DictionaryForumContacts

Terms containing algorithm | all forms | exact matches only
SubjectEnglishFinnish
ITA* algorithmA-tähti-algoritmi
ITA* algorithmA*algoritmi
IT, dat.proc.adaptative shortest-path routing algorithmadaptiivinen lyhimmän reitin algoritmi
gen.Advanced algorithms and architectures for speech and image processingkehittyneet algoritmit ja rakenteet puheen sekä kuvan käsittelyä varten
ed.algorithm studyalgoritmiopetus
fin.algorithm via the euro unitalgoritmi euroyksikön kautta muunnettaessa
commun.assignment algorithmosoitusalgoritmi
ITA-star algorithmA*algoritmi
ITA-star algorithmA-tähti-algoritmi
dat.proc.asymmetric algorithmepäsymmetrinen algoritmi
comp., MSasymmetric key algorithmepäsymmetrinen salausalgoritmi (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it)
math.BACON algorithmeräs poikkeavien havaintojen etsintäalgoritmi moniulotteisen datan tapauksessa
math.BACON algorithmBACON-algoritmi
gen.Boltzmann learning algorithmBoltzmannin oppimisalgoritmi
law, ITbrute force algorithmväsytysmenetelmä
IT, dat.proc.clipping algorithmleikkausalgoritmi
ITcompression algorithmpakkausalgoritmi
tech., law, el.continuous trading matching algorithmjatkuvan kaupankäynnin täsmäytysalgoritmi
ITcontrol flow algorithmohjausvuoalgoritmi
ITcontrol flow algorithmohjausvirta-algoritmi
IT, dat.proc.convergence algorithmsuppeneva algoritmi
fin.conversion algorithmmuuntoalgoritmi
commun., ITcryptographic algorithmsalausalgoritmi
ITcryptographic algorithmsalakirjoitusalgoritmi
math.data augmentation algorithmeräs monipaikkausmenetelmä
math.data augmentation algorithmdatan laajennusalgoritmi
math.Efron's self-consistency algorithmEfronin itse-tarkentuva algoritmi (ks. EM-algoritmi)
math.EM algorithmEM-algoritmi
commun., ITencipherment algorithmsalausalgoritmi
commun., ITencryption algorithmsalausalgoritmi
ITencryption algorithmsalakirjoitusalgoritmi
math.estimation-maximisation algorithmEM-algoritmi
math.estimation-maximization algorithmEM-algoritmi
ITfixed algorithmsitova laskumenetelmä
nat.sc.fixed algorithmkiinteä algoritmi
life.sc.Gaussian algorithmGaussin algoritmi
stat.generational replacement genetic algorithmpopulaation korvaava sukupuolialgoritmi
math.genetic algorithmgeneettinen algoritmi
life.sc.genetic algorithmsgeneettiset algoritmit
ITgrey scale compression algorithmharmaasävykuvien pakkausalgoritmi
comp., MShash algorithmhajautusalgoritmi (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1)
ITHerbrand's algorithmHerbrandin algoritmi
commun.leaky bucket algorithmvuotava ämpäri-algoritmi
commun.link state algorithmlinkkitila-algoritmi
math.Metropolis-Hastings algorithmMetropolisin-Hastingsin algoritmi
gen.MFT learning algorithmMFT-oppimisalgoritmi
math.Monte Carlo EM algorithmMonte Carlo EM algoritmi
ITn-bit block cipher algorithmn-bittinen lohkosalausalgoritmi
ITnearest neighbor algorithm"lähin naapuri"-algoritmi
math.peeling algorithmkuorinta-algoritmi
auto.ctrl.position algorithmasentoalgoritmi
tech., law, el.price coupling algorithmhintakytkentäalgoritmi
IT, dat.proc.programmed algorithm handlerohjelmoitu algoritminkäsittelijä
commun., ITpublic key algorithmyleisen avaimen algoritmi
comp., MSpublic key algorithmjulkisen avaimen algoritmi (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
math.recursive algorithmrekursiivinen algoritmi
ITRivest, Shamir and Adleman algorithmRSA-salausjärjestelmä
ITRivest, Shamir and Adleman algorithmRivest-Shamir-Adleman
ITRivest, Shamir and Adleman algorithmRSA-menetelmä
ITRivest, Shamir and Adleman public-key encryption algorithmRSA-salausjärjestelmä
ITRivest, Shamir and Adleman public-key encryption algorithmRivest-Shamir-Adleman
ITRivest, Shamir and Adleman public-key encryption algorithmRSA-menetelmä
ITRSA algorithmRSA-menetelmä
ITRSA algorithmRSA-salausjärjestelmä
ITRSA algorithmRivest-Shamir-Adleman
ITRSA public-key encryption algorithmRivest-Shamir-Adleman
ITRSA public-key encryption algorithmRSA-salausjärjestelmä
ITRSA public-key encryption algorithmRSA-menetelmä
gen.scrambling algorithmsalausalgoritmi
comp., MSSecure Hash Algorithm 1SHA-1 (An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places)
stat., scient.shift algorithmsiirtoalgoritmi
math.simplex algorithmsimplex-algoritmi
commun.spanning tree algorithmvirittävä puu-algoritmi
stat.steady state genetic algorithmvakiotilan geneettinen algoritmi
ed.study algorithmoppimisalgoritmi
ITtransfer algorithmsiirtoalgoritmi
auto.ctrl.velocity algorithmnopeusalgoritmi
ITvirtual memory paging algorithmsvirtuaalimuistin sivutusalgoritmi
math.Yates's algorithmYatesin algoritmi

Get short URL