node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
2,586 | 3 | Directory-based_cache_coherence:directory-based cache coherence computer engineering directory-based cache coherence type cache coherence mechanism directories used manage caches place snoopy methods due scalability snoopy bus-based methods scale poorly due use broadcasting methods used target performance scalability directory systems full bit vector format possible cache line memory bit used track whether every individual processor line stored cache full bit vector format simplest structure implement least scalable sgi origin 2000 uses combination full bit vector coarse bit vector depending number processors directory entry must 1 bit stored per processor per cache line along bits tracking state directory leads total size required number processors ×number cache lines storage overhead ratio number processors cache block size×8 observed directory overhead scales linearly number processors may fine small number processors implemented large systems size requirements directory becomes excessive example block size 32 bytes 1024 processors storage overhead ratio becomes 1024/ 32×8 400 coarse bit vector format similar structure full bit vector format though rather tracking one bit per processor every cache line directory groups several processors nodes storing whether cache line stored node rather line improves size requirements expense bus traffic saving processors per node × total lines bits space thus ratio overhead replacing number processors number processor groups bus request made cache line one processor group directory broadcasts signal every processor node rather caches contain leading unnecessary traffic nodes n't data cached case directory entry uses 1 bit group processors cache line example full bit vector format consider 1 bit 8 processors group storage overhead 128/ 32×8 =50 significant improvement full bit vector format cache stores small subset blocks main memory particular time hence entries directory belong uncached blocks sparse directory format wastage reduced storing cached blocks directory.consider processor cache size 64kb block size 32 bytes main memory size 4mb maximum number entries directory sparse directory format 2048 directory entry blocks memory number entries directory 131072 thus evident storage improvement provided sparse directory format significant format directory decentralised distributed among caches share memory block different caches share memory block arranged form binary tree cache accesses memory block first root node memory block root node information head sharing counter field sc sc field number caches share block cache entry pointers next sharing caches known l-chd r-chd condition directory binary tree number balanced i.e number nodes left sub tree must equal one greater number nodes right subtree subtrees also number balanced format memory holds directory pointer latest cache accessed block cache pointer previous cache accessed block processor sends write request block memory processor sends invalidations chain pointers directory cache block replaced need traverse list order change directory increases latency order prevent doubly linked lists widely used cached copy pointers previous next cache accesses block limited pointer format uses set number pointers track processors caching data new processor caches block free pointer chosen pool point processor options handling cases number sharers exceeds number free pointers one method invalidate one sharers using pointer new requestor though costly cases block large number readers lock another method separate pool free pointers available blocks method usually effective number blocks shared large number processors normally large | [
1776,
7802,
2339
] | Test |
2,587 | 4 | Trusted_client:trusted client computing trusted client device program controlled user service restrictions designed prevent use ways authorized provider service client device vendors trust sell consumers trust examples include video games played computer network content scramble system css dvds trusted client software considered fundamentally insecure security broken one user break trivially copyable available others computer security specialist bruce schneier states average user anything works need complex security software skilled attacker hand nothing works trusted client hardware somewhat secure complete solution trusted clients attractive business form vendor lock-in sell trusted client loss charge would otherwise economically viable associated service one early example radio receivers subsidized broadcasters restricted receiving radio station modern examples include video recorders forced law include macrovision copy protection dvd region code system region-coded video game consoles technically knowledgeable consumers manufacturers frequently bypass limiting features trusted clients — simple replacement fixed tuning capacitor early locked radios successful decss cryptographic attack css 1999 manufacturers resorted legal threats via digital millennium copyright act similar laws prevent circumvention varying degrees success however nature internet enables crack discovered published virtually impossible remove trusted computing aims create computer hardware assists implementation restrictions software attempts make circumvention restrictions difficult | [
2370,
1315
] | Test |
2,588 | 1 | ImageNet:imagenet imagenet project large visual database designed use visual object recognition software research 14 million images hand-annotated project indicate objects pictured least one million images bounding boxes also provided imagenet contains 20,000 categories typical category balloon strawberry consisting several hundred images database annotations third-party image urls freely available directly imagenet though actual images owned imagenet since 2010 imagenet project runs annual software contest imagenet large scale visual recognition challenge ilsvrc software programs compete correctly classify detect objects scenes challenge uses trimmed list one thousand non-overlapping classes 30 september 2012 convolutional neural network cnn called alexnet achieved top-5 error 15.3 imagenet 2012 challenge 10.8 percentage points lower runner made feasible due utilization graphics processing units gpus training essential ingredient deep learning revolution according economist suddenly people started pay attention within ai community across technology industry whole 2015 alexnet outperformed microsoft deep cnn 100 layers imagenet 2015 contest ai researcher fei-fei li began working idea imagenet 2006 time ai research focused models algorithms li wanted expand improve data available train ai algorithms 2007 li met princeton professor christiane fellbaum one creators wordnet discuss project result meeting li went build imagenet starting word-database wordnet using many features assistant professor princeton li assembled team researchers work imagenet project used amazon mechanical turk help classification images presented database first time poster 2009 conference computer vision pattern recognition cvpr florida imagenet crowdsources annotation process image-level annotations indicate presence absence object class image tigers image tigers image object-level annotations provide bounding box around visible part indicated object imagenet uses variant broad wordnet schema categorize objects augmented 120 categories dog breeds showcase fine-grained classification one downside wordnet use categories may elevated would optimal imagenet people interested lady gaga ipod mini rare kind diplodocus 2012 imagenet world largest academic user mechanical turk average worker identified 50 images per minute ilsvrc aims follow footsteps smaller-scale pascal voc challenge established 2005 contained 20,000 images twenty object classes order democratize imagenet fei-fei li proposed pascal voc team collaboration beginning 2010 research teams would evaluate algorithms given data set compete achieve higher accuracy several visual recognition tasks resulting annual competition known imagenet large scale visual recognition challenge ilsvrc ilsvrc uses trimmed list 1000 image categories classes including 90 120 dog breeds classified full imagenet schema 2010s saw dramatic progress image processing around 2011 good ilsvrc classification error rate 25 2012 deep convolutional neural net called alexnet achieved 16 next couple years error rates fell percent 2012 breakthrough combined pieces dramatic quantitative improvement marked start industry-wide artificial intelligence boom 2015 researchers microsoft reported cnns exceeded human ability narrow ilsvrc tasks however one challenge organizers olga russakovsky pointed 2015 programs identify images belonging one thousand categories humans recognize larger number categories also unlike programs judge context image 2014 fifty institutions participated ilsvrc 2015 baidu scientists banned year using different accounts greatly exceed specified limit two submissions per week baidu later stated fired team leader involved would establish scientific advisory panel 2017 29 38 competing teams greater 95 accuracy 2017 imagenet stated would roll new much difficult challenge 2018 involves classifying 3d objects using natural language creating 3d data costly annotating pre-existing 2d image dataset expected smaller applications progress area would range robotic navigation augmented reality | [
