# algorithm validation

- sprawdzenie poprawności algorytmu

*English-Polish dictionary of Electronics and Computer Science.
2013.*

### Look at other dictionaries:

**Cryptographic Module Validation Program**— Logo of the Cryptographic Module Validation Program. The Cryptographic Module Validation Program (CMVP) is a joint American and Canadian security accreditation program for cryptographic modules. The program is available to any vendors who seek to … Wikipedia**Certification path validation algorithm**— The certification path validation algorithm is the algorithm which verifies that a given certificate path is valid under a given public key infrastructure (PKI). A path starts with the Subject certificate and proceeds through a number of… … Wikipedia**Luhn algorithm**— The Luhn algorithm or Luhn formula, also known as the modulus 10 or mod 10 algorithm, is a simple checksum formula used to validate a variety of identification numbers, such as credit card numbers, IMEI numbers, National Provider Identifier… … Wikipedia**k-nearest neighbor algorithm**— KNN redirects here. For other uses, see KNN (disambiguation). In pattern recognition, the k nearest neighbor algorithm (k NN) is a method for classifying objects based on closest training examples in the feature space. k NN is a type of instance… … Wikipedia**K-nearest neighbor algorithm**— In pattern recognition, the k nearest neighbor algorithm ( k NN) is a method for classifying objects based on closest training examples in the feature space. k NN is a type of instance based learning, or lazy learning where the function is only… … Wikipedia**Extended Validation Certificate**— Extended Validation Certificates (EV) [ The term validation as used here should not be confused with the Certification path validation algorithm commonly found in a certificate context.] are a special type of X.509 certificate which require more… … Wikipedia**Gauss–Newton algorithm**— The Gauss–Newton algorithm is a method used to solve non linear least squares problems. It can be seen as a modification of Newton s method for finding a minimum of a function. Unlike Newton s method, the Gauss–Newton algorithm can only be used… … Wikipedia**Luhn mod N algorithm**— The Luhn mod N algorithm is an extension to the Luhn algorithm (also known as mod 10 algorithm) that allows it to work with sequences of non numeric characters. This can be useful when a check digit is required to validate an identification… … Wikipedia**Thalmann Algorithm**— The Thalmann Algorithm (VVAL18) is a deterministic decompression model developed by Capt. Edward D. Thalmann, M.D., USN, who did research into decompression theory at the Naval Medical Research Institute, Navy Experimental Diving Unit, the State… … Wikipedia**Secure Hash Algorithm 2**— SHA 2 (англ. Secure Hash Algorithm Version 2 безопасный алгоритм хеширования, версия 2) собирательное название однонаправленных хеш функций SHA 224, SHA 256, SHA 384 и SHA 512. Хеш функции предназначены для создания «отпечатков» или… … Википедия**Nesting algorithm**— Pictorial representations of three different types of nesting algorithms: Linear, Plate and Packing Nesting algorithms are used to make the most efficient use of material or space by evaluating many different possible combinations via recursion.… … Wikipedia