DictionaryForumContacts

   English
Terms containing algorithm | all forms | exact matches only
SubjectEnglishPolish
automat.algorithm flow chartschemat blokowy algorytmiczny
automat.algorithm flow diagramschemat blokowy algorytmiczny
automat.algorithm performancezadziałanie algorytmu
comp., MSasymmetric algorithmalgorytm asymetryczny (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
comp., MSasymmetric key algorithmalgorytm kluczy asymetrycznych (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
math.BACON algorithmalgorytm BACON
tech., law, el.continuous trading matching algorithmalgorytm handlu ciągłego
comp., MScryptographic algorithmalgorytm kryptograficzny (A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both)
math.EM algorithmalgorytm EM
math.estimation-maximisation algorithmalgorytm EM
math.estimation-maximization algorithmalgorytm EM
comp., MShash algorithmalgorytm wyznaczania wartości skrótu (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1)
comp., MSMicrosoft Sequence Clustering algorithmalgorytm grupowania sekwencji firmy Microsoft (Algorithm that is a combination of sequence analysis and clustering, which identifies clusters of similarly ordered events in a sequence. The clusters can be used to predict the likely ordering of events in a sequence based on known characteristics)
comp., MSMicrosoft Time Series algorithmalgorytm serii czasowych firmy Microsoft (Algorithm that uses a linear regression decision tree approach to analyze time-related data, such as monthly sales data or yearly profits. The patterns it discovers can be used to predict values for future time steps)
auto.ctrl.position algorithmalgorytm pozycjonowania
tech., law, el.price coupling algorithmalgorytm łączenia cen
comp., MSpublic key algorithmalgorytm asymetryczny (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
math.recursive algorithmalgorytm rekurencyjny
math.simplex algorithmalgorythm symplex
math.simplex algorithmalgorytm simpleks
construct.universal algorithmalgorytm uniwersalny
auto.ctrl.velocity algorithmalgorytm prędkościowy