DictionaryForumContacts

Terms containing algorithm | all forms | exact matches only
SubjectEnglishSwedish
ITA* algorithmalgoritm A*
ITA* algorithmA*-algoritmen
fin.algorithm via the euro unitalgoritm som bygger på euroenheten
commun.assignment algorithmalgoritm för tilldelning
ITA-star algorithmA*-algoritmen
ITA-star algorithmalgoritm A*
comp., MSasymmetric algorithmasymmetrisk logaritm (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
comp., MSasymmetric key algorithmasymmetrisk nyckel-logaritm (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
gen.Boltzmann learning algorithmBoltzmanns inlärningsalgoritm
law, ITbrute force algorithmråstyrkelösning
IT, dat.proc.clipping algorithmklippningsalgoritm
IT, dat.proc.convergence algorithmkonvergent algoritm
fin.conversion algorithmomräkningsregel
fin.conversion algorithmomräkningsmetod
ITcryptographic algorithmkryptoalgoritm
comp., MScryptographic algorithmkrypteringsalgoritm (A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both)
comp., MSDigital Signature Algorithm The U.S. government standard for digital signatures, as specified by the National Institute of Standards and Technology, in FIPS 186, Digital Signature Standard. DSA is based on signature encryption based on a public and a private keyDSA (Digital Signature Algorithm)
math.Efron's self-consistency algorithminformation som saknas princip
math.Efron's self-consistency algorithmEfrons bärkraften algoritm
math.EM algorithmEM-algoritm
ITencryption algorithmkryptoalgoritm
math.estimation-maximisation algorithmEM-algoritm
math.estimation-maximization algorithmEM-algoritm
life.sc.Gaussian algorithmGauss metod för lösning av normalekvationer
stat.generational replacement genetic algorithmgenetisk algoritm för generationsersättning
math.genetic algorithmgenetisk algoritm
life.sc.genetic algorithmsgenetiska algoritmer
comp., MShash algorithmhash-algoritm (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1)
ITHerbrand's algorithmHerbrand-algoritm
stat.island model genetic algorithmö-modell genetisk algoritm
commun.leaky bucket algorithmläckande hink algoritm
commun.leaky bucket algorithmleaky bucket algoritm
commun.link state algorithmlänktillståndsalgoritm
math.Metropolis-Hastings algorithmMetropolis-Hastings algoritm
gen.MFT learning algorithmMFT-algoritmen
math.Monte Carlo EM algorithmMonte Carlo EM algoritm
ITn-bit block cipher algorithmkrypteringsalgoritm för n-bit-block
ITnearest neighbor algorithmnärmsta-granne-algoritmen
tech., law, el.price coupling algorithmpriskopplingsalgoritm
commun., ITpublic key algorithmallmän nyckelalgoritm
comp., MSpublic key algorithmalgoritm för offentlig nyckel (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
math.recursive algorithmrekursiv algoritm
stat., scient.shift algorithmbytesalgoritm
math.simplex algorithmsimplexalgoritm
commun.spanning tree algorithmspanning-tree algoritme
stat.steady state genetic algorithmstadigt tillstånd genetisk algoritm
ITtransfer algorithmöverföringsalgoritm
ITvirtual memory paging algorithmssidväxlingsalgoritm för virtuellt minne
math.Yates's algorithmYates algoritm

Get short URL