Examples of using Computationally in English and their translations into Ukrainian
{-}
-
Colloquial
-
Ecclesiastic
-
Computer
thus can be computationally expensive.
The bottom line on the algorithm is that the network node must perform computationally intensive operations
Computationally, for an n× n matrix,
Parallelization: Realistic problems are typically very demanding computationally, so parallelization of the code is necessary, to run on clusters of multiprocessors and/or many networked computers simultaneously.
Some issues of statistical conclusion validity that arise specifically in online field experiments include issues such as computationally efficient methods for creating confidence intervals with dependent data(Bakshy and Eckles 2013).
μ-recursive functions, and the lambda calculus, all of which have computationally equivalent power.
Lambda calculus is known to be computationally equivalent in power to many other plausible models for computation(including Turing machines);
This technology has been applied to computationally intensive scientific,
cannot be broken even with unlimited computing powerâan example is the one-time padâbut these schemes are more difficult to implement than the best theoretically breakable but computationally secure mechanisms.
it is computationally infeasible to discover the other key.
it is computationally infeasible to discover the other key.
For instance, HTCondor[7] the open-source high-throughput computing software framework for coarse-grained distributed rationalization of computationally intensive tasks can be configured to only use desktop machines where the keyboard
It's computationally limited in what it can do.
Many volume visualization algorithms are computationally expensive and demand large data storage.
Finding communities within an arbitrary network can be a computationally difficult task.
This results in more realistic crowd behavior though may be more computationally intensive than simpler techniques.
realistic processes can now be simulated computationally.
However, compared with standard hash functions, cryptographic hash functions tend to be much more expensive computationally.
thus are computationally efficient.
Also, it is computationally intractable to detect the presence of an asymmetric backdoor under black-box queries.