language:
Find link is a tool written by Edward Betts.Longer titles found: Derived unique key per transaction (view)
searching for Unique key 90 found (125 total)
alternate case: unique key
Select (SQL)
(3,100 words)
[view diff]
no match in snippet
view article
depending on the type of database, where the {unique_key} is greater than {last_val} (the value of the {unique_key} of the last row in the current page) PreviousAdvanced Access Content System (3,060 words) [view diff] case mismatch in snippet view article find links to article
described above) in a one-way encryption scheme (AES-G) to produce the Volume Unique Key (Kvu). The Kvu is used to decrypt the encrypted title keys, and that isLock and key (3,915 words) [view diff] exact match in snippet view article find links to article
a lock/key system where each similarly keyed lock requires the same, unique key. The key serves as a security token for access to the locked area; locksMobile station (286 words) [view diff] exact match in snippet view article find links to article
- is a removable subscriber identification token storing the IMSI, a unique key shared with the mobile network operator and other data. In a mobile phoneSafety (firearms) (4,957 words) [view diff] exact match in snippet view article
a mandatory integral locking mechanisms that must be deactivated by a unique key before the gun can be fired. These integral locking mechanisms are intendedOracle NoSQL Database (2,000 words) [view diff] exact match in snippet view article find links to article
provisioned. NoSQL Database supports tabular model. Each row is identified by a unique key, and has a value, of arbitrary length, which is interpreted by the applicationPush technology (2,447 words) [view diff] exact match in snippet view article find links to article
registered on the server with a unique key (e.g., a UUID). The server then fires the message against the unique key to deliver it to the client via anGeobytes (868 words) [view diff] exact match in snippet view article find links to article
combination of lower and upper case letters to encode email addresses with a unique key. The concept is that CaseKeys software is installed on either the clientCivil Registry and Identification Service of Chile (1,541 words) [view diff] case mismatch in snippet view article find links to article
certificates, death certificates, criminal records, identity cards, passports, Unique Key, vehicle registrations, and inheritance probate for intestate successionMemcached (2,004 words) [view diff] exact match in snippet view article find links to article
data The client would first check whether a Memcached value with the unique key "userrow:userid" exists, where userid is some number. If the result doesProduct activation (1,071 words) [view diff] no match in snippet view article find links to article
modem connection. Upon connection, the serial number was validated. A unique "key" was returned which allowed the program to continue for a trial periodKey-sequenced data set (262 words) [view diff] exact match in snippet view article find links to article
storage system.: 5 Each record in a KSDS data file is embedded with a unique key.: 20 A KSDS consists of two parts, the data component and a separateBackupHDDVD (2,070 words) [view diff] exact match in snippet view article find links to article
and themselves encrypted with another key called the volume unique key. The volume unique key for any disc can be calculated by all authorized devices usingIMS VDEX (1,152 words) [view diff] exact match in snippet view article find links to article
vocabulary has an identifier, title and a list of terms. Each term has a unique key, titles and (optional) descriptions. A term may have nested terms, thusRekeying (712 words) [view diff] exact match in snippet view article find links to article
different length pins in different combinations to create relatively unique key bitting. Most keys have 5 cuts from bow to tip. If a key has 5 cuts, theContent-addressable storage (3,217 words) [view diff] exact match in snippet view article find links to article
content of the file through a cryptographic hash function to generate a unique key, the "content address". The file system's directory stores these addressesSlowly changing dimension (2,405 words) [view diff] exact match in snippet view article find links to article
Type 2 processing, however a row key is included to ensure we have a unique key for each row: We overwrite the Current_State information in the firstLimeWire (3,005 words) [view diff] exact match in snippet view article find links to article
LimeWire has added a key activation, which requires the user to enter the unique key before activating the "Pro" version of the software. This has stoppedSTU-III (1,462 words) [view diff] exact match in snippet view article find links to article
received and sent. When a call "goes secure", the two STU-III's create a unique key that will be used to encrypt just the call being placed. Each unit firstThe Pocket Guide to British Birds (223 words) [view diff] no match in snippet view article find links to article
the Roger Tory Peterson and other guides. It also provides Fitter's unique "key" system for identifying unfamiliar birds, first by plumage (color), thenBitVault (1,391 words) [view diff] exact match in snippet view article find links to article
most efficiently, by using the key, and makes the object available. The unique key is generated from a hash of the data of the object, thus making the systemAssociative array (2,775 words) [view diff] exact match in snippet view article find links to article
mappings operate in both directions: each value must be associated with a unique key, and a second lookup operation takes a value as an argument and looksKSD-64 (581 words) [view diff] exact match in snippet view article find links to article
