Russian | English |
алгоритм SHA-1 | Secure Hash Algorithm 1 (An algorithm that generates a 160-bit hash value from an arbitrary amount of input data. SHA-1 is used with the Digital Signature Algorithm (DSA) in the Digital Signature Standard (DSS), among other places) |
алгоритм асимметричного шифрования | asymmetric key algorithm (A method of encryption that uses a pair of mathematically related keys: a public key and a corresponding private key. Either key can be used to encrypt data, but the corresponding key must be used to decrypt it) |
алгоритм временных рядов | Microsoft Time Series algorithm (Algorithm that uses a linear regression decision tree approach to analyze time-related data, such as monthly sales data or yearly profits. The patterns it discovers can be used to predict values for future time steps; Майкрософт) |
алгоритм временных рядов | time series algorithm (microsoft.com bojana) |
алгоритм временных рядов | Microsoft Time Series algorithm (Microsoft) |
алгоритм кластеризации последовательностей | Microsoft Sequence Clustering algorithm (Algorithm that is a combination of sequence analysis and clustering, which identifies clusters of similarly ordered events in a sequence. The clusters can be used to predict the likely ordering of events in a sequence based on known characteristics; Майкрософт) |
алгоритм кластеризации последовательностей | Microsoft Sequence Clustering algorithm (Microsoft) |
алгоритм разрешения методов, используемый средой выполнения | the runtime method resolution algorithm (Alex_Odeychuk) |
алгоритм с использованием открытых ключей | public key algorithm (An asymmetric cipher that uses two keys, one for encryption, the public key, and the other for decryption, the private key. As implied by the key names, the public key used to encode plaintext can be made available to anyone. However, the private key must remain secret. Only the private key can decrypt the ciphertext. The public key algorithm used in this process is slow (on the order of 1,000 times slower than symmetric algorithms), and is typically used to encrypt session keys or digitally sign a message) |
алгоритм сортировки | sort algorithm |
алгоритм цифровой подписи на основе эллиптических кривых | elliptic curve digital signature algorithm (operates on elliptic curve groups Rori) |
алгоритм шифрования RSA | Rivest-Shamir-Adleman encryption (The patented public key encryption method, introduced by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978, on which the PGP (Pretty Good Privacy) encryption program is based) |
алгоритм шифрования | cryptographic algorithm (A mathematical function used for encryption and decryption. Most cryptographic algorithms are based on a substitution cipher, a transposition cipher, or a combination of both) |
Настроить алгоритм хэширования отметок времени | Configure time stamping hashing algorithm (Office System 2010 Rori) |
обучение алгоритма распознавания | shape adaptation |
обучение алгоритма распознования | shape adaptation (The process of training the recognizer to associate a specific shape with a given character. This "personalizes" a recognizer in that it learns to map a very specific shape to a character, rather than a whole set of shapes from various writers) |
оптимизация по алгоритму Nagle | nagling (An optimization process for HTTP over TCP that increases efficiency by trying to minimize the number of packets that are required before data is sent) |
хэш-алгоритм | hash algorithm |