DictionaryForumContacts

Terms containing algorithms | all forms | exact matches only
SubjectEnglishDutch
ITA* algorithmA*-algoritme
IT, dat.proc.adaptative shortest-path routing algorithmroutebepalingsalgoritme voor het kortste pad
gen.Advanced algorithms and architectures for speech and image processingGeavanceerde algoritmen en architecturen voor spraak-en beeldverwerking
ITalgorithm-control circuitalgorithme-besturingseenheid
IT, earth.sc.algorithm-control circuitalgoritme-besturingscircuit
fin.algorithm via the euro unitalgoritme via de euro-eenheid
commun.assignment algorithmtoewijzingsalgoritme
ITA-star algorithmA*-algoritme
dat.proc.asymmetric algorithmasymmetrisch algoritme
comp., MSasymmetric algorithmasymmetrische algoritme (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
comp., MSasymmetric key algorithmalgoritme van asymmetrische sleutel (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
environ.atmospheric correction algorithmalgoritme voor atmosferische correctie
fin., ITauthentication algorithmverificatiealgoritme
gen.Boltzmann learning algorithmBoltzman-leerregel
law, ITbrute force algorithmbrute-kracht aanpak
IT, transp., mil., grnd.forc.chip protected by electronic algorithmmet elektronische algoritmen beveiligde chip
med.clinical algorithmbehandelingsprotocol
IT, dat.proc.clipping algorithmsnoei-algorithme
earth.sc.coding algorithmcoderingsalgoritme
tech.computational algorithmrekenalgoritme
tech.control algorithmcontrole-algoritme
ITcontrol flow algorithmbesturingsstroom-algoritme
IT, dat.proc.convergence algorithmconvergerend algoritme
fin.conversion algorithmomrekeningsmethode
ITcryptographic algorithmcryptografisch algoritme
commun., ITcryptographic algorithmencryptie-algoritme
ITcryptographic algorithmcoderingsalgoritme
comp., MScryptographic algorithmcryptografische algoritme (A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both)
ITcryptographic hash algorithmcryptografisch hash-algoritme
math.data augmentation algorithmgegevens vermeerdering algoritme
scient.data compression algorithmalgoritme voor gegevenscomprimering
ITdata encryption standard algorithmgegevensencryptiestandaardalgoritme
ITdecryption algorithmdecryptie-algoritme
tech.division algorithmverdelingsalgoritme
math.Efron's self-consistency algorithmontbrekende informatieprincipe
math.Efron's self-consistency algorithmEfron's zelf-consistentiealgoritme
math.EM algorithmEM-algoritme
commun., ITencipherment algorithmcoderingsalgoritme
commun., ITencipherment algorithmencryptie-algoritme
commun., ITencryption algorithmencryptie-algoritme
ITencryption algorithmcryptografisch algoritme
ITencryption algorithmcoderingsalgoritme
ITerror correction algorithmfoutherstellingsalgoritme
ITerror correction algorithmalgoritme voor foutherstelling
ITerror detection algorithmfoutdetectie-algoritme
math.estimation-maximisation algorithmEM-algoritme
math.estimation-maximization algorithmEM-algoritme
tech.Euclidean algorithmeuclidisch algoritme
ITfast encryption algorithmsnel encryptiealgoritme
nat.sc.fixed algorithmvast algoritme
life.sc.Gaussian algorithmalgoritmes van Gauss
stat.generational replacement genetic algorithmgenetisch algoritme met terugplaatsing van generaties
scient.generic algorithmgeneriek algoritme
math.genetic algorithmgenetisch algoritme
life.sc.genetic algorithmsgenetisch algoritme
comp., MShash algorithmhash-algoritme (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1)
ITHerbrand's algorithmHerbrand's algoritme
commun., IThot potato algorithmhot-potato-routeringsalgoritme
commun., IThot potato algorithmhot-potato-routering
commun.image segmentation algorithmalgoritme voor beeldsegmentatie
life.sc.interpretation algorithminterpretatie-algorithme
stat.island model genetic algorithmgenetisch algoritme met subpopulaties
commun.leaky bucket algorithmlekke-emmeralgoritme
commun.link state algorithmlink state algoritme
ITMD algorithmberichtssamenvattingsalgoritme
ITmessage digest algorithmberichtssamenvattingsalgoritme
math.Metropolis-Hastings algorithmMetropolis-Hastings algorithme
gen.MFT learning algorithmMFT-leeralgoritme
math.Monte Carlo EM algorithmMonte Carlo EM algoritme
ITnearest neighbor algorithmnaaste-buur algoritme
tech.normal algorithmnormaalalgoritme
ITon-line back-propagation algorithm"on-line backpropagation" algoritme
ITpart-recognition algorithmalgoritme voor herkenning van werkstukken
commun., transp.pattern recognition algorithmalgoritme voor patroonherkenning
math.peeling algorithmschil algoritme
IT, dat.proc.programmed algorithm handlergeprogrammeerde rekenmethode
commun., ITpublic key algorithmalgoritme van de publieke toegangsnummers
comp., MSpublic key algorithmalgoritme van openbare sleutel (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
tech.quotient-difference algorithmalgoritme van gedeelde verschillen
math.recursive algorithmrecursief algorithme
tech.recursive algorithmrecursief algoritme
ITRivest, Shamir and Adleman algorithmRivest, Shamir en Adleman
ITRivest, Shamir and Adleman public-key encryption algorithmRivest, Shamir en Adleman
ITRSA algorithmRivest, Shamir en Adleman
ITRSA public-key encryption algorithmRivest, Shamir en Adleman
gen.scrambling algorithmalgoritme voor het versleutelen
ITsecure hash algorithmveilig hash-algoritme
ITsecure hash algorithmalgoritme voor de beveiliging van gegevens
stat., scient.shift algorithmschuifalgoritme
ITsimplex algorithmsimplexalgoritme
math.simplex algorithmsimplex-algoritme
stat.steady state genetic algorithmsteady state genetisch algoritme
ITsymmetric algorithmsymmetrisch algoritme
ITtransfer algorithmtransferalgorithme
tech.universal algorithmuniverseel algorithme
ITvirtual memory paging algorithmsalgorithmes voor de paginering van het virtueel geheugen
math.Yates's algorithmYates-algoritme

Get short URL