search for: keyspac

Displaying 5 results from an estimated 5 matches for "keyspac".

Did you mean: keyspace
2008 Aug 15
3
AstDB/Berkely DB - Hash function? Balanced-Tree? b-Tree? Linked List?
Does anyone know enough about the implementation of AstDB to know whether the data structure is a Hash function, a Balanced-Tree, a b-Tree, or a Linked List? I'm trying to estimate the lookup 'cost' of a AstDB with around 160,000 keys? Obviously I already know that it WILL WORK, but the question is whether the data structure is optimal in the Berkeley DB AS IMPLEMENTED in Asterisk.
2013 Jun 26
6
[RFC] Proposed XenStore Interactions for Multi-Queue VIFs
...expensive to compute, however. - Event channels are on a per-queue basis. - Split event channels may be used for some (or all) queues, again on a per-queue basis, selected by the presence of tx-event-channel, rx-event-channel keys in each queue''s keyspace. - Single event channel (per queue) is selected by the presence of the event-channel key in the queue''s keyspace. - There is no plan to support a single event channel for all queues, at present. This may be considered in the future to reduce the de...
2007 Oct 01
2
Custom password encryption scheme, how to do it?
Hi all, I'm a fairly recent convert to Dovecot/Postfix from Sendmail, so please be gentle (and assume I know nothing). :) I've got a Postfix/Dovecot/PostgreSQL setup with a custom DB schema for my email. This database is also used for a bigger program I use for all my hosting needs (domains, etc.). Currently, I've set it up to use plain-text authentication while I was
2006 Jul 17
2
Very strange after_save problem. Please help.
I have a very strange problem here. I do not get this. So any help is greatly appreciated. Basically I have a model that calls a method in the background process in the "after_save" method. Let''s call the model products. So what happens is this: 1. I create a new product. 2. Everything works and the product is saved with id 13. 3. A method is called in my background
1998 May 30
9
"Flavors of Security Through Obscurity"
This was posted not too long ago on sci.crypt... Enjoy... I think the most relevant information is near the top, but it''s all quite good... :-) -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- There is no intrinsic difference between algorithm and data, the same information can be viewed as data in one context and as algorithm in another. Why then do so many people claim that encryption algorithms