Lines Matching full:algorithm
21 <li class="inline"><a href="#combine">2. Combine Algorithm</a></li>
22 <li class="inline"><a href="#clockhop">3. Anti-Clockhop Algorithm</a></li>
30 …m among the survivors of the clock cluster algorithm a set of contributors to the clock discipli…
32 …Algorithm</a> page and to determine the <em>truechimers</em> from among the candidates, leaving b…
33 …stem clock, either using the <a href="discipline.html">clock discipline algorithm</a> or using th…
34 <h4 id="combine">2. Combine Algorithm</h4>
35 <p> The clock combine algorithm uses the survivor list to produce a weighted average of both offset…
36 <p> The clock combine algorithm uses a weight factor for each survivor equal to the reciprocal of t…
37 <h4 id="clockhop">3. Anti-Clockhop Algorithm</h4>
38 …algorithm is intended for cases where multiple servers are available on a fast LAN with modern co…
39 …irst peer on the survivor list sorted by increasing root distance. The algorithm initializes the…
40 …algorithm is called immediately after the combine algorithm. If there was no old peer or the old a…
52 …algorithm works on the set of truechimers produced by the select algorithm. At each round the alg…
53 <p>Ordinarily, the combine algorithm computes a weighted average of the survivor
55 peer is among the survivors, the combine algorithm is not used. Instead,
62 …algorithm scans the associations for selectable candidates, the modem driver and local driver are …
63 <p> As previously noted, the cluster algorithm casts out outliers, leaving the survivor list for la…
72 <p>The mitigation algorithm proceeds in three steps in turn.</p>
74 … option of the <a href="miscopt.html#tos"><tt>tos</tt></a> command, the algorithm is terminated an…
75 …inherited by the corresponding system variables. Otherwise, the combine algorithm computes these v…