algorithmic

algorithmic

1. Apply important algorithmic design paradigms and methods of analysis.

" 会应用重要算法设计范例及分析方法。

2. Calculator algorithm with postfix notation.

(译):计算器算法后缀符号。

3. "What AES will offer is a more efficient algorithm.

AES所提供的是一种更有效的算法。

4. ATO:an approximate translation algorithm for OIL based ontology.

ATO:一种基于OIL的本体论近似翻译算法

5. ERS SAR images are used to test our detection algorithm.

ERS SAR图像用于验证本文算法。

6. GSP algorithm is an AprioriAll based algorithm.

GSP算法是一个基于AprioriAll的算法。

7. The Nagle algorithm is fully described in IETF RFC 896.

IETF RFC 896中详细介绍了Nagle算法。

8. The OID identifies the algorithm that was used to compute the hash.

OID标识用于计算哈希的算法。

9. SECRET is a new algorithm for scalable linear regression trees.

SECRET是一个关于可伸缩线形回归树的算法。

10. An array that contains the block sizes supported by the algorithm.

一个数组,包含此算法支持的块大小。

11. An array that contains the key sizes supported by the algorithm.

一个数组,包含此算法支持的密钥大小。

12. An algorithm? Did you finish it in System Memory using CPU?

一个算法?莫非你是在CPU和系统内存中计算的?

13. A digital watermarking algorithm based on quadtree fractal coding.

一种基于四叉树分形编码的数字水印算法。

14. Eg: The study of a parallel algorithmic method of adaptive ABMA .

一种自适应块匹配并行算法的研究及性能分析。

15. Algorithmic sound, sampled sound file alarm time.

下一次报警将被激活的声音。

16. The size of the key used by the asymmetric algorithm.

不对称算法使用的密钥的大小。

17. But our changes only modify the presentation and output of the process, nothing algorithmic.

不过我们的改变只是调整了表达方式和整个过程的输出,并没有涉及到算法。

18. Study of Middle and Low Level Algorithm in Image Understanding.

中低层图像理解算法研究短句来源我理解了。

19. Sage &Husa algorithm is used to avoid filtering divergence.

为了避免滤波发散 ,卡尔曼滤波算法采用 Sage &Husa算法。

20. Disables the Nagle algorithm for send coalescing.

为发送合并禁用Nagle算法。

21. The main use of the Bezier curve algorithm.

主要运用了Bezier曲线算法.-This is a short picture screen saver.

22. Introduces a most short-path the algorithm programming!

介绍一个最短路径的算法编程!

23. The CIR blending DFS algorithm is introduced.

介绍了CIR混合动态频率选择 (DFS)算法 .

24. Using VB to Realize Computer Ruler and Its Derived Graph Algorithm.

介绍用VB实现电脑面尺的算法及程序。

25. Syntactic and semantic processing from a linguistic and an algorithmic perspective.

从语言和算法角度的句法和语义处理。

26. They have also compiled algorithmic laws of growth for hundreds of seashells and butterflies.

他们还汇集了上百种海贝和蝴蝶的生长算法法则。

27. Practice shows that the algorithm is applicable.

以上数值方法经实际运行,证明是切实可行的。

28. But the premise of using the algorithm is that echo path is sparse.

但是这种算法有效的前提是回声路径是稀疏的。

29. For a value, using a binary search algorithm.

使用二进制搜索算法在一维的排序。

30. Uses the modified self-training Bayes algorithm to recognize spam.

使用已修改的自学习模式算法识别垃圾邮件。

31. Use a second algorithm to validate your results.

使用第二套算法来验证你的结果。

32. Track initiation algorithm based on th.

修正的逻辑航迹起始算法。

33. Furthermore, ray casting method is a basic method of DVR algorithm.

光线投射法又是三维直接体显示算法中最基本的一种方法。

34. Fairness Algorithm (FA) is the key technology in RPR.

公平算法是弹性分组环中的关键技术。

35. This is a optimized algorithm about circle.

关于圆的一个优化算法

36. This is a optimized algorithm about ellipse.

关于椭圆的一个优化算法

37. This is an optimized algorithm about straight line.

关于直线的一个优化算法

38. Others argue that the hardware is sufficient, but that we lack appropriate software models and algorithmic techniques.

其他人认为硬件足够了,但是我们缺乏适当的软件模型和算法技术。

39. Others: Volume limiter algorithm in case you want to use it.

其它:需要时可以音量限制。

40. Firstly, the thesis introduces the algorithm theory of ADPCM.

其次,本文在对ADPCM G.

