algorithm validation

algorithm validation
проверка правильности алгоритма, доказательство правильности алгоритма
см. тж. algorithm

Англо-русский толковый словарь терминов и сокращений по ВТ, Интернету и программированию. . 1998-2007.

Игры ⚽ Поможем написать реферат

Смотреть что такое "algorithm validation" в других словарях:

  • Cryptographic Module Validation Program — Logo of the Cryptographic Module Validation Program. The Cryptographic Module Validation Program (CMVP) is a joint American and Canadian security accreditation program for cryptographic modules. The program is available to any vendors who seek to …   Wikipedia

  • Certification path validation algorithm — The certification path validation algorithm is the algorithm which verifies that a given certificate path is valid under a given public key infrastructure (PKI). A path starts with the Subject certificate and proceeds through a number of… …   Wikipedia

  • Luhn algorithm — The Luhn algorithm or Luhn formula, also known as the modulus 10 or mod 10 algorithm, is a simple checksum formula used to validate a variety of identification numbers, such as credit card numbers, IMEI numbers, National Provider Identifier… …   Wikipedia

  • k-nearest neighbor algorithm — KNN redirects here. For other uses, see KNN (disambiguation). In pattern recognition, the k nearest neighbor algorithm (k NN) is a method for classifying objects based on closest training examples in the feature space. k NN is a type of instance… …   Wikipedia

  • K-nearest neighbor algorithm — In pattern recognition, the k nearest neighbor algorithm ( k NN) is a method for classifying objects based on closest training examples in the feature space. k NN is a type of instance based learning, or lazy learning where the function is only… …   Wikipedia

  • Extended Validation Certificate — Extended Validation Certificates (EV) [ The term validation as used here should not be confused with the Certification path validation algorithm commonly found in a certificate context.] are a special type of X.509 certificate which require more… …   Wikipedia

  • Gauss–Newton algorithm — The Gauss–Newton algorithm is a method used to solve non linear least squares problems. It can be seen as a modification of Newton s method for finding a minimum of a function. Unlike Newton s method, the Gauss–Newton algorithm can only be used… …   Wikipedia

  • Luhn mod N algorithm — The Luhn mod N algorithm is an extension to the Luhn algorithm (also known as mod 10 algorithm) that allows it to work with sequences of non numeric characters. This can be useful when a check digit is required to validate an identification… …   Wikipedia

  • Thalmann Algorithm — The Thalmann Algorithm (VVAL18) is a deterministic decompression model developed by Capt. Edward D. Thalmann, M.D., USN, who did research into decompression theory at the Naval Medical Research Institute, Navy Experimental Diving Unit, the State… …   Wikipedia

  • Secure Hash Algorithm 2 — SHA 2 (англ. Secure Hash Algorithm Version 2  безопасный алгоритм хеширования, версия 2)  собирательное название однонаправленных хеш функций SHA 224, SHA 256, SHA 384 и SHA 512. Хеш функции предназначены для создания «отпечатков» или… …   Википедия

  • Nesting algorithm — Pictorial representations of three different types of nesting algorithms: Linear, Plate and Packing Nesting algorithms are used to make the most efficient use of material or space by evaluating many different possible combinations via recursion.… …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»