Subject | English | Dutch |
IT | A* algorithm | A*-algoritme |
IT, dat.proc. | adaptative shortest-path routing algorithm | routebepalingsalgoritme voor het kortste pad |
gen. | Advanced algorithms and architectures for speech and image processing | Geavanceerde algoritmen en architecturen voor spraak-en beeldverwerking |
IT | algorithm-control circuit | algorithme-besturingseenheid |
IT, earth.sc. | algorithm-control circuit | algoritme-besturingscircuit |
fin. | algorithm via the euro unit | algoritme via de euro-eenheid |
commun. | assignment algorithm | toewijzingsalgoritme |
IT | A-star algorithm | A*-algoritme |
dat.proc. | asymmetric algorithm | asymmetrisch algoritme |
comp., MS | asymmetric algorithm | asymmetrische algoritme (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
comp., MS | asymmetric key algorithm | algoritme van asymmetrische sleutel (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
environ. | atmospheric correction algorithm | algoritme voor atmosferische correctie |
fin., IT | authentication algorithm | verificatiealgoritme |
gen. | Boltzmann learning algorithm | Boltzman-leerregel |
law, IT | brute force algorithm | brute-kracht aanpak |
IT, transp., mil., grnd.forc. | chip protected by electronic algorithm | met elektronische algoritmen beveiligde chip |
med. | clinical algorithm | behandelingsprotocol |
IT, dat.proc. | clipping algorithm | snoei-algorithme |
earth.sc. | coding algorithm | coderingsalgoritme |
tech. | computational algorithm | rekenalgoritme |
tech. | control algorithm | controle-algoritme |
IT | control flow algorithm | besturingsstroom-algoritme |
IT, dat.proc. | convergence algorithm | convergerend algoritme |
fin. | conversion algorithm | omrekeningsmethode |
IT | cryptographic algorithm | cryptografisch algoritme |
commun., IT | cryptographic algorithm | encryptie-algoritme |
IT | cryptographic algorithm | coderingsalgoritme |
comp., MS | cryptographic algorithm | cryptografische algoritme (A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both) |
IT | cryptographic hash algorithm | cryptografisch hash-algoritme |
math. | data augmentation algorithm | gegevens vermeerdering algoritme |
scient. | data compression algorithm | algoritme voor gegevenscomprimering |
IT | data encryption standard algorithm | gegevensencryptiestandaardalgoritme |
IT | decryption algorithm | decryptie-algoritme |
tech. | division algorithm | verdelingsalgoritme |
math. | Efron's self-consistency algorithm | ontbrekende informatieprincipe |
math. | Efron's self-consistency algorithm | Efron's zelf-consistentiealgoritme |
math. | EM algorithm | EM-algoritme |
commun., IT | encipherment algorithm | coderingsalgoritme |
commun., IT | encipherment algorithm | encryptie-algoritme |
commun., IT | encryption algorithm | encryptie-algoritme |
IT | encryption algorithm | cryptografisch algoritme |
IT | encryption algorithm | coderingsalgoritme |
IT | error correction algorithm | foutherstellingsalgoritme |
IT | error correction algorithm | algoritme voor foutherstelling |
IT | error detection algorithm | foutdetectie-algoritme |
math. | estimation-maximisation algorithm | EM-algoritme |
math. | estimation-maximization algorithm | EM-algoritme |
tech. | Euclidean algorithm | euclidisch algoritme |
IT | fast encryption algorithm | snel encryptiealgoritme |
nat.sc. | fixed algorithm | vast algoritme |
life.sc. | Gaussian algorithm | algoritmes van Gauss |
stat. | generational replacement genetic algorithm | genetisch algoritme met terugplaatsing van generaties |
scient. | generic algorithm | generiek algoritme |
math. | genetic algorithm | genetisch algoritme |
life.sc. | genetic algorithms | genetisch algoritme |
comp., MS | hash algorithm | hash-algoritme (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
IT | Herbrand's algorithm | Herbrand's algoritme |
commun., IT | hot potato algorithm | hot-potato-routeringsalgoritme |
commun., IT | hot potato algorithm | hot-potato-routering |
commun. | image segmentation algorithm | algoritme voor beeldsegmentatie |
life.sc. | interpretation algorithm | interpretatie-algorithme |
stat. | island model genetic algorithm | genetisch algoritme met subpopulaties |
commun. | leaky bucket algorithm | lekke-emmeralgoritme |
commun. | link state algorithm | link state algoritme |
IT | MD algorithm | berichtssamenvattingsalgoritme |
IT | message digest algorithm | berichtssamenvattingsalgoritme |
math. | Metropolis-Hastings algorithm | Metropolis-Hastings algorithme |
gen. | MFT learning algorithm | MFT-leeralgoritme |
math. | Monte Carlo EM algorithm | Monte Carlo EM algoritme |
IT | nearest neighbor algorithm | naaste-buur algoritme |
tech. | normal algorithm | normaalalgoritme |
IT | on-line back-propagation algorithm | "on-line backpropagation" algoritme |
IT | part-recognition algorithm | algoritme voor herkenning van werkstukken |
commun., transp. | pattern recognition algorithm | algoritme voor patroonherkenning |
math. | peeling algorithm | schil algoritme |
IT, dat.proc. | programmed algorithm handler | geprogrammeerde rekenmethode |
commun., IT | public key algorithm | algoritme van de publieke toegangsnummers |
comp., MS | public key algorithm | algoritme van openbare sleutel (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
tech. | quotient-difference algorithm | algoritme van gedeelde verschillen |
math. | recursive algorithm | recursief algorithme |
tech. | recursive algorithm | recursief algoritme |
IT | Rivest, Shamir and Adleman algorithm | Rivest, Shamir en Adleman |
IT | Rivest, Shamir and Adleman public-key encryption algorithm | Rivest, Shamir en Adleman |
IT | RSA algorithm | Rivest, Shamir en Adleman |
IT | RSA public-key encryption algorithm | Rivest, Shamir en Adleman |
gen. | scrambling algorithm | algoritme voor het versleutelen |
IT | secure hash algorithm | veilig hash-algoritme |
IT | secure hash algorithm | algoritme voor de beveiliging van gegevens |
stat., scient. | shift algorithm | schuifalgoritme |
IT | simplex algorithm | simplexalgoritme |
math. | simplex algorithm | simplex-algoritme |
stat. | steady state genetic algorithm | steady state genetisch algoritme |
IT | symmetric algorithm | symmetrisch algoritme |
IT | transfer algorithm | transferalgorithme |
tech. | universal algorithm | universeel algorithme |
IT | virtual memory paging algorithms | algorithmes voor de paginering van het virtueel geheugen |
math. | Yates's algorithm | Yates-algoritme |