416,
2945,
898,
10658,
37,
1001,
2901,
11163
] | Validation |
2,589 | 7 | My_Phone:phone phone online service companion mobile client application microsoft service launched october 6 2009 provided free mobile phone back-up solution wirelessly synchronizing contacts calendar appointments tasks text messages browser favorites photos music video documents password-protected online portal users could access manage information service also enabled photo sharing markets set features dealing lost phone sold premium package requiring one-time fee phone supported windows mobile os versions 6.0 6.1 6.5 available globally 25 languages service used windows live id authentication windows live server infrastructure storing user information june 8 2011 microsoft announced phone would discontinued sync phones ending august 7 2011 website access data ending october 6 2011 data contacts calendar entries text messages photos moved skydrive since rebranded onedrive microsoft announced launched beta version phone mobile world congress february 16 2009 approximately 200,000 users 200 countries beta tested service scalability features service offered following free features phone offers set premium features event lost phone features include premium features available users free service as-needed basis sold package requiring one-time fee 4.99 us package meant activated phone portal phone lost stolen long device turned connectivity package includes 7-day access 3 ring 3 map 1 lock 1 erase premium package initially free charge trial since december 2009 package supplied one free activation used time premium package available united states canada mexico united kingdom germany france italy spain portugal denmark netherlands greece poland finland norway sweden brazil australia japan singapore taiwan | [
4704,
11559,
10986,
6987,
7983,
6709,
9434
] | Test |
2,590 | 0 | SABLE:sable sable xml markup language used annotate texts speech synthesis defines tags control written words numbers sentences audibly reproduced computer sable developed informal joint project sun microsystems bell labs university edinburgh initial letters make word sable initiative combine three previous speech synthesis markup languages ssml stml jsml sable used festival speech synthesis system development sable appears stopped 2010 reached status formal standard recommended specification | [
4768,
1890,
3533,
214,
6838,
11004,
479
] | Test |
2,591 | 3 | Tournament_of_the_Gods:tournament gods sid enters tournament shortly crowned champion fallen angel aquross infects hideous disease requires steal life energy angels constant pain relief lies drug kills pain causes sexual urges denied sid must defeat evil aquross condensed single 35-minute episode released us subtitled white-cassette vhs pink pineapple studio mike toole comparing ova gor find interesting chris beveridge commented video strange piece good fun moments english japanese | [
2156,
6797
] | None |
2,592 | 3 | N-version_programming:n-version programming n -version programming nvp also known multiversion programming multiple-version dissimilar software method process software engineering multiple functionally equivalent programs independently generated initial specifications concept n -version programming introduced 1977 liming chen algirdas avizienis central conjecture independence programming efforts greatly reduce probability identical software faults occurring two versions program aim nvp improve reliability software operation building fault tolerance redundancy general steps n -version programming n -version programming applied software switching trains performing flight control computations modern airliners electronic voting save system detection zero-day exploits among uses | [
4987,
9677
] | Test |
2,593 | 2 | Microsoft_YaHei:microsoft yahei microsoft yahei sans-serif gothic typeface created founder electronics monotype corporation commission microsoft hinting font undertaken monotype imaging cjk ideographic characters designed founder electronics foundry senior designer li qi 齐立 development began 2004 microsoft commissioned beijing founder electronics co. ltd. cleartype font use simplified chinese version windows vista default font ideographs yahei based previous sans-serif font family designer made early 1990s like yahei feature flared stroke terminals changes prototype fonts include redesigning hook stroke longer end addition 'foot ending stroke terminal readjusting black white proportions glyphs introduction dents stroke path outlines intersect stroke path outlines flattening diagonal dot stroke top top glyph yahei optimized screen use font family originally includes two fonts regular bold weights named codice_1 'microsoft yahei bold separate file codice_2 opentype features include vertical writing microsoft yahei distributed windows since windows vista default user interface font language set simplified chinese aims legible simsun predecessor used cleartype also included simplified chinese version microsoft office 2007 downloading installing simplified chinese cleartype fonts windows xp microsoft also makes microsoft yahei available windows xp font file contains 20,902 original cjk unified ideographs code points specified unicode plus approximately 80 code points defined standardization administration china supports gbk character set localized glyphs semilight semibold heavy weight fonts introduced windows 10 redstone 4 spring creators update microsoft yahei ui version microsoft yahei alternate character design reduced line height introduced windows 8 part microsoft yahei update microsoft yahei ui included ttc file along microsoft yahei founder electronics versions fonts released various character sets depending family gb2312-80 simplified chinese characters gb12345-90 traditional chinese characters gbk simplified traditional chinese characters big-5 hong kong taiwan region gb18030-2000 includes gbk big-5 characters mapped unicode cjk unified ideographs extension fzlantinghei 方正兰亭黑 founder electronics variant based microsoft yahei latin glyphs changed resemble arial fzlantinghei-db fzlantinghei-b correspond font weights yahei yahei bold respectively family includes 14 font styles 10 weights 3 widths condensed extended widths h width r weights released character set fonts include gb2312-80 gb12345-90 gbk big-5 gb18030-2000 fzlantinghei 方正兰亭刊黑 based fzlantinghei designed printing family includes 1 font styles 1 weight 1 width font weight equal el middle width fzlantinghei released character set fonts include gb2312-80 gb12345-90 gbk fzlantingyuan 方正兰亭圆 based fzlantinghei rounded terminals corners elimination 'foot stroke terminals latin glyphs changed lowercase g less like arial designers included cui yan han chunli zhang zhang shao wei yan yao li xueying wang ji jie zhao yue yuan family includes 9 font styles 9 weights h eb b db1 db r l el 1 width medium released character set fonts include gb2312-80 gb12345-90 gbk fzlantinghei bronze prize 2009 dfa design asia award | [
4130,
9539,
7973,
8422,
1098,
4138,
2221,
4141,
1487,
6797,
3538,
4146,
