Examples of using The algorithm used in English and their translations into Japanese
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
-
Programming
They implement the algorithm used by these two UNIX programs.
The algorithm used to determine this is based entirely on two things:.
It means that you control on your computer, the algorithm used to sort and prioritize your feed.
The algorithm used for that will be described in the next section.
People also translate
The algorithm used for'cryptmethod'"zip" is breakable. A 4 character key.
Our software has evolved over the years, increasingly improving the algorithm used to normalize the volume.
Compression method The algorithm used to compress data prior to encryption.
Our software has evolved over the years, increasingly improving the algorithm used to normalize the volume.
The algorithm used is capable of differentiating between more than 1 million features of a human face.
Doctor Web's virus analysts studied the algorithm used by this Trojan to generate control server names and registered several such names.
The algorithm used here was introduced around the year 532 by Dionysius Exiguus.
The algorithm used here was introduced around the year 532 by Dionysius Exiguus.
The algorithm used for generating random interface identifiers is no longer restricted to just MD5.
Can I customize the algorithm used to generate the riskScore returned by the minFraud service?
The algorithm used for generating these items from the security parameters is described in Section 6.3.
This application note discusses the algorithm used for the calculation of folded-frequency locations in the first Nyquist zone, and includes a step-by-step guide for the Folded-Frequency Calculator.
The algorithm used by choices() uses floating point arithmetic for internal consistency and speed.
The algorithm used by this malware is time-based and can be calculated using the values of year and month.
The algorithm used to rank channels and videos on YouTube uses the number of views, likes, comments etc.
The algorithm used in HRT is a 22 step segment of the total called the Algorithm of Human Transformation.
The algorithm used was developed by the XLSTAT team and outperforms by far all of the software solutions that exist in terms of speed.
The algorithm used will depend upon whether crypt_set_format() has been called and whether a global default format has been specified.
The algorithm used for encryption is specified by the SoftEther VPN Server administrator(cannot be specified by connection source computer users).