concept of a Trusted Key Management Center is introduced for the first time. This technology greatly strengthens key management practices and allows for smooth transition from PKI to Key Management Infrastructure . Third, certificate status mechanisms are investigated in depth, and a certificate revocation performance simulation system is devised. All these work will provide guides to practice and employment of PKI applications. Based on time constraints, a new taxonomy for authenticated dictionaries is proposed. Fourth, formal analysis of OCSP protocol is carried out; then an efficient and scalable OCSP system is developed. Fifth, the special requirements caused by the working environments of Wireless PKI are analyzed. Based on communicative hashing and dynamic Merkle hash tree, an efficient certificate status validation method suitable for WPKI is presented. Sixth, one important kind of fair exchange protocols is studied, and a new CEMBS based on RSA cryptosystem is proposed. Afterwards, a novel fair exchange protocol totally based on RSA signature scheme is devised.

在系统设计和实现的过程中,考虑到PKI作为普适性安全基础平台的特点,特别强调PKI系统自身的安全性;第二,首次在PKI系统的设计中提出了"可信密钥管理中心"的概念,这一独特设计大大地强化了密钥管理功能的实施,为PKI向密钥管理基础设施的平滑过渡提供了良好的技术准备;第三,对证书状态验证机制进行了深入研究,设计了证书状态模拟系统,以指导PKI系统和应用的部署和实施;在此基础上,基于时间约束首次给出了认证字典的一种新的分类方法;第四,对OCSP协议进行了形式化分析,设计和实现了一种高效、可扩展的OCSP系统;第五,分析了WPKI工作环境对设计安全基础平台提出的特殊要求,结合无线移动设备的具体特点,基于可交换杂函数和动态Merkle杂树设计出了一种适用于WPKI环境的高效证书状态查询机制;第六,对一类公平交换协议进行了深入的研究,从设计公平交换协议的密码基础结构出发,提出了一种新型的基于RSA密码体制的高效CEMBS;在此工作的基础上,设计了一种基于RSA密码体制的最优化公平交换协议。

At the same time, Biham gave an attack on 40-step SHA-1[6] and Joux improved upon the results of Biham and Chen[5] by presenting practical collisions in SHA-0 [24].The most important result is the break of MD5 by Xiaoyun Wang and Hongbo Yu.

比特追踪法是现今分析MD4系列杂函数所使用的最为广泛有效的方法,它的技术细节在2005年欧密会上公开,是破解包含MD5和SHA-1在内的多数MD4系列杂算法的理论基础。

Whilst Toumani was driving he told me that this was one of the oldest and best loved songs of the Mande repertoire, which dates back to the twelfth century, called Mali Sajio.

这次正好,由于遇到了疯狂的促销,为了满那么多数额而突破原先1元1张的底线,我心中惴惴地拿了这张了个数。

According to home in the past to filter the tricolors of low-temperature disperse red 3B, dispersing yellow blue RGEL 2BLN and decentralized; and now filtered disperse decentralized low-temperature, the red yellow E-3R, brilliant blue E-4R E-4B, improvements to the content of the tricolors of dyes and include black, several dyes, makes it easy with all kinds of chromategraphy, the amount of dye to the content of the factory is reduced to a minimum.

根据国边畴前筛选不入的不矮温型纷歧原色拢赤3B、拢蓝2BLN和拢黄RGEL;和不隐在筛选的舶来拢染料不矮温型拢黄E-3R,赤E-4B,素蓝E-4R,工场只给储备纷歧原色染料和包含白色在边的几栽染料,可以很便当配不入各栽色谱,使工场染料储备度降至最矮节制。

更多网络解释与凑相关的网络解释 [注:此内容来源于网络,仅供参考]

hash algorithm:杂凑算法

Hash Addressing 杂乱寻址法 | hash algorithm 杂算法 | hash multiset 杂多重集

hash table:杂凑表

编写一个杂表(hash table)类编写一个杂表(hash table)类,以字符串作为关键字存放和查找记录.提供公共成员函数进行杂表的记录插入,查询和删除.

hash function:杂凑函数

指属于同一配对密码匙;"储存库"(repository)指用作储存及检索证书及其他与证书有关的资讯系统;"杂函数"(hash function)指将一串数元配对或转换成为另一串定为杂结果的数元的算法,

hashing function:杂凑函数

此种函数,一般称之为杂函数(Hashing function)或键值对应位址转换(key to address transformation). 对於有限的储存空间,能够有效使用且在加入或删除时也能快的完成,利用杂法是最适当不过了. 因为杂表搜寻在没有碰撞(collision)及溢位(overflow)的情况下,

hashing:杂凑

(hashing)是存储表数据一种可选择的方法,用以改进数据检索的性能.要使用杂,就要建立杂聚集,将表装入 到该聚集.在骠聚集中的表行根据杂函数的结果进行物理学存储和检索.杂函数用于生成一个数值的分布,

random rehash:随机再杂凑

随机读取 random read | 随机再杂 random rehash | 随机再杂法 random rehash method

random rehash method:随机再杂凑法

随机再杂 random rehash | 随机再杂法 random rehash method | 随机再杂技术 random rehash technique

I could scrape together a thousand dollars:凑一凑大概有一千美金

In fact, baby, the money is right, I can take you to Chechnya.|说实... | I could scrape together a thousand dollars.|大概有一千美金 | Honey, for a thousand dollar we take you to Starbucks.|小甜心,...

send round the hat:[口]募捐, 凑钱物(指为帮助生活困难的人)

pass round the hat [口]募捐, 钱物(指为帮助生活困难的人) | send round the hat [口]募捐, 钱物(指为帮助生活困难的人) | put this in your hat [美俚]你认真想吧; 记住这一点吧

serendipity element:巧凑边点元

拉格朗日族 Lagrange family | 巧边点元 serendipity element | 巧边点族 serendipity family