Subject | English | Spanish |
IT | A* algorithm | algoritmo A* |
IT, dat.proc. | adaptative shortest-path routing algorithm | algoritmo adaptativo de cálculo del camino mínimo |
gen. | Advanced algorithms and architectures for speech and image processing | Algoritmos y arquitecturas avanzados para proceso de voz y de imagen |
commun. | algorithm A8 | algoritmo A8 |
commun. | algorithm A3 | algoritmo de autenticación A3 |
commun. | algorithm A3 | algoritmo A3 |
commun. | algorithm A5 | algoritmo de encriptación A5 |
commun. | algorithm A8 | algoritmo de generación de la clave de cifrado A8 |
commun. | algorithm A5 | algoritmo A5 |
IT, earth.sc. | algorithm-control circuit | circuito de control de algoritmo |
meteorol. | algorithm-derived product | producto derivado de algoritmos |
IT | algorithm prototyping | determinación de algoritmos prototipo |
fin. | algorithm via the euro unit | algoritmo basado en la referencia al euro |
commun. | assignment algorithm | algoritmo de asignación |
IT | A-star algorithm | algoritmo A* |
dat.proc. | asymmetric algorithm | algoritmo de clave pública |
dat.proc. | asymmetric algorithm | algoritmo asimétrico |
comp., MS | asymmetric algorithm | algoritmo asimétrico (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
comp., MS | asymmetric key algorithm | algoritmo de clave asimétrica (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
fin., IT | authentication algorithm | algoritmo de autentificación |
meteorol. | Automated Biomass Burning Algorithm | algoritmo automatizado de quema de biomasa |
law, IT | brute force algorithm | método elemental |
law, IT | brute force algorithm | algoritmo elemental |
IT | chaining algorithm | algoritmo de concatenación |
IT, transp., mil., grnd.forc. | chip protected by electronic algorithm | chip protegido mediante algoritmo electrónico |
pharma. | clinical algorithm | algoritmo clínico |
IT, dat.proc. | clipping algorithm | algoritmo de recorte |
earth.sc. | coding algorithm | algoritmo de codificación |
IT | compression algorithm | algoritmo de compresión |
tech., law, el. | continuous trading matching algorithm | algoritmo de negociación continua de la casación |
IT | control flow algorithm | algoritmo de control de flujo |
IT, dat.proc. | convergence algorithm | algoritmo de convergencia |
fin. | conversion algorithm | tipo de conversión |
fin. | conversion algorithm | normas de conversión |
fin. | conversion algorithm | algoritmo de conversión |
commun., IT | cryptographic algorithm | algoritmo de cifrado |
commun., IT | cryptographic algorithm | algoritmo criptográfico |
IT | cryptographic algorithm | algoritmo de encripción |
comp., MS | cryptographic algorithm | algoritmo criptográfico (A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both) |
IT | cryptographic hash algorithm | algoritmo criptográfico de hash |
stat. | data augmentation algorithm | algoritmo del aumento de los datos |
scient. | data compression algorithm | algoritmo de compresión de datos |
IT | decryption algorithm | algoritmo de descifrado |
IT | digital signal processing algorithm | algoritmo de proceso de señales digitales |
comp., MS | Digital Signature Algorithm | Algoritmo de firma digital (The U.S. government standard for digital signatures, as specified by the National Institute of Standards and Technology, in FIPS 186, Digital Signature Standard. DSA is based on signature encryption based on a public and a private key) |
math. | Efron's self-consistency algorithm | principio que falta de la información |
math. | Efron's self-consistency algorithm | algoritmo de la uno mismo-consistencia de Efron |
math. | EM algorithm | algoritmo EM |
commun., IT | encipherment algorithm | algoritmo de cifrado |
commun., IT | encipherment algorithm | algoritmo criptográfico |
commun., IT | encryption algorithm | algoritmo criptográfico |
commun., IT | encryption algorithm | algoritmo de cifrado |
IT | encryption algorithm | algoritmo de encripción |
IT | error correction algorithm | algoritmo de corrección de error |
IT | error detection algorithm | algoritmo de detección de errores |
math. | estimation-maximisation algorithm | algoritmo EM |
math. | estimation-maximization algorithm | algoritmo EM |
UN, geol. | exhaustive combinatorial search algorithm | algoritmo que busque todas las combinaciones |
IT | fast encryption algorithm | algoritmo de cifrado rápido |
meteorol. | Fire Identification Mapping and Monitoring Algorithms | algoritmos de identificación, representación cartográfica y observación de incendios |
nat.sc. | fixed algorithm | algoritmo fijo |
life.sc. | Gaussian algorithm | algoritmo de Gauss |
stat. | generational replacement genetic algorithm | algoritmo genético generacional |
scient. | generic algorithm | algoritmo genérico |
math. | genetic algorithm | algoritmo genético |
IT | grey scale compression algorithm | algoritmo de compresión en escala de grises |
commun., IT | hash algorithm | algoritmo de condensación |
comp., MS | hash algorithm | algoritmo hash (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
IT | Herbrand's algorithm | algoritmo de Herbrand |
