您要查找的是不是:
- Based on ciphertext index and aiming at practical application on encrypted database,the paper designs a new ciphertext index by combining binary tree ciphertext index with B+ tree index. 在密文索引的基础上,针对实际密文数据库的应用,将二叉树密文索引和B+树索引相结合,设计了一种新的密文索引,并介绍了其查询方法,分析了其查询效率及安全性
- binary tree ciphertext index 密文二叉树索引
- Visual SEEK system developed by Columbia university, this system construct index with binary tree algorithm and retrieval based on spatial information. 哥伦比亚大学开发的VisualSeek系统,采用了二进树算法构造索引,支持空间位置关系的查询。
- Write a function to find the depth of a binary tree. 写个程序找到一个二叉树的深度。
- And above the level established by the binary tree traversal. 并对上面建立的二叉树按层次遍历。
- The point is that polygons are stored in a binary tree. 多边形是以点的形式在二叉树中存储的。
- The multiclass SVM methods based on binary tree are proposed. 摘要提出一种新的基于二叉树结构的支持向量(SVM)多类分类算法。
- According to the characters of the ciphertext database, the major factors to create a ciphertext index are analyzed. 根据加密数据库的特点,分析了建立密文索引需要考虑的主要因素。
- The model is a generalization of conventional binary tree algorithm. 模型是传统的二元树形算法的推广。
- Using Binary tree to save the text in sepecific file and catalogue, Delphi. 用二叉树的算法对指定目录下的文件和目录以格式化的方法保存。
- Aiming at the data secrecy problem in database, we have analyzed some present encryption mechanism and put forward a new query method based on ciphertext index. 针对数据库中数据的保密性问题,分析了目前已有的一些加密机制,提出了一种基于密文索引的新的查询方法。
- How would you print out the data in a binary tree, level by level, starting at the top? 你将怎样以水平打印二叉树数据,水平,在顶开始?
- For some purposes a binary tree is the best solution, but usually the simpler linked list is the obvious choice. 对于某些情况,二叉树是最佳选择,但在通常情况下,更简单的链表是显而易见的选择。
- To maintain high generalization ability, the most widespread class should be separated at the upper nodes of a binary tree. 为了获得较高的推广能力,必须让样本分布广的类处于二叉树的上层节点,才能获得更大的划分空间。
- A single feature is used to partition the set of training vectors at each nonterminal node of the binary tree. 使用分词独立结构代替状语从句或并列分句;
- Hypercuboid and hypersphere class least covers are used to be rules of constructing binary tree. 所以,该算法采用最小超立方体和最小超球体类包含作为二叉树的生成算法。
- The article presents the recursive and non-recursive algorithms of postorder-traversing binary tree. 摘要本文论述了后序遍歴二叉树的递归算法和非递归算法。
- The binary tree consists of a single-root node and a set of terminal and nonterminal nodes. 介词十动名词短语代替定语从句或状语从句。
- Then identity-based binary tree encryption scheme is constructed.As a result, a concrete IBE-NIKU is given. 基于已有的二叉树加密构造了基于身份的二叉树加密方案及非交互式密钥更新的基于身份加密方案;
- Ciphertext index mechanism for database system 数据库的密文索引机制