DictionaryForumContacts

Terms containing algoritmus | all forms
SubjectHungarianEnglish
math.adatok kiegészítése algoritmusdata augmentation algorithm
comp., MSBiztonságos kivonatoló algoritmus 1Secure Hash Algorithm 1 (An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places)
math.Efron ön-konzisztencia algoritmustmissing information principle
math.Efron ön-konzisztencia algoritmustEfron's self-consistency algorithm
math.EM algoritmus.estimation-maximization algorithm
math.EM algoritmus.EM algorithm
math.EM algoritmus.estimation-maximisation algorithm
gen.keverési algoritmusscrambling algorithm
comp., MSkivonatoló algoritmushash function (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1)
comp., MSkivonatoló algoritmushash algorithm (An algorithm that produces a hash value of some piece of data, such as a message or session key. With a good hash algorithm, changes in the input data can change every bit in the resulting hash value; for this reason, hashes are useful in detecting any modification in a data object, such as a message. Furthermore, a good hash algorithm makes it computationally infeasible to construct two independent inputs that have the same hash. Typical hash algorithms include MD2, MD4, MD5, and SHA-1)
math.Metropolis-Hastings algoritmusMetropolis-Hastings algorithm
math.Monte Carlo EM algoritmusMonte Carlo EM algorithm
comp., MSnyilvános kulcs képzési algoritmusapublic key algorithm (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message)
math.rekurzív algoritmusrecursive algorithm
math.szimplex algoritmussimplex algorithm
comp., MStitkosítási algoritmuscryptographic algorithm (A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both)
math.Yates algoritmusYates's algorithm

Get short URL