-
-
-
-
RFID-y.rar
A Security and Performance Evaluation of Hash-based RFID Protocols
-
-
-
md5.zip
md5源码。根据md5算法,用C++实现对一个字符串的hash,输出32为十六进制字符。
-
-
-
Introduction-to-data-compression.zip
... is that the algorithms used in the real world make heavy use of a wide set of algorithmic tools, including sorting, hash tables, tries, and FFTs. Furthermore, algorithms with strong theoretical foundations play a critical role in real-world applications.
-
os.rar
网络通信过程中,服务器必然提供监听socket响应客户端连接请求,也必然提供连接socket与客户端进行交互。一台主机上有不止一个的socket服务器,如ftp、telnet服务器等,他们初始都处于监听状态,等待连接请求的到来。linux中为了管理这两类socket提供了两个哈希链表:tcp_listening_hash和tcp_ehash,下面主要分析下监听哈希表,顺带说下连接hash表。
-