pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the inputs are visually or auditorily similar. As a result, perceptual hashes must also be robust enough to take into account transformations that could have been performed on the input.
资源简介:pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of an audio, video, or image file that is mathematically based on the audio or visual content contained within. Unlike cryptographic has...
上传时间: 2013-12-08
上传用户:星仔
资源简介:CKHash is an implementation of Cuckoo Hashing that can receive the input in the form of strings directly
上传时间: 2013-12-25
上传用户:dapangxie
资源简介:This is an implementation of double-array structure for representing trie, as proposed by Junichi Aoe [1]. Trie is a kind of digital search tree, an efficient indexing method with O(1) time complexity for searching. Comparably as effic...
上传时间: 2013-12-10
上传用户:shinesyh
资源简介:Libgist is an implementation of the Generalized Search Tree, a template index structure that makes it easy to implement any type of hierarchical access method (AM).
上传时间: 2013-11-26
上传用户:chenxichenyue
资源简介:Here is an implementation of UserCollectionType that returns a fast set. As you are looking below, note how much possibility there is for common subclasses that provide custom set/list/map implementations:
上传时间: 2015-05-27
上传用户:franktu
资源简介:this program, opticalflow.c, is an implementation of Uras et al. 1988 s motion
上传时间: 2014-12-02
上传用户:busterman
资源简介:This program is an implementation of a part of one or more MPEG-4 Video tools as specified in ISO/IEC 14496-2 standard.
上传时间: 2015-11-02
上传用户:myworkpost
资源简介:this a pack include source code for quartus 2. It is an implementation of the LC2. The LC-2 computer is described in Introduction to Computing Systems from Bits & Gates to C & Beyond by Yale Patt and Sanjay Patel, McGraw Hill, 2001. The ...
上传时间: 2013-12-25
上传用户:坏坏的华仔
资源简介:xl2tpd is an implementation of the Layer 2 Tunnelling Protocol (RFC 2661). L2TP allows you to tunnel PPP over UDP. Some ISPs use L2TP to tunnel user sessions from dial-in servers (modem banks, ADSL DSLAMs) to back-end PPP servers. Anothe...
上传时间: 2014-01-20
上传用户:Altman
资源简介:DYMOUM is an implementation of the DYMO (Dynamic Manet On-demand) routing protocol both for Linux kernel and ns2 network simulator, written in C and C++.
上传时间: 2016-11-07
上传用户:tianyi223