4148,
8374,
9654,
4127
] | Test |
2,594 | 3 | Computer_display_standard:computer display standard computer display standards combination aspect ratio display size display resolution color depth refresh rate associated specific expansion cards video connectors monitors various computer display standards display modes used history personal computer often combination aspect ratio specified width-to-height ratio display resolution specified width height pixels color depth measured bits per pixel refresh rate expressed hertz associated screen resolution refresh rate display adapter earlier display adapters simple frame-buffers later display standards also specified extensive set display functions software controlled interface beyond display modes vesa industry organization defined several standards related power management device identification ergonomics standards set tco number common resolutions used computers descended original ibm pc supported families personal computers de facto standards usually originated one manufacturer reverse-engineered others though vesa group co-ordinated efforts several leading video display adapter manufacturers video standards associated ibm-pc-descended personal computers shown diagram table alongside early macintosh makes comparison early 1990s onwards manufacturers moved pc display standards thanks widely available affordable hardware although common standard prefixes super ultra indicate specific modifiers base standard resolutions several others prefixes also often combined wqxga whuxga levels stacking hindered consideration towards readability decline added x especially even defined hierarchy value s/x/u/+ modifiers | [
134,
9741,
4114,
2838,
10658,
6069,
9016,
7998,
8514,
1614,
4567,
344,
5339,
11487,
9057,
1387,
8301,
10862,
11631,
11634,
5368,
3323
] | Test |
2,595 | 9 | Olivier_Danvy:olivier danvy olivier danvy french computer scientist specializing programming languages partial evaluation continuations professor yale-nus college singapore danvy received phd degree université paris vi 1986 notable number scientific papers acknowledge help writing nature editor declan butler reports analysis acknowledgments nearly one third million scientific papers reports danvy thanked person computer science danvy quoted stunned find name top list ascribing position series coincidences multidisciplinary well travelled part international phd programme networker belongs university department long tradition many international visitors | [
2881,
10403,
8262,
10246,
10395,
9680,
1783,
10616,
1947
] | None |
2,596 | 8 | SAP_NetWeaver_Application_Server:sap netweaver application server sap netweaver application server sap web application server component sap netweaver works web application server sap products abap application servers including message server represent application layer multitier architecture abap-based sap system application servers execute abap applications communicate presentation components database also using message server architecture sap web application server separated 5 areas sap netweaver accept multiple forms authentication sap netweaver application server connectivity layer supports https required encrypted communications via secure socket layer possible enable ssl using sap cryptographic library company running traditional sap systems uses rfc diag protocols secure network communications required encrypted communications well | [
1920,
4485,
7430,
7175,
1937,
7443,
1556,
8350,
7457,
3746,
8994,
11682,
3237,
9125,
7338,
9387,
44,
11439,
10800,
6067,
9909,
6714,
4797,
3517,
1991,
11134,
1363,
595,
3414,
3545,
5210,
865,
2404,
4837,
6379,
9580,
11376,
8691,
1780,
106... | Validation |
2,597 | 6 | Orlov_block_allocator:orlov block allocator orlov block allocator algorithm define particular file reside given file system blockwise speed disk operations scheme named creator grigoriy orlov first posted brief description implementation openbsd technique later used bsd fast filesystem kernel variants performance file system dependent many things one crucial factors filesystem lays files disk general best keep related items together linux ext2 ext3 filesystems instance tried spread directories cylinders disk imagine setting system users home directories /home first-level directories within /home i.e home directories numerous users placed next may space left contents directories user files thus end placed far directories contain performance suffers spreading directories disc allows files directory remain less contiguous number and/or size grows situations causes excessive spreading data disc surface essentially orlov algorithm tries spread top-level directories assumption unrelated directories created root directory filesystem considered top-level directories theodore ts added special inode flag allows system administrator mark directories top-level directories well /home lives root filesystem people set systems way simple codice_1 command make system treat top-level directory creating directory top-level directory orlov algorithm tries put cylinder group parent little care taken however ensure directory contents also able fit cylinder group many inodes blocks available group directory placed different cylinder group resources available result hopefully much better locality files truly related likely accessed together orlov block allocator shown offer performance gains workloads traverse directory trees freebsd one benchmark result ext3 new allocator seems posted results promising time required traverse linux kernel tree reduced roughly 30 orlov scheme needs rigorous benchmarking also needs serious stress testing demonstrate performance degrade filesystem changed time | [
2432,
9762,
8772,
5256,
4298,
8298,
6352,
2197,
246,
2199,
6808
] | Train |
2,598 | 2 | Communications_ToolBox:communications toolbox communications toolbox generally shortened comm toolbox ctb suite application programming interfaces libraries device drivers classic mac os implemented wide variety serial network communication protocols using ctb one could write application would seamlessly work appletalk modem variety connections developers could also write plug-in communications modules known tools allowing ctb-aware application use connection method ctb notoriously slow buggy received mixed support developers examples applications using simple tasks common many target uses like terminal emulators almost always ran faster designed target single connection type avoid ctb ctb based shared library concept era mac os include shared library system instead ctb wrote driver manager layer communications resource manager resource manager responsible installing managing various drivers tools provided various functions within ctb system three primary types tools associated manager connection manager handled communications drivers opened channels remote services terminal manager managed tools implemented character conversion command string interpretation needed support sort terminal emulator file transfer manager sort file transfer protocol applications could use managers ctb typical terminal emulator would use connecting tool selected connection manager another terminal manager periodically using file transfer manager user request case common terminal emulators like versaterm macterminal however another application might use one say connection manager set communications quickmail eudora well-known examples applications typically used gui elements supplied managers handle user interaction could also enumerate tools provide custom gui perhaps best known tool apple modem tool provided serial communications drivers well system storing setup commands connection initiated using modem tool link modem opened commands sent link established dialling modem tool also indicative problems ctb general slow lacking features quickly became outdated modem speeds improved saw little development effort support 1.5 version addressing problems released 1993 even finding proved difficult update needed support higher speeds 28kbit/s modems become common apple also produced simple serial tool appletalk tools additional connection methods tty vt102 tools terminal emulation text xmodem tools file transfers third party tools common supporting connections including teleport modem plugged apple desktop bus thus required custom drivers apple x.25 isdn tools variety examples | [