added (mod 2) to the unique key in the machine, thus leaving it stored in encrypted form. When it is reattached, the unique key in the machine is decryptedDependency injection (3,536 words) [view diff] exact match in snippet view article find links to article
*UserStorage) Get(name string) (user *User, err error) { // assuming 'name' is a unique key query := "SELECT * FROM users WHERE name = $1" if err := us.conn.QueryRow(queryChubb detector lock (1,236 words) [view diff] exact match in snippet view article find links to article
competition to produce a lock that could be opened only with its own unique key. In response, Jeremiah Chubb, who was working with his brother, CharlesDVD-Audio (2,642 words) [view diff] exact match in snippet view article find links to article
key from the MKB, which also is encrypted. The player must use its own unique key to decrypt the MKB. If a DVD-Audio player's decryption key is compromisedRomanian keyboard layout (468 words) [view diff] exact match in snippet view article find links to article
English. Distinct from the QWERTY layout, the Popak keyboard features a unique key arrangement that minimizes finger movement by positioning frequently usedBioNumerics (483 words) [view diff] no match in snippet view article find links to article
individual organisms or samples under study and are characterized by a unique key and by a number of user-defined information fields. Each entry in a database maySDS BASIC (1,574 words) [view diff] no match in snippet view article find links to article
assigns the resulting data to variable A. The system also included a unique "key" system that allowed data to be numbered and then accessed randomly.Cryptographic hash function (6,299 words) [view diff] exact match in snippet view article find links to article
content of the file through a cryptographic hash function to generate a unique key, the "content address". The file system's directory stores these addressesTaurus Model 605 (203 words) [view diff] exact match in snippet view article find links to article
Taurus implemented the inbuilt keylock in 1997; it is activated with a unique key. The firing mechanism incorporates a transfer bar that assures the firingWi-Fi Protected Access (4,730 words) [view diff] exact match in snippet view article find links to article
factory-set bits. WEP used the RC4 algorithm for encrypting data, creating a unique key for each packet by combining a new Initialization Vector (IV) with a sharedCounterpropaganda (2,970 words) [view diff] exact match in snippet view article find links to article
counterpropaganda shares similar traits with propaganda it also consists of unique key elements which define its effective employment. While propaganda messagesDynamic perfect hashing (1,596 words) [view diff] exact match in snippet view article find links to article
static case, we are given a set with a total of x entries, each one with a unique key, ahead of time. Fredman, Komlós and Szemerédi pick a first-level hashRadix tree (2,331 words) [view diff] exact match in snippet view article find links to article
include that the trie only requires one node to be inserted for every unique key stored, making PATRICIA much more compact than a standard binary trieMapReduce (5,480 words) [view diff] exact match in snippet view article find links to article
The framework calls the application's Reduce function once for each unique key in the sorted order. The Reduce can iterate through the values that areCableCARD (3,339 words) [view diff] no match in snippet view article find links to article
slot for the CableCARD and a built-in cable tuner. The card acts like a unique "key" to unlock the channels and services to which the cable customer hasEmail-address harvesting (2,255 words) [view diff] exact match in snippet view article find links to article
recipient's mail client to transmit the recipient's address, or any other unique key, to the spammer's Web site. Users can defend against such abuses by turningAOSS (534 words) [view diff] exact match in snippet view article find links to article
Phase: With both devices connected, the AP generates and transfers a unique key to the client, where an RC4 tunnel is created. The AP creates four SSIDsUnique Population Registry Code (1,097 words) [view diff] case mismatch in snippet view article find links to article
population and of nationals residing abroad; assigning and issuing the Unique Key of Population Register. This Database is registered in the Person SystemEncrypted Title Key (816 words) [view diff] case mismatch in snippet view article find links to article
obtained. The Media Key is combined with the VID (Volume ID) and the Volume Unique Key (KVU) is originated so that the decryption of the Encrypted Title KeySorting algorithm (6,572 words) [view diff] exact match in snippet view article find links to article
the assumption that the key size is large enough that all entries have unique key values, and hence that n ≪ 2k, where ≪ means "much less than". In theCard Wars (1,770 words) [view diff] no match in snippet view article find links to article
faces necessitated lead character designer Andy Ristaino to drew several unique, key frames, colloquially known as "Bert Youn Specials". Ristaino revealedNeverwhere (novel) (1,761 words) [view diff] exact match in snippet view article
who killed her family, for a price. She and her company must retrieve a unique key from the Black Friars and bring it to the angel. The two return to theTor Sørnes (456 words) [view diff] exact match in snippet view article find links to article
