- handshaking algorithm
- алгоритм взаимного представления (при установлении связи), алгоритм "рукопожатия"
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Англо-русский словарь по компьютерной безопасности. Академик.ру. 2011.
Degree (graph theory) — A graph with vertices labeled by degree In graph theory, the degree (or valency) of a vertex of a graph is the number of edges incident to the vertex, with loops counted twice.[1] The degree of a vertex … Wikipedia
Edge coloring — A 3 edge coloring of the Desargues graph. In graph theory, an edge coloring of a graph is an assignment of “colors” to the edges of the graph so that no two adjacent edges have the same color. For example, the figure to the right shows an edge… … Wikipedia
Flexible Architecture for Simulation and Testing — The FAST Project is a new hybrid hardware prototyping platform enabled by integrating a variety of hardware components on a printed circuit board (PCB) to implement Chip Multiprocessor (CMP) or Multiprocessor (MP) systems. The Flexible… … Wikipedia
Transport Layer Security — (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications on the Internet for such things as web browsing, e mail, Internet faxing, instant messaging and other data transfers. There are… … Wikipedia
Cipher suite — A cipher suite is a named combination of authentication, encryption, and message authentication code (MAC) algorithms used to negotiate the security settings for a network connection using the Transport Layer Security (TLS) or Secure Sockets… … Wikipedia
Telephone exchange — A telephone operator manually connecting calls with cord pairs at a telephone switchboard. In the field of telecommunications, a telephone exchange or telephone switch is a system of electronic components that connects telephone calls. A central… … Wikipedia
High-level synthesis — (HLS), sometimes referred to as C synthesis, electronic system level (ESL) synthesis, algorithmic synthesis, or behavioral synthesis, is an automated design process that interprets an algorithmic description of a desired behavior and creates… … Wikipedia
Punter (protocol) — Punter is a generic term referring to any of various protocols for file transfer developed in the 1980s by Steve Punter, or their variants. Contents 1 PET Transfer Protocol 2 What It Looked Like to the User 3 C1 3.1 … Wikipedia
ASCII — American Standard Code for Information Interchange (ASCII), pronEng|ˈæski [ [http://www.m w.com/cgi bin/audio.pl?ascii001.wav=ASCII Audio pronunciation for ASCII] . Merriam Webster . Accessed 2008 04 14.] is a character encoding based on the… … Wikipedia
Route inspection problem — In graph theory, a branch of mathematics, the Chinese postman problem (CPP), postman tour or route inspection problem is to find a shortest closed path or circuit that visits every edge of a (connected) undirected graph. When the graph has an… … Wikipedia
Traffic shaping — (also known as packet shaping ) is the control of computer network traffic in order to optimize or guarantee performance, lower latency, and/or increase usable bandwidth by delaying packets that meet certain criteria. [… … Wikipedia