576,
1121,
10833,
2804
] | Test |
2,599 | 9 | Chomski:chomski pattern parsing virtual machine previously called 'chomski noam chomsky pp pattern parser also provisional name refer command line computer language utility interpreter language used parse transform text patterns formal mathematical languages utility reads input files character character sequentially applying operation specified via command line pp script outputs line developed 2006 c language pp derived number ideas syntax elements sed command line text stream editor pattern-parser language uses many ideas taken sed unix stream editor example sed includes two virtual variables data buffers known pattern space hold space two variables constitute extremely simple virtual machine chomski language virtual machine augmented several new buffers registers along number commands manipulate buffers parsing virtual machine includes tape data structure well stack data structure along workspace equivalent sed pattern space number buffers lesser importance virtual machine designed specifically apt parsing formal languages parsing process traditionally involves two phases lexical analysis phase formal grammar phase lexical analysis phase series tokens generated tokens used input set formal grammar rule chomski virtual machine uses stack hold tokens uses tape structure hold attributes parse tokens pp script two phases lexing parsing combined one script file series command words used manipulate different data structures virtual machine purpose pp tool parse transform text patterns text patterns conform rules provided formal language include many context free languages whereas traditional unix tools awk sed grep etc process text one line time use regular expressions search transform text pp tool processes text one character time use context free grammars transform compile text however common unix philosophy pp tool works upon plain text streams encoded according locale local computer produces output another plain text stream allowing pp tool used part standard pipeline motivation creation pp tool chomski virtual machine allow writing parsing scripts rather resort traditional parsing tools lex yacc following example shows typical use pp pattern parser -e option indicates pattern parse expression follows script c multiline comments /* ... */ deleted input stream pattern parser tool designed used filter pipeline example generate data make small change replacing x however functionality currently available pp tool also includes comprehensive script viewer debugger read piped standard input several commands put together file called example substitute.pss applied using -f option read commands file besides substitution forms simple processing possible example following uses accumulator-increment command a+ count commands count number lines file complex pp constructs possible allowing serve simple highly specialised programming language pp two flow control statements apart test structures codice_1 codice_2 codice_3 etc namely .reparse .restart commands jump back parse label labels permitted idea chomski arose limitations regular expression engines use line line paradigm limitations parsing nested text patterns regular expressions chomski evolved natural progression grep sed command development began approximately 2006 continues sporadically pattern parsing script language general purpose programming language like sed designed limited type usage currently support unicode strings since current implementation uses standard c character arrays since virtual machine behind pattern parser language considerably complex sed necessary able debug scripts facility currently provided within 'pp executable | [
9345,
515,
5635,
9733,
9735,
3976,
4750,
2198,
5399,
6812,
9507,
7847,
4398,
7983,
8499,
9780,
9911,
1336,
7356,
965,
8262,
8522,
3659,
9946,
6120,
11625,
5612,
4850,
5492,
9204,
6138,
2045,
5759
] | Test |
2,600 | 5 | Tradervoice:tradervoice tradervoice underlying technology pool supports real time communications brokers bankers following move electronic banking 90's key suppliers industry alphabetical order | [
3168
] | None |
2,601 | 4 | FRISK_Software_International:frisk software international frisk software international icelandic software company developed f-prot antivirus f-prot aves antivirus anti-spam service name derived initial letters personal name patronymic friðrik skúlason founder company founded 1993 acquired commtouch known cyren 2012 frisk software competes antivirus industry avast avira eset f-secure kaspersky mcafee panda security sophos symantec among others f-prot antivirus one oldest antivirus products first release 1989 world first heuristic engine sold home corporate packages editions windows linux bsd corporate versions microsoft exchange solaris certain ibm eservers linux bsd versions available home users free charge virus definition updates free 30-day trial versions platforms downloaded f-prot aves specifically targeted towards corporate users company also produced genealogy program called espólín púki spellchecker additional features summer 2012 frisk acquired cyren israeli-american provider security products friðrik skúlason joined cyren vice-president antivirus technologies f-prot antivirus antivirus product developed frisk software international available related versions several platforms available microsoft windows microsoft exchange server linux bsd solaris aix ibm eservers *nix scanning engine used f-prot provides signature based detection capability heuristics low use computer resources 1991 f-prot antivirus dos became world first heuristic behavior scanner f-prot dos since discontinued frisk software international allows others develop applications based scanning engine use sdk specifically released many software vendors use f-prot antivirus engine including suse sdk known today commtouch antivirus sdk friðrik skúlason also sometimes known frisk founder frisk software international one founding members caro computer antivirus research organization originally developed f-prot antivirus computer support work subsequently started company many years technical editor virus bulletin | [
2049,
7809,
131,
5891,
1417,
3981,
6797,
10637,
9488,
9364,
4374,
1052,
156,
11166,
6431,
2721,
5924,
2213,
550,
1318,
6823,
8614,
8615,
2859,
3243,
6699,
7983,
6834,
4403,
9523,
10166,
823,
7103,
704,
9537,
7362,
10308,
4421,
202,
1355,
... | Test |
2,602 | 0 | Brown_clustering:brown clustering brown clustering hard hierarchical agglomerative clustering problem based distributional information proposed peter brown vincent della pietra peter desouza jennifer lai robert mercer typically applied text grouping words clusters assumed semantically related virtue embedded similar contexts natural language processing brown clustering ibm clustering form hierarchical clustering words based contexts occur proposed peter brown vincent della pietra peter desouza jennifer lai robert mercer ibm context language modeling intuition behind method class-based language model also called cluster -gram model i.e one probabilities words based classes clusters previous words used address data sparsity problem inherent language modeling jurafsky martin give example flight reservation system needs estimate likelihood bigram shanghai without seen training set system obtain good estimate cluster shanghai city names make estimate based likelihood phrases london beijing denver brown groups items i.e. types classes using binary merging criterion based log-probability text class-based language model i.e probability model takes clustering account thus average mutual information ami optimization function merges chosen incur least loss global mutual information result output thought binary tree perhaps helpfully sequence merges terminating one big class words model general form hidden markov model reduced bigram probabilities brown solution problem mi defined finding clustering maximizes likelihood data computationally expensive approach proposed brown et al greedy heuristic work also suggests use brown clusterings simplistic bigram class-based language model given cluster membership indicators tokens text probability word instance given preceding word given criticised limited utility ever predicts common word class restricted word types reflected low relative reduction perplexity found using model brown works examined trigrams approaches brown clustering problem brown clustering proposed generates fixed number output classes important choose correct number classes task-dependent cluster memberships words resulting brown clustering used features variety machine-learned natural language processing tasks generalization algorithm published aaai conference 2016 including succinct formal definition 1992 version also general form core concept classes considered merging necessarily represent final number classes output altering number classes considered merging directly affects speed quality final result known theoretical guarantees greedy heuristic proposed brown et al february 2018 however clustering problem framed estimating parameters underlying class-based language model possible develop consistent estimator model mild assumptions | [