recodable keycard lock, where each new hotel guest could have his/her own unique key formed by a pattern of 32 holes in a plastic card. The invention is stillC++17 (1,995 words) [view diff] no match in snippet view article find links to article
2014-11-29. Retrieved 2014-11-15. "N4279: Improved insertion interface for unique-key maps (Thomas Köppe)". Archived from the original on 2015-04-27. RetrievedMedeco (502 words) [view diff] exact match in snippet view article find links to article
also allows 2 different offsets to the pin. The theoretical number of unique key combinations is over two million when using a lock with six pins, sixDigital Equipment Corporation (12,545 words) [view diff] exact match in snippet view article find links to article
copy of every program for the Professional had to be provided with a unique key for the particular machine and CPU for which it was bought. At that timeFirst normal form (2,191 words) [view diff] exact match in snippet view article find links to article
not meet this definition of first normal form are: A table that lacks a unique key constraint. Such a table would be able to accommodate duplicate rows,Music theory (13,666 words) [view diff] exact match in snippet view article find links to article
in Western tonal music is conveniently shown by the circle of fifths. Unique key signatures are also sometimes devised for a particular composition. DuringPriority queue (4,953 words) [view diff] exact match in snippet view article find links to article
make the skip list lock-free. The nodes of the skip list consists of a unique key, a priority, an array of pointers, for each level, to the next nodes andProduct finder (1,776 words) [view diff] exact match in snippet view article find links to article
organizes data into tables (or "relations") of rows and columns, with a unique key for each row. Unlike hierarchical tables such as menu trees, relationalWheel sizing (2,411 words) [view diff] exact match in snippet view article find links to article
standard lug nut on each wheel is replaced with a nut that requires a unique key (typically a computer-designed, rounded star shape) to fit and removeNews server (2,774 words) [view diff] exact match in snippet view article find links to article
particular interest to a transit server are: Message-ID – a globally unique key Newsgroups – a list of one or more newsgroups where the article is intendedControl message (1,326 words) [view diff] exact match in snippet view article find links to article
hierarchies) is done through signed control messages. Each hierarchy has unique key that is guarded by the hierarchy founders (or their successors). MostFuel card (2,657 words) [view diff] exact match in snippet view article find links to article
system where a group of commercial fleets could access a fuel pump with a unique key that tracked solely their gallons through that pump. This technology isCosmos DB (2,164 words) [view diff] exact match in snippet view article find links to article
strings encoded in standard GeoJSON fragments Containers can also enforce unique key constraints to ensure data integrity. Each Cosmos DB container exposesThe Alchemy of Stone (760 words) [view diff] exact match in snippet view article find links to article
technically emancipated, Loharri still holds the literal key to her heart, a unique key needed to wind up her mechanical heart, without which she will deactivateCorrelation attack (2,299 words) [view diff] exact match in snippet view article find links to article
of the generator output. Thus, it may not be possible to identify the unique key to that LFSR. It may be possible to identify a number of potential keysDodge Charger (2005) (9,636 words) [view diff] exact match in snippet view article
(SXT Plus), sport mode calibration, performance-tuned suspension, two unique key fobs with 100th Anniversary Edition jeweled logo on the back side, a customizedBnetd (1,153 words) [view diff] exact match in snippet view article find links to article
process. Connection to battle.net is permitted only with a valid and unique key. Individual keys are regularly disabled by battle.net administrators toHi/Lo algorithm (1,232 words) [view diff] exact match in snippet view article find links to article
self._max_lo = max_lo def generate_key(self) -> int: """Generate a new unique key.""" if self._current_lo >= self._max_lo: self._current_hi = self._get_next_hi()Ulysses Moore (727 words) [view diff] exact match in snippet view article find links to article
Doors of Time spread around the village, and each door requires its own unique key to open it. Once opened, it leads to a distant time and space specificDering Roll (1,075 words) [view diff] exact match in snippet view article find links to article
May 2011. Harris, Stephanie (15 September 2008). "British Library wins unique key to medieval English heraldry". Antiques Trade Gazette. Retrieved 22 MaySender Rewriting Scheme (1,730 words) [view diff] exact match in snippet view article find links to article
the growth of rewritten addresses, since it is sufficient to insert a unique key in the rewritten local part. It also allows for a certain amount of anonymityFirearms regulation in Mexico (6,166 words) [view diff] case mismatch in snippet view article find links to article
Name(s) and last names must match all other documents, and Copy of the Unique Key of Population Registry (Clave Única de Registro de Población - CURP) AnalogousForeach loop (4,147 words) [view diff] no match in snippet view article find links to article
for(id key in d) { NSObject *obj = [d objectForKey:key]; // We use the (unique) key to access the (possibly nonunique) object. NSLog(@"%@", obj); } OCamlNetFlow (3,215 words) [view diff] exact match in snippet view article find links to article
