Subject | English | Lithuanian |
IT | address algorithm | adresinis algoritmas |
IT | algorithm for finding secondary assignments of synchronous sequential circuits | nuoseklaus veikimo sinchroninių schemų antrinių paskirčių suradimo algoritmas |
IT | algorithm for obtaining inverse transforms | transformacijų aprašymo algoritmas |
IT | algorithm for search of repeating order sequences | nuosekliai pasikartojančių komandų paieškos algoritmas |
IT | algorithm for synthesis of multiple-output combinational logic | kombinatorinės logikos daugkartinio išvedimo sintezės algoritmas |
IT | algorithm insolubility | algoritminis neišsprendžiamumas |
IT | algorithm scheme | algoritmo schema |
IT | algorithm theory | algoritmų teorija |
IT | analysis algorithm | analizės algoritmas |
comp., MS | asymmetric key algorithm | asimetrinis rakto algoritmas (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
IT | control algorithm | valdymo algoritmas |
IT | controlling algorithm | reguliuojantis algoritmas |
IT | correction algorithm | pataisų algoritmas |
IT | dispatcher algorithm | algoritmas-dispečeris |
IT | elaboration of algorithms | algoritmų sudarymas |
math. | EM algorithm | vertinimas-maksimizavimas algoritmą |
math. | EM algorithm | EM algoritmas |
math. | estimation-maximisation algorithm | vertinimas-maksimizavimas algoritmą |
math. | estimation-maximisation algorithm | EM algoritmas |
math. | estimation-maximization algorithm | vertinimas-maksimizavimas algoritmą |
math. | estimation-maximization algorithm | EM algoritmas |
IT | fast algorithm | spartus algoritmas |
IT | fixed algorithm | nekintąs algoritmas |
IT | fixed algorithm | fiksuotas algoritmas |
IT | flow-synthesis algorithm | blokinių schemų sudarymo algoritmas |
comp., MS | hash algorithm | maišos algoritmas (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
IT | local algorithm | lokalinis algoritmas |
IT | logical design algorithm | loginių schemų skaičiavimo algoritmas |
IT | operator algorithm | operatorinis algoritmas |
IT | placement algorithm | išdėstymo algoritmas |
IT | prediction algorithm | prognozavimo algoritmas |
math. | recursive algorithm | rekursinis logaritmas |
IT | regular expression search algorithm | teisingų išraiškų paieškos algoritmas |
IT | regulating algorithm | reguliuojantis algoritmas |
IT | retrieving algorithm | išrinkimo algoritmas |
IT | scheduling algorithm | paskirstymo algoritmas |
gen. | scrambling algorithm | kodavimo algoritmas |
comp., MS | Secure Hash Algorithm 1 | Saugiosios maišos algoritmas SHA-1 (An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places) |
math. | simplex algorithm | simpleksinis algoritmas |
IT | square rooting algorithm | kvadratinės šaknies traukimo algoritmas |
IT | translation algorithm | perdirbimo algoritmas |
IT | translation algorithm | mašininio vertimo algoritmas |
IT | universal algorithm | universalus algoritmas |