7780,
4468,
2518,
3323,
3998
] | Test |
2,603 | 2 | Windows_Forms:windows forms windows forms winforms graphical gui class library included part microsoft .net framework mono framework providing platform write rich client applications desktop laptop tablet pcs seen replacement earlier complex c++ based microsoft foundation class library offer comparable paradigm acts platform user interface tier multi-tier solution microsoft connect event december 4 2018 microsoft announced releasing windows forms open source project github released mit license release windows forms become available projects targeting .net core framework however framework still available windows platform mono incomplete implementation winforms remains cross-platform implementation future development microsoft succeeded winforms xaml based gui entry using frameworks wpf uwp however drag drop placement gui components manner similar winforms still provided xaml replacing root xaml element page/window canvas ui-control making change user build window similar fashion winforms directly dragging dropping components using visual studio gui xaml provided drag drop placement backwards compatibility canvas control xaml controls similar winform controls 1-to-1 backwards compatible perform similar functions similar appearance properties methods different enough require remapping one api another windows forms application event-driven application supported microsoft .net framework unlike batch program spends time simply waiting user something fill text box click button windows forms provides access native windows user interface common controls wrapping existent windows api managed code help windows forms .net framework provides comprehensive abstraction win32 api visual basic mfc windows forms similar microsoft foundation class mfc library developing client applications provides wrapper consisting set c++ classes development windows applications however provide default application framework like mfc every control windows forms application concrete instance class visual elements windows forms class library derive control class provides minimal functionality user interface element location size color font text well common events like click drag/drop control class also docking support let control rearrange position parent microsoft active accessibility support control class also helps impaired users use windows forms better besides providing access native windows controls like button textbox checkbox listview windows forms added controls activex hosting layout arrangement validation rich data binding controls rendered using gdi+ like abstract window toolkit awt equivalent java api windows forms early easy way provide graphical user interface components .net framework windows forms built existing windows api controls merely wrap underlying windows components methods allow direct access win32 callbacks available non-windows platforms .net framework 2.0 windows forms gained richer layout controls office 2003 style toolstrip controls multithreading component richer design-time data binding support well clickonce web-based deployment release .net 3.0 microsoft released second parallel api rendering guis windows presentation foundation wpf based directx together gui declarative language called xaml question-and-answer session build 2014 conference microsoft explained windows forms maintenance mode new features added bugs found would still fixed recently improved high-dpi support various windows forms controls introduced updates .net framework version 4.5 mono project led xamarin formerly ximian novell create ecma standard compliant .net compatible set tools mono support system.windows.forms .net 2.0 announced complete also system.windows.forms 2.0 works natively mac os x however system.windows.forms actively developed mono full compatibility .net achieved possible microsoft system.windows forms mainly wrapper around windows api methods allow direct access win32 callbacks available platforms windows | [
7175,
2062,
9245,
5669,
5165,
5677,
3631,
9263,
576,
8771,
10841,
2145,
2658,
5743,
8303,
2673,
8304,
9848,
5754,
7292,
1664,
1666,
9348,
4231,
6797,
3734,
3224,
4777,
2221,
11442,
692,
200,
4822,
9943,
9434,
6370,
4836,
10470,
3821,
1048... | Test |
2,604 | 3 | Socket_P:socket p intel socket p mpga478mn mobile processor socket replacement core microarchitecture chips core 2 duo launched may 9 2007 part santa rosa platform merom penryn processors front-side bus fsb cpus install socket p run 400 533 667 800 1066 mt/s adapting multiplier frequency cpu throttle save power given socket p cpus support eist except celeron support eist socket p 478 pins electrically pin-compatible socket socket 478 socket p also known 478-pin micro fcpga μfcpga-478 plastic grid printed mpga478mn | [
3588,
9611,
5901,
5523,
2455,
3992,
3352,
8855,
3995,
4252,
11417,
6175,
7714,
10019,
4523,
2350,
6192,
9649,
4537,
7105,
4805,
7110,
8394,
3403,
4427,
4179,
3798,
4185,
7002,
9945,
11484,
9570,
10468,
613,
8552,
1260,
4717,
10225,
371,
9... | Test |
2,605 | 9 | Embedded_C:embedded c embedded c set language extensions c programming language c standards committee address commonality issues exist c extensions different embedded systems historically embedded c programming requires nonstandard extensions c language order support exotic features fixed-point arithmetic multiple distinct memory banks basic i/o operations 2008 c standards committee extended c language address issues providing common standard implementations adhere includes number features available normal c fixed-point arithmetic named address spaces basic i/o hardware addressing embedded c uses syntax semantics standard c e.g. main function variable definition datatype declaration conditional statements switch case loops functions arrays strings structures union bit operations macros etc technical report published 2004 second revision 2006 | [
8576,
4995,
516,
8326,
9366,
154,
1435,
10143,
10921,
428,
5165,
3886,
9008,
7479,
1849,
321,
6338,
8262,
4173,
11219,
4957,
477,
8545,
8675,
4964,
10470,
10603,
6640,
2804,
2045
] | Test |