unidirectional sequence of packets that all share seven values which define a unique key for the flow: Ingress interface (SNMP ifIndex) Source IP address DestinationFiat 500 (2007) (15,879 words) [view diff] exact match in snippet view article
wheels with 205/40 R17 tyres, tyre pressure monitoring system, and a unique key cover. The conversion costs £2,500 in the UK. The Abarth 695 70° AnniversarioList of Yu-Gi-Oh! Zexal characters (6,760 words) [view diff] exact match in snippet view article find links to article
the universe, but his dueling skills aren't up to par yet. He wears a unique key called the "Emperor's Key" that is given to him by his traveling parentsElectronic authentication (4,291 words) [view diff] exact match in snippet view article find links to article
or server. A private key is known by the user only. The user shares a unique key with an authentication server. When the user sends a randomly generatedVirtual column (638 words) [view diff] case mismatch in snippet view article find links to article
[GENERATED ALWAYS] AS ( <expression> ) [VIRTUAL | PERSISTENT] [UNIQUE] [UNIQUE KEY] [COMMENT <text>] type is the column's data type expression is the SQLRegistrar (software) (2,263 words) [view diff] exact match in snippet view article
flag. People made inactivate could be made active again at any time. A unique key was used to identify people and this could be any field that the usersElectronic identification (3,611 words) [view diff] exact match in snippet view article find links to article
the birth certificate, including the names of the legal ascendant(s), a unique key of the Population Registry (CURP), a biometric facial recognition photographMedia Key Block (758 words) [view diff] case mismatch in snippet view article find links to article
combined with the VID (Volume ID) and as a result we obtain the Volume Unique Key ( K v u {\displaystyle K_{vu}} ). With the K v u {\displaystyle K_{vu}}Format-preserving encryption (2,991 words) [view diff] exact match in snippet view article find links to article
impossible to use data that has been encrypted with the CBC mode as a unique key to identify a row in a database. FPE attempts to simplify the transitionSmscoin (692 words) [view diff] exact match in snippet view article find links to article
Paraguay, Thailand, and by achieving that finally establishing itself a unique key leader within the mobile payments market. By November 2010 SmsCoin connectedKey ceremony (1,510 words) [view diff] exact match in snippet view article find links to article
usually at least one intermediate root certificate. This “root key” is a unique key that must be generated for secure server interaction with a protectivePhysical unclonable function (4,102 words) [view diff] exact match in snippet view article find links to article
unique strong cryptographic key from the physical microstructure. The same unique key is reconstructed every time the PUF is evaluated. The challenge-responseSystem Locked Pre-installation (1,186 words) [view diff] exact match in snippet view article find links to article
no longer used at all. Instead, a tool is used by the OEM to embed a unique key in each computer's BIOS, making consumer versions of Windows 8 and laterKey2Audio (624 words) [view diff] exact match in snippet view article find links to article
as videos, ringtones, lotteries and the like. The original n-CD is a unique key reserved for just their owners. For this purpose, the user interface forMasking (Electronic Health Record) (1,668 words) [view diff] exact match in snippet view article
random values, changed using the hashing function, or restored with a unique key. Mechanisms as such are expanded on under the following headings. EncryptionTraitor tracing (1,522 words) [view diff] exact match in snippet view article find links to article
"leak". The main concept is that each licensee (the user) is given a unique key which unlocks the software or allows the media to be decrypted. If theList of Go! Princess Pretty Cure episodes (199 words) [view diff] exact match in snippet view article find links to article
overflowing". Hearing rumors that the dorm mother, Shirogane, possesses a unique key herself, Haruka and the others follow her through a secret passagewayThe Blue Kiss (726 words) [view diff] exact match in snippet view article find links to article
and unity among peoples, a wealth to be safeguarded and respected and a unique key resource that can ensure the survival of the planet in its delicate balanceSequence number (360 words) [view diff] exact match in snippet view article find links to article
and act as a link that ensures that each person can be identified by a unique key at all times. A distinction is sometimes made between a sequence numberCircle of thirds (1,040 words) [view diff] exact match in snippet view article find links to article
Coltrane often used a cycle composed of a sequence of major thirds for his unique key changes, hence the namesake for "coltrane changes". His popularity duringIt's Your Lucky Day (1,720 words) [view diff] exact match in snippet view article find links to article
has three doors, the second has two, and the third has one, each with a unique key. It's a time-to-beat elimination; the first player sets a time limit forDodge Challenger (2008) (9,386 words) [view diff] exact match in snippet view article
startup image, sport mode calibration, a performance-tuned suspension, 2 unique key fobs with 100th Anniversary Edition jeweled logo on the backside, a customizedStefan Weinfurter (12,662 words) [view diff] exact match in snippet view article find links to article
1999 and attributed great importance to her. For him, Adelheid "took a unique key role for the Ottonian emperorship and appears virtually as the decisive