About 33,400 results
Open links in new tab
  1. terminology - What exactly (and precisely) is "hash?" - Computer ...

    Apr 5, 2016 · Typically it is correct to say that the output of a hash function is a hash (aslo known as a hash value or a hash sum). However, sometimes people refer to the function itself as a …

  2. What exactly is a hash function? - Computer Science Stack Exchange

    The main difference between hash functions and pseudorandom number generators is that a hash function gives a unique value for each input. This is important for applications such as …

  3. Hash size: Are prime numbers "near" powers of two a poor choice …

    This answer possibly explains why choosing M(table size) equal to a power of 2 should be avoided.. Prime numbers that are too close to a power of 2 will provide the same kind of …

  4. hash tables - Number of probes in a successful search in open …

    Mar 17, 2021 · Given an open-address hash table with $\alpha$ < 1, the expected number of probes in a successful search is at most $\frac{1}{\alpha}\ln\frac{1}{1-\alpha}$ I read this in a …

  5. 到底什么是哈希值,哈希值到底是怎么生成的,有什么用? - 知乎

    hash值是通过一个计算函数把难以比较的字符串或者其他类型的数据映射成一个整数,最常用的就是映射a~z的hash值,变成hash[(str(i)-‘a’]这个数是一个十进制数,这个十进制数把它映射到0 …

  6. hash - What would happen SHA-256 collision were to be found?

    Nov 14, 2023 · As far as I and this wikipedia page know, there are no collisions (2 inputs with the same output) found in SHA-256 (yet). what would happen if a collision were to be found, 1. …

  7. Hash tables versus binary trees - Computer Science Stack Exchange

    In particular, if you're going to need the order on the keys, for example if you want to be able to list the keys in alphabetical order, then hash tables are no help (you'll need to sort them), whereas …

  8. hash - Optimal parameters for a Bloom filter - Computer Science …

    Feb 11, 2022 · Thus, no matter what I do, with 256-bits hash functions I cannot reduce the probability even below 99%! What can I do? Is the Bloom filter useless in my case? I was …

  9. Resizing hashmaps and compression functions for hash codes

    I am trying to implement a hash table for string keys as part of a university project. I was able to make a basic, working implementation without major issues. I am now trying to optimize the …

  10. hash - Do passwords need a max length? - Computer Science …

    Jul 26, 2023 · Hash algorithms are designed to produce a practically random output, so for a 24-byte (192-bit) hash, you'd need on the order of $ 2^{96} $ or $ 10^{30} $ inputs to have an …

Refresh