Subject | Dutch | English |
IT | A*-algoritme | A-star algorithm |
IT | A*-algoritme | A* algorithm |
IT, earth.sc. | algoritme-besturingscircuit | algorithm-control circuit |
comp., MS | algoritme van asymmetrische sleutel | asymmetric key algorithm (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
commun., IT | algoritme van de publieke toegangsnummers | public key algorithm |
comp., MS | algoritme van openbare sleutel | public key algorithm (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
fin. | algoritme via de euro-eenheid | algorithm via the euro unit |
environ. | algoritme voor atmosferische correctie | atmospheric correction algorithm |
commun. | algoritme voor beeldsegmentatie | image segmentation algorithm |
IT | algoritme voor de beveiliging van gegevens | secure hash algorithm |
IT | algoritme voor foutherstelling | error correction algorithm |
scient. | algoritme voor gegevenscomprimering | data compression algorithm |
IT | algoritme voor generatie van testgevallen | algorithmic test case generation |
IT | algoritme voor herkenning van werkstukken | part-recognition algorithm |
commun., IT | algoritme voor het afpellen | thinning into skeletons |
commun., IT | algoritme voor het afpellen | skeletonization |
commun., IT | algoritme voor het afslanken | thinning into skeletons |
commun., IT | algoritme voor het afslanken | skeletonization |
gen. | algoritme voor het versleutelen | scrambling algorithm |
commun., transp. | algoritme voor patroonherkenning | pattern recognition algorithm |
dat.proc. | asymmetrisch algoritme | asymmetric algorithm |
IT | asymmetrisch encryptie-algoritme | asymmetric key cipher |
IT | asymmetrisch encryptie-algoritme | public key encipherment |
IT | asymmetrisch encryptie-algoritme | public key cryptography |
IT | asymmetrisch encryptie-algoritme | asymmetric encipherment |
comp., MS | asymmetrische algoritme | asymmetric algorithm (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
IT | besturingsstroom-algoritme | control flow algorithm |
IT | "branch and bound" algoritme | branch-and-bound search |
IT | British Museum algoritme | British Museum procedure |
IT, dat.proc. | convergerend algoritme | convergence algorithm |
IT | cryptografisch algoritme | encryption algorithm |
IT | cryptografisch algoritme | cryptographic algorithm |
IT | cryptografisch hash-algoritme | cryptographic hash algorithm |
comp., MS | cryptografische algoritme | cryptographic algorithm (A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both) |
IT | decryptie-algoritme | decryption algorithm |
math. | EM-algoritme | EM algorithm |
math. | EM-algoritme | estimation-maximization algorithm |
math. | EM-algoritme | estimation-maximisation algorithm |
commun., IT | encryptie-algoritme | encipherment algorithm |
commun., IT | encryptie-algoritme | encryption algorithm |
commun., IT | encryptie-algoritme | cryptographic algorithm |
IT | foutdetectie-algoritme | error detection algorithm |
gen. | Geavanceerde algoritmen en architecturen voor spraak-en beeldverwerking | Advanced algorithms and architectures for speech and image processing |
math. | gegevens vermeerdering algoritme | data augmentation algorithm |
scient. | generiek algoritme | generic algorithm |
life.sc. | genetisch algoritme | genetic algorithms |
math. | genetisch algoritme | genetic algorithm |
stat. | genetisch algoritme met subpopulaties | island model genetic algorithm |
stat. | genetisch algoritme met terugplaatsing van generaties | generational replacement genetic algorithm |
comp., MS | hash-algoritme | hash algorithm (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1) |
IT | Herbrand's algoritme | Herbrand's algorithm |
commun. | link state algoritme | link state algorithm |
IT, transp., mil., grnd.forc. | met elektronische algoritmen beveiligde chip | chip protected by electronic algorithm |
math. | Monte Carlo EM algoritme | Monte Carlo EM algorithm |
IT | naaste-buur algoritme | nearest neighbor algorithm |
IT | "on-line backpropagation" algoritme | on-line back-propagation algorithm |
math. | schil algoritme | peeling algorithm |
math. | simplex-algoritme | simplex algorithm |
stat. | steady state genetisch algoritme | steady state genetic algorithm |
IT | symmetrisch algoritme | symmetric algorithm |
nat.sc. | vast algoritme | fixed algorithm |
IT | veilig hash-algoritme | secure hash algorithm |
math. | Yates-algoritme | Yates's algorithm |