41. Local algorithm for segmented image interpolation.

分割图像插值的一种局部算法。

42. Is specified, the driver chooses a filtering algorithm.

则驱动程序将选择筛选算法。

43. Creates a Digital Signature Algorithm (DSA) signature.

创建数字签名算法(DSA)签名。

44. Study On Routing Algorithm In Gigabit.

千兆以太网路由算法研究。

45. How good is the simplex algorithm?

单纯形算法有多好?

46. Describe the dynamic-programming paradigm and explain when an algorithmic design situation calls for it.

叙述动态规划的典范和解释当什么情况算法设计会需要它。

47. The padding mode used in the hashing algorithm.

哈希算法中使用的填充模式。

48. The hash algorithm specifies the size of the hash code.

哈希算法指定哈希代码的大小。

49. As we shall not deal with algorithmic problems, we leave the term "efficient" undefined.

因为不讨论算法问题,我们对“有效”这一术语不作具体解释。

50. Therefore, we recommend that you use the AES algorithm.

因此,建议使用AES算法。

51. Correct control algorithm is the key of network congestion control.

因此,正确的控制算法是网络拥塞控制的关键。

52. Therefore MP is a more effective imaging algorithm.

因而是一种更有效的成像算法。

53. The computer may work as (assistant) composer.In this case one speaks of algorithmic composition.

在以算法为主要创作手段的情况下,计算机可以充当(辅助)作曲家的角色。

54. Consider time and space trade-offs in deciding on your algorithm.

在决定你的算法时要权衡时间和空间的花费。

55. Compared with the existing system,the efficiency of MTC is improved 57% in the compiling process of SPARC chip MB86901 algorithmic description.

在对SPARC芯片M B 86901算法描述编译过程中,M TC的编译效率比现有编译系统提高了57%.

56. A. ARC has fatal errors in strategy and algorithm.

在战略和算法上自动资源编辑器有错误。

57. Then a configuration algorithm based on the model is presented.

在此基础上给出了一种配置算法。

58. A statement of fact to be tested for truth or falsehood within an algorithm.

在算法中判定某个事实真假性的语句。

59. Mean Shift is a very good algorithm in visual target tracking area.

在视觉跟踪领域,Mean Shift算法是一个非常优秀的算法,是国外最近几年才发展起来的。

60. It also imports a new safe Hash algorithm in this scheme.

在该方案中还引用了一种新的安全哈希算法。

61. Bad Authentication Algorithm Value Entry %1! S!

坏身份验证算法值项%1!

62. Block ciphers use the same encryption algorithm for each block.

块密码对每个块使用相同的加密算法。

63. Study of Optimization Algorithm Bas.

基于动态神经网络优化算法研究;

64. Balmer formula is reconstructed based on genetic algorithm.

基于遗传算法构建了巴耳末公式 .

65. The failure detection algorithm is very conservative.

失败检测算法是非常保守的。

66. It allows the caller's code to become part of the sort algorithm.

它允许调用方的代码成为排序算法的一部分。

67. Rms algorithm and FFT algorithm have been achieved.

实现了均方根算法和FFT算法。

68. Experiment results demonstrate that the algorithm is effective.

实验结果表明该算法是行之有效的。

69. ADRC algorithm is used to control complex chemical processes.

对一类复杂的化工过程模型,采用自抗扰算法进行控制。

70. Description of the algorithm used with the key.

对密钥所用算法的说明。

71. The formula and the algorithm giv...

对所提出的算法进行了实验验证。

72. The algorithmic process by which results in a result set are sorted or ranked according to their relevance.

对检索结果按照一定的相关度算法计算排序。

73. Gets or sets the asymmetric algorithm key used for signing a.

对象进行签名的不对称算法密钥。

74. Property contains the hashing algorithm used by this connection.

属性包含该连接使用的哈希算法。

75. Property contains the encryption algorithm used by the connection.

属性包含连接使用的加密算法。

76. Hungarian algorithm with Steward path method is tedious.

已报道的结合“Steward通路”的匈牙利算法及一些其它的算法运算量很大,很难推广应用;

77. Constant to establish the limits of that algorithm.

常数来建立该算法的限制。

78. Based on these models, a temporal detection algorithm is proposed.

并以这四种时域模型为基础,提出了云层背景下点目标的时域检测算法。

79. Especially,it tells of the theory and realization of FBR algorithm.

并对基于频率的替换算法的原理、实现方法做了详细阐述。

80. PRN combined feature selection algorithm is proposed.

并提出改进的PRN组合特征选择算法。

英语宝典
考试词汇表