DictionaryForumContacts

   English
Terms for subject Microsoft containing Algorithm | all forms
EnglishRussian
asymmetric key algorithmалгоритм асимметричного шифрования (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
Configure time stamping hashing algorithmНастроить алгоритм хэширования отметок времени (Office System 2010 Rori)
cryptographic algorithmалгоритм шифрования (A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both)
elliptic curve digital signature algorithmалгоритм цифровой подписи на основе эллиптических кривых (operates on elliptic curve groups Rori)
hash algorithmхэш-алгоритм
Microsoft Sequence Clustering algorithmалгоритм кластеризации последовательностей (Algorithm that is a combination of sequence analysis and clustering, which identifies clusters of similarly ordered events in a sequence. The clusters can be used to predict the likely ordering of events in a sequence based on known characteristics; Майкрософт)
Microsoft Sequence Clustering algorithmалгоритм кластеризации последовательностей (Microsoft)
Microsoft Time Series algorithmалгоритм временных рядов (Microsoft)
Microsoft Time Series algorithmалгоритм временных рядов (Algorithm that uses a linear regression decision tree approach to analyze time-related data, such as monthly sales data or yearly profits. The patterns it discovers can be used to predict values for future time steps; Майкрософт)
public key algorithmалгоритм с использованием открытых ключей (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
Secure Hash Algorithmалгоритм SHA
Secure Hash Algorithm 1алгоритм SHA-1 (An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places)
sort algorithmалгоритм сортировки
the runtime method resolution algorithmалгоритм разрешения методов, используемый средой выполнения (Alex_Odeychuk)
time series algorithmалгоритм временных рядов (microsoft.com bojana)