Subject | English | Korean |
comp., MS | asymmetric key algorithm | 비대칭 키 알고리즘 (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
comp., MS | cryptographic algorithm | 암호화 알고리즘 (A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both) |
math. | data augmentation algorithm | 자료확대알고리즘 |
comp., MS | Digital Signature Algorithm | 디지털 서명 알고리즘 (The U.S. government standard for digital signatures, as specified by the National Institute of Standards and Technology, in FIPS 186, Digital Signature Standard. DSA is based on signature encryption based on a public and a private key) |
math. | Efron's self-consistency algorithm | 결측 정보 기준 |
math. | EM algorithm | 예측치 최대화 알고리즘 |
IT | encryption algorithm | 암호화 알고리즘 |
math. | estimation-maximisation algorithm | 예측치 최대화 알고리즘 |
math. | estimation-maximization algorithm | 예측치 최대화 알고리즘 |
math. | genetic algorithm | 유전적 알고리즘 |
comp., MS | hash algorithm | 해시 알고리즘 (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
IT | message digest algorithm | 메시지 다이제스트 알고리즘 |
math. | Metropolis-Hastings algorithm | 메트로폴리스-해스팅스 알고리즘 |
comp., MS | Microsoft Sequence Clustering algorithm | Microsoft 시퀀스 클러스터링 알고리즘 (Algorithm that is a combination of sequence analysis and clustering, which identifies clusters of similarly ordered events in a sequence. The clusters can be used to predict the likely ordering of events in a sequence based on known characteristics) |
comp., MS | Microsoft Time Series algorithm | Microsoft 시계열 알고리즘 (Algorithm that uses a linear regression decision tree approach to analyze time-related data, such as monthly sales data or yearly profits. The patterns it discovers can be used to predict values for future time steps) |
math. | Monte Carlo EM algorithm | 몬테칼로 EM 알고리즘 |
math. | peeling algorithm | 껍질벗기기 알고리즘 |
comp., MS | public key algorithm | 공개 키 알고리즘 (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
math. | recursive algorithm | 반복알고리즘 |
comp., MS | sequential algorithm | 순차적 알고리즘 (An algorithm in which each step must occur in a particular order) |
math. | simplex algorithm | 심플렉스 알고리즘 |
math. | Yates's algorithm | 예이츠 알고리즘 |