DictionaryForumContacts

Terms containing algorithm | all forms
SubjectEnglishJapanese
tech.all-integer algorithm全整数アルゴリズム (ぜんせいすうアルゴリズム)
comp., MSasymmetric algorithm非対称アルゴリズム (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
comp., MSasymmetric key algorithm非対称キー アルゴリズム (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
comp.n cell rate algorithmセル・レート・アルゴリズム
comp.n cell rate algorithmセルレートアルゴリズム
comp.n composite algorithm複合法
comp.n compression algorithm圧縮アルゴリズム
gen.control algorithm制御アルゴリズム (seigyo-arugorizumu)
comp., MScryptographic algorithm暗号アルゴリズム (A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both)
gen.n decoding algorithm復号アルゴリズム
comp., MSDigital Signature Algorithmデジタル署名アルゴリズム (The U.S. government standard for digital signatures, as specified by the National Institute of Standards and Technology, in FIPS 186, Digital Signature Standard. DSA is based on signature encryption based on a public and a private key)
comp.n digital signature algorithmデジタル署名アルゴリズム
comp.n generic cell rate algorithmジェネリックセル速度アルゴリズム
comp.n genetic algorithm遺伝的アルゴリズム
gen.n genetic algorithmsジェネティック・アルゴリズム
gen.n genetic algorithmsジェネティックアルゴリズム
math.n greedy algorithm欲張り法
math.n greedy algorithm貪欲法
comp., MShash algorithmハッシュ アルゴリズム (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1)
comp.n hash algorithmハッシュ・アルゴリズム
comp.n hash algorithmハッシュアルゴリズム
gen.learning algorithm学習アルゴリズム
comp.n Metropolis-Hastings algorithmメトロポリス・ヘイスティングス法
comp., MSMicrosoft Sequence Clustering algorithmMicrosoft シーケンス クラスター アルゴリズム (Algorithm that is a combination of sequence analysis and clustering, which identifies clusters of similarly ordered events in a sequence. The clusters can be used to predict the likely ordering of events in a sequence based on known characteristics)
comp., MSMicrosoft Time Series algorithmMicrosoft タイム シリーズ アルゴリズム (Algorithm that uses a linear regression decision tree approach to analyze time-related data, such as monthly sales data or yearly profits. The patterns it discovers can be used to predict values for future time steps)
comp.n page replacement algorithmページ置換アルゴリズム
auto.ctrl.position algorithm位置形アルゴリズム
comp., MSpublic key algorithm公開キー アルゴリズム (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
comp.n round-robin algorithmラウンドロビン・アルゴリズム
comp.n round-robin algorithmラウンドロビンアルゴリズム
comp.n scanline algorithmスキャンライン法
comp.n secure hash algorithmセキュア・ハッシュ・アルゴリズム
comp., MSSecure Hash Algorithm 1セキュア ハッシュ アルゴリズム 1 (An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places)
comp.n secure hash algorithmセキュアハッシュアルゴリズム
auto.ctrl.velocity algorithm速度形アルゴリズム

Get short URL