2,606 | 3 | Network_Centric_Product_Support:network centric product support network centric product support ncps early application internet things iot computer architecture developed leverage new information technologies global networks assist managing maintenance support supply chain complex products made one complex systems mobile aircraft fleet fixed location assets building systems accomplished establishing digital threads connecting physical deployed subsystem design digital twins virtual model embedding intelligence networked micro-web servers also function computer workstation within subsystem component i.e engine control unit aircraft controller enabling 2-way communications using existing internet technologies communications networks thus allowing extension product lifecycle management plm system mobile deployed product subsystem level real time ncps considered support flip side network-centric warfare approach goes beyond traditional logistics aftermarket support functions taking complex adaptive system management approach integrating field maintenance logistics unified factory field environment evolution began insights gained cdr dave loda usnr network centric warfare-based fleet battle experimentation us naval warfare development command nwdc late 1990s later lead commercial research efforts ncps aviation united technologies corporation interaction mit auto-id labs epcglobal air transport association america ata spec 100/ispec 2200 consortium pioneering emerging machine machine internet things iot architecture contributed evolution ncps simply put architecture extends existing world wide web infrastructure networked web servers product subsystem controller level using systems engineering system systems nested approach core embedded dual function webserver/computer workstation connected product controller test ports used retrofit applications integrated directly controller new products hence providing access operational cycles sensor information clustered internet addressable node allows local remote access ability host remotely reconfigurable software collect process data mated subsystem controller onboard pull computing resources throughout network establish localized wireless world wide web around product securely connected mechanic web browser-equipped handheld independent greater world wide web well seamlessly integrate global networks external wireless communications available thus creating data digital twins factory connecting deployed product usage product lifecycle constantly updated digital threads allows integrated approach enables offline online updates occur legacy systems usually require human physically connect laptop system controller telematic solution manually collect data carry back location later transferred factory restricted webserver-based download sites offboard analysis architecture also enables communications micro-webservers computer cluster i.e aircraft higher level clusters internet portal managed fleet flight operations managers thus enabling access data resources personnel factory engineers remote office computers world wide web stated previously system operates asynchronously always connected world wide web function rather simply operates locally synchronizes two-way information relevant subsystem acting gateway telecommunications board connects gateways within network airborne ground as-needed basis communications available accomplished wireless lan network satellite cellular network wireless wired communications capabilities security network critical architecture utilize standard web security protocols public-key cryptography embedded hardware encryption devices extension world wide web architecture product important understand decisions manufacturing spare parts scheduling flights factory oem airline operator functions driven primarily happens product field rate wear impending failure primarily predicting rate wear hence impact operations forecasting producing spare parts future critical optimizing operations involved managing complex system fleet aircraft vehicles fixed location products accomplished manner example coupled technologies rfid system could track parts factory aircraft board continue read configuration subsystem ’ replaceable tagged parts map configuration hours run duty cycles process/communicate projected wear rate world wide web back operator factory way mechanical wear rates future failures predicted accurately forecasting spare parts manufacturing shipment significantly improved called prognostics health monitoring phm become possible recent years advent electronic controllers recent evolutionary step aircraft support maintenance management began individual processes prior world war ii solidified manual tracking system support aircraft fleets korean war support mechanic comes local wireless access technical information stored remotely updated board micro-webserver component relevant product service bulletins factory updates fault code driven intelligent 3d computer game-like maintenance procedures social media applications sharing product issues maintenance procedure improvements field include collaborative 2-way voice text image communications note architecture utilized system requires monitoring trending include mobile medical applications monitoring functionality human systems subject equipped data sensors original micro-webserver component i. e. onboard unit key enabling ncps architecture first prototyped demonstrated 2001 david loda enzo macchia sam quadri bjorn stickling united technologies pratt whitney division initially tested board fairchild-dornier 328 later avcraft 328 regional jet january 2002 introduced public demonstrated farnborough air show july 2002 prototype form 2004 flight certified product offering marketed united technologies dtu later fast data management units service number aircraft helicopter fleets similar complex systems approach completely different application successfully embodied eisenhower interstate highway system though transported ncps information cars trucks network centric product support net-centric product support architectural concept merely connects major avenues already existing global communications internet mobile product extending maintenance supply chain processes integrated product centric system real time feedback loop designers factory maintainers product performance reliability example gain information particular engine mobile aircraft efficient send inquiry engine directly host information generated relevant system well synchronize twin remote database access queuing engine system communications examples applied include shipping containers automobiles spacecraft appliances human medical monitoring complex product sensors subsystems require maintenance support monitoring many organizations beginning see value netcentric also spelled net-centric approach managing complex systems including network centric operations industry consortium ncoic association leading aerospace defense contractors network centric warfare arena network centric thinking aircraft operations including network enabled operations neo demonstrations also figure prominently commercial next generation air transportation system nextgen approach made us government revamping air transportation management 21st century | [
225,
8674
] | Validation |
2,607 | 7 | Global_Information_Grid-Bandwidth_Expansion:global information grid-bandwidth expansion global information grid bandwidth expansion gig-be program major united states department defense dod net-centric transformational initiative executed disa part global information grid project gig-be created ubiquitous bandwidth-available environment improve national security intelligence surveillance reconnaissance information assurance well command control gig-be disa leveraged dod existing end-to-end information transport capabilities significantly expanding capacity reliability select joint staff-approved locations worldwide gig-be achieved full operational capability foc december 20 2005 program provided increased bandwidth diverse physical access approximately 87 critical sites continental united states conus us pacific command pacom us european command eucom locations interconnected via expanded gig core gig-be provides secure robust optical terrestrial network delivers high-speed classified unclassified internet protocol ip services key operating locations worldwide assistant secretary defense networks information integration asd/nii vision color every base physically diverse network access optical mesh upgrades backbone network regional/man upgrades needed color every base implies every site oc-192 10 gigabits per second usable ip dedicated site extensive component integration operational testing implementation began middle 2004 fiscal year extended calendar year 2005 initial implementation concentrated six sites used proof initial operational capability ioc achieved september 30 2004 gig-be program office conducted detailed site surveys approximately 87 joint staff-approved locations parallel implementation conus overseas gig-be program office completed final operational test evaluation fot e 54 operational sites october 7 2005 december 20 2005 gig-be program achieved milestone full operational capability gig-be awarded saic 2001 877 million contract development instantiation maintenance gig-be network saic instantly divided equipment tasks subcontracts subcontracts follows representatives marty meehan d-mass jim saxton r-nj expressed concern selection process contractor lead gig-be effort say handled irresponsibly reason expressed meehan spokesperson kimberly abbott whole bidding process n't fair open could contractor government led decision process saic contract eventually handed large subset engineering light meehan stress questioning competence winners two congressman delivered letter dod regarding contract issue slowly forgotten | [
