2011年8月28日
摘要: 这里面提出了一个常见的错误,要注意http://www.bpsky.net/t/android%20md5%20%E5%8A%A0%E5%AF%86%E5%AD%97%E7%AC%A6%E4%B8%B2.htmlJava MD5 Hashing ExampleMD5 is one in a series of message digest algorithms designed by Professor Ronald Rivest of MIT (Rivest, 1994). When analytic work indicated that MD5′s predecessor MD4 was 阅读全文
posted @ 2011-08-28 11:56 阿笨猫 阅读(4387) 评论(0) 推荐(0) 编辑
摘要: http://martinbroadhurst.com/Consistent-Hash-Ring.htmlConsistent Hash Ring Introduction Consistent hashing was first described in a paper, Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web (1997) by David Karger et al. It is used in distr 阅读全文
posted @ 2011-08-28 11:51 阿笨猫 阅读(1798) 评论(0) 推荐(0) 编辑
摘要: http://amix.dk/blog/post/19367I have implemented consistent hashing in Python. The module is calledhash_ringand you can get it right away. This post will explain the motivation behind the project and details. I think other languages such as Ruby can reuse my code since it's fairly simple :-)To i 阅读全文
posted @ 2011-08-28 11:50 阿笨猫 阅读(4983) 评论(0) 推荐(0) 编辑