commun., IT | hot potato algorithm | encaminamiento hot potato |
commun. | image segmentation algorithm | algoritmo de segmentación de imágenes |
stat. | island model genetic algorithm | algoritmo genético con migración entre subpoblaciones |
commun. | leaky bucket algorithm | algoritmo de contador dinámico |
commun. | link state algorithm | algoritmo de estado de enlace |
IT | MD algorithm | algoritmo de compendios de mensajes |
IT | message digest algorithm | algoritmo de compendios de mensajes |
math. | Metropolis-Hastings algorithm | algoritmo de Metropolis-Hastings |
comp., MS | Microsoft Sequence Clustering algorithm | algoritmo de clústeres de secuencia de Microsoft (Algorithm that is a combination of sequence analysis and clustering, which identifies clusters of similarly ordered events in a sequence. The clusters can be used to predict the likely ordering of events in a sequence based on known characteristics) |
comp., MS | Microsoft Time Series algorithm | algoritmo de serie temporal de Microsoft (Algorithm that uses a linear regression decision tree approach to analyze time-related data, such as monthly sales data or yearly profits. The patterns it discovers can be used to predict values for future time steps) |
math. | Monte Carlo EM algorithm | algoritmo Monte Carlo EM |
IT | n-bit block cipher algorithm | algoritmo de cifrado de bloques de n-bit |
IT | nearest neighbor algorithm | algoritmo del vecino más próximo |
stat. | non-hierarchical multivariate clustering algorithm | algoritmo de clasificación multidimensional no jerárquica |
IT | on-line back-propagation algorithm | algoritmo de retropropagación en línea |
meteorol. | Operational Algorithm Team | equipo de algoritmo operativo OAT, por sus siglas en inglés |
commun., transp. | pattern recognition algorithm | algoritmo para el reconocimiento de formas |
stat. | peeling algorithm | algoritmo de la peladura |
auto.ctrl. | position algorithm | algoritmo de modo posición |
tech., law, el. | price coupling algorithm | algoritmo de acoplamiento de precios |
meteorol. | product algorithms | algoritmos de generación de productos |
IT, dat.proc. | programmed algorithm handler | autómata |
commun., IT | public key algorithm | algoritmo de clave pública |
comp., MS | public key algorithm | algoritmo de clave pública (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
IT, tech. | public-key algorithm | algoritmo de clave pública |
meteorol. | rain rate algorithm | algoritmo de tasa de lluvia |
math. | recursive algorithm | algoritmo recursivo |
meteorol. | retrieval algorithm | algoritmo de extracción de datos |
IT | Rivest, Shamir and Adleman algorithm | criptosistema de clave pública RSA |
IT | Rivest, Shamir and Adleman algorithm | sistema criptográfico de clave pública RSA |
IT | Rivest, Shamir and Adleman algorithm | algoritmo criptográfico de clave pública RSA |
gen. | Rivest, Shamir and Adleman algorithm | criptosistema RSA |
IT | Rivest, Shamir and Adleman public-key encryption algorithm | algoritmo criptográfico de clave pública RSA |
IT | Rivest, Shamir and Adleman public-key encryption algorithm | criptosistema de clave pública RSA |
IT | Rivest, Shamir and Adleman public-key encryption algorithm | sistema criptográfico de clave pública RSA |
gen. | Rivest, Shamir and Adleman public-key encryption algorithm | criptosistema RSA |
scient. | routine algorithm | algoritmo conocido |
IT | RSA algorithm | criptosistema de clave pública RSA |
IT | RSA algorithm | sistema criptográfico de clave pública RSA |
IT | RSA algorithm | algoritmo criptográfico de clave pública RSA |
gen. | RSA algorithm | criptosistema RSA |
IT | RSA public-key encryption algorithm | sistema criptográfico de clave pública RSA |
IT | RSA public-key encryption algorithm | algoritmo criptográfico de clave pública RSA |
IT | RSA public-key encryption algorithm | criptosistema de clave pública RSA |
gen. | RSA public-key encryption algorithm | criptosistema RSA |
gen. | scrambling algorithm | algoritmo de aleatorización |
IT | secure hash algorithm | algoritmo de hash seguro |
comp., MS | Secure Hash Algorithm 1 | Algoritmo hash seguro 1 (An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places) |
stat., scient. | shift algorithm | algoritmo de traslación |
IT | signal processing algorithm | algoritmo de procesamiento de señal |
IT | simplex algorithm | algoritmo del símplex |
stat. | simplex algorithm | simple algoritmo |
commun. | spanning tree algorithm | algoritmo del árbol de expansión |
math. | standard algorithm | algoritmo convencional |
stat. | steady state genetic algorithm | algoritmo genético de estado fijo |
IT | symmetric algorithm | algoritmo simétrico |
IT | transfer algorithm | algoritmo de transferencia |
auto.ctrl. | velocity algorithm | algoritmo de modo velocidad |
IT | virtual memory paging algorithms | algoritmos de paginación de memoria virtual |
meteorol. | Wildfire Automated Biomass Burning Algorithm | algoritmo automatizado de quema de biomasa para incendios descontrolados |
math. | Yates's algorithm | algoritmo de Yates |