5472,
7979,
6834,
6267,
7388
] | Train |
2,608 | 9 | Uwe_Schöning:uwe schöning uwe schöning born 28 december 1955 german computer scientist known research computational complexity theory schöning earned ph.d. university stuttgart 1981 supervision wolfram schwabhäuser professor institute theoretical informatics university ulm schöning introduced low high hierarchies structural complexity theory 1983 schöning later showed 1988 paper hierarchies play important role complexity graph isomorphism problem schöning developed 1993 monograph köbler toran 1999 focs paper schöning showed walksat randomized algorithm previously analyzed 2-satisfiability papadimitriou good expected time complexity although still exponential applied worst-case instances 3-satisfiability np-complete constraint satisfaction problems time fastest guaranteed time bound 3sat subsequent research built idea develop even faster algorithms schöning also inventor pedagogical programming languages loop goto described textbook theoretische informatik kurz gefasst schöning author editor many books computer science including research articles include | [
8262,
1783
] | Test |
2,609 | 4 | Zooko_Wilcox-O'Hearn:zooko wilcox-o'hearn zooko wilcox-o'hearn born bryce wilcox may 13 1974 phoenix arizona american colorado-based computer security specialist cypherpunk ceo zcash known tahoe least-authority file store tahoe-lafs secure decentralized fault-tolerant filesystem released gpl tgppl licenses creator transitive grace period public licence tgppl wilcox-o'hearn designer multiple network protocols incorporate concepts self-contained economies secure reputation systems member development team zrtp blake2 cryptographic hash function zooko triangle named wilcox-o'hearn described schema relates three desirable properties identifiers 2001 founder ceo least authority enterprises boulder colorado developer mojonation p2p system lead developer follow-on mnet network developer simplegeo furthermore zooko part founding team launched zcash 2016 | [
8640,
3713,
728,
4380,
2558
] | Test |
2,610 | 4 | Georgia_SoftWorks:georgia softworks georgia softworks gsw privately held software development company headquartered dawsonville georgia united states company creates data communications systems telecommunications applications commercial emphasis ssh/telnet server microsoft windows georgia softworks markets reliability product suite features designed industrial applications company claims supplied first ssh server using digital certificate authentication internet information server-like certificate user account mapping established 1991 georgia softworks started custom software development company specializing data communications telecommunications applications company needed reliable telnet connectivity windows nt features correctly displayed characters proper function key operation alt-key operation time telnet widely available unix frequently utilized windows commercial environments georgia softworks developed gsw telnet server windows named foundation product universal terminal server designed different protocols could installed requirements determined gsw added features telnet server mouse operation file transfer telnet connection successful in-house use uts commercialized georgia softworks developed major features uts logon scripts feature eventually evolved global per user per ip address certificate based logon scripts features included client device failure detection graceful termination session saver automatic logon session monitoring shadowing team services technology georgia softworks developed commercialized fips 140-2 compliant ssh2 server client software designed run top uts product platform georgia softworks resellers end users every continent except antarctica across variety industries including government automobile manufactures schools oil companies airlines pharmaceutical medical food beverage nasa many | [
420,
10341,
11112,
6797,
8976,
5492,
9780
] | None |
2,611 | 4 | Pop-up_ad:pop-up ad pop-up ads pop-ups forms online advertising world wide web pop-up graphical user interface gui display area usually small window suddenly appears pops foreground visual interface pop-up window containing advertisement usually generated javascript uses cross-site scripting xss sometimes secondary payload uses adobe flash also generated vulnerabilities/security holes browser security variation pop-up window pop-under advertisement opens new browser window active window pop-unders interrupt user immediately appear user closes covering window making difficult determine website created pop-up ads originated tripod.com webpage hosting site late 1990s javascript provided capability web page open another window ethan zuckerman claims used capability launch advertisements separate windows response complaints advertisers ads appearing pages sexual content zuckerman later apologized unforeseen nuisance pop-up ads evolved web development design technologies allow author associate item pop-up action including cancel innocent looking button bad experiences apprehensive possible damage may cause users click interact item inside pop-up window whatsoever may leave site generated block pop-ups opera first major browser incorporate tools block pop-up ads mozilla browser later improved blocking pop-ups generated page loads early 2000s major web browsers except internet explorer let users block unwanted pop-ups almost completely 2004 microsoft released windows xp sp2 added pop-up blocking internet explorer modern browsers provide pop-up blocking tools third-party tools add features ad filtering users websites web applications continuously experience unwanted pop ads course normal interaction web browser ordinarily users respond dismissing pop-up close cancel feature window hosting pop-up typical response authors pop-up advertising depend create on-screen buttons controls look similar close cancel option user chooses one simulated cancel options however button performs unexpected unauthorized action opening new pop-up downloading unwanted file user system hover ad in-page pop-up uses dhtml combine banner ad pop-up window appears front browser screen javascript imposes advertisement webpage transparent layer advertisement appear variety forms example advertisement contain adobe flash animation links advertiser site advertisement also look like regular window pop-up blockers block ad part webpage blocked third-party ad blockers adblock adblock plus using custom style sheets urls sometimes redirected advertisement pages url redirection urls sometimes opened new tab content old background tab replaced advertisement page url redirection times switches tab user advertisement tab adblock plus ublock noscript block redirects pop-under ads similar pop-up ads ad window appears hidden behind main browser window rather superimposed front pop-up ads became widespread intrusive often taking whole computer screen many users would immediately close pop-up ads appeared site without looking pop-under ads immediately impede view content remain unnoticed user closes minimizes main browser window pop-under ad involves two javascript functions introduced 1997 netscape 2.0b3 browser modern web publishers advertisers use create window front users screen load advertisement send behind screen modern browsers allow codice_1 execute called user interaction e.g. mouse click event handler non-interactive calls timer callback load events etc codice_1 result new window blocked bypass restriction pop-under ads trigger mouse click event listener attached directly document document body enables catching mouse click events consumed click event handlers calling codice_1 without blocked example user selects text mouse click triggers mouse click handler attached document pop-under opens using code notice techniques bypass codice_1 call restriction hijacking mouse clicks exitexchange.com filed patent 2000 subset pop-under advertising called exit pop years controversy numerous articles pop-under patent patent awarded united states patent trademark office uspto april june 2008 respective patent numbers patent 7,386,555 related method opening exit pop toolbar software application computing device whereas patent 7,353,229 covers method used open exit pop embedded script found within media file e.g. javascript code web page copyright aspects pop-up advertising discussed wikipedia articles derivative works transformativeness articles contain illustrations links examples pop-up advertising | [
5636,
3462,
7304,
8584,
6028,
24,
4889,
10392,
6045,
5536,
5281,
2213,
1970,
9908,
7098,
3643,
2108,
444,
704,
10057,
11469,
7515,
8923,
1629,
735,
4198,
877,
4718,
6513,
119
] | Test |
2,612 | 7 | GeoMesa:geomesa geomesa open-source distributed spatio-temporal index built top bigtable-style databases using implementation geohash algorithm written scala geomesa capable ingesting indexing querying billions geometry features using highly parallelized index scheme geomesa builds top open source geo osg libraries implements geotools datastore interface providing standardized access feature collections well implementing geoserver plugin google announced geomesa supported google cloud bigtable hosted nosql service release blog post may 2015 geomesa also supports bigtable-derivative implementations apache accumulo apache hbase geomesa implements z-order curve via custom geohash implementation combine three dimensions geometry time i.e latitude/longitude/timestamp single-dimension lexicographic key space provided accumulo | [
7816,
7983,
6131,
823,
3705
] | Test |
2,613 | 7 | Ragic:ragic ragic online database management system marketed platform service model online database creation application interface similar spreadsheet additional functionality includes cloud capabilities linking database sheets collaboration generating reports query builder allows users find information integration file storage services like dropbox productivity tools like evernote ragic enables business users familiar spreadsheets build database apps without programming developers make use http api server-side javascript perform complex operations | [
3462,
4623
] | None |
2,614 | 2 | MacvsWindows:macvswindows mac vs windows formerly xvsxp online operating system comparison wiki run james scariati michael moriarty site longer active domains point spam blogs site compares competing operating systems windows vista mac os x v10.5 100 different topics site explicitly includes out-of-the-box experience os well freely released updates manufacturer unique feature site many os comparison sites features forum encourage readers voice concerns comments site well suggestions additions site originally launched march 2003 dan pouliot scope site explicit also concerns creative professional site originally intended advocate os x virtue fair comparison windows xp pouliot acknowledged fair comparison difficult relied debates within site online forum refine expand site pdf version site available pouliot reports downloaded 250,000 times launch site time pdf removed january 2005 site almost closed january 2005 including brief period xvsxp converted pay site pouliot time decided needed move change ownership negotiated november 2005 site officially changed hands current owners james scariati michael moriarty rewrite site began renewed objective unbiased comparison point view changed away first person content considered editorial nature removed site officially relaunched march 2006 sporting refreshed look updated sections well format reportedly designed ease updating due upcoming releases operating systems windows vista mac os x v10.5 june 20 2007 xvsxp.com owners announced moving new website mac vs. windows www.macvswindows.com one main new features introduced new website transition wiki model owners stated even current comparison large amount work truly objective comparison aspects platform would require team full-time employees addition current 1 10 scoring system viewed definitive subjective review also compounded final score page option weigh scores based user concerns e.g security given much weight icons criticism xvsxp lodged continued delays providing coverage windows side comparison june 10 2007 site still fails show data windows vista seven months vista ’ release manufacturing rtm even though one xvsxp admins acknowledged four months ago vista released initial acknowledgement february 8 2007 vista came three months went rtm | [
11184,
8092,
7983
] | Test |
2,615 | 1 | Traditional_Knowledge_Digital_Library:traditional knowledge digital library traditional knowledge digital library tkdl indian digital knowledge repository traditional knowledge especially medicinal plants formulations used indian systems medicine set 2001 collaboration council scientific industrial research csir ministry ayush objective library protect ancient traditional knowledge country exploitation biopiracy unethical patents documenting electronically classifying per international patent classification systems apart non-patent database serves foster modern research based traditional knowledge simplifies access vast knowledge remedies practices 2010 transcribed 148 books ayurveda unani siddha yoga public domain 34 million pages information translated five languages — english german french spanish japanese data 80,000 formulations ayurveda 1,000,000 unani 12,000 siddha already put tkdl plus signed agreements leading international patent offices european patent office epo united kingdom trademark patent office ukpto united states patent trademark office protect traditional knowledge biopiracy giving patent examiners international patent offices access tkdl database patent search examination issue biopiracy unethical bioprospecting made headlines government india successfully revoked limited turmeric basmati rice patents granted united states patent trademark office uspto neem patent granted european patent office epo late 1990s soon patent claims came light india ’ vast traditional medicine knowledge existed languages like sanskrit hindi arabic persian urdu tamil making inaccessible examiners international patent offices verify claims experience prompted department ayush government india create task force experts areas traditional medicine systems india i.e. ayurveda unani siddha yoga patent examiners experts scientists technical officers creation traditional knowledge digital library tkdl initiated 2001 tasks included example transcribing sanskrit shlokas describe ayurvedic formulation text using traditional knowledge resource classification tkrc devised purpose easily understandable patent examiner anywhere world reason entire 34 million pages text available english german french spanish japanese database project reached completion 2006 government allowed access library international patent offices including european patent office epo japan uk subject non-disclosure clause allows patent examiners evaluate patent applications stop attempts patent traditional knowledge new inventions agreements signed epo february 2009 united kingdom trademark patent office ukpto january 2010 u.s. patent trademark office uspto summit meeting us president barack obama prime minister manmohan singh also january 2010 patent examiners getting access tkdl database legal cases regarding unethical patent claims taken years vast expenditure case could avoided another project include data relating 1,500 postures yoga began 2008 new reports large number false gurus yoga masters attempted patent ancient knowledge countries example 131 yoga-related patents traced us alone 2007 uproar parliament media government india took issue uspto thereafter team yoga gurus nine schools working government officials 200 scientists council scientific industrial research csir scanned 35 ancient texts including hindu epics mahabharata bhagwad gita patanjali yoga sutras register native pose end 2009 1500 asanas added 2010 union environment minister jairam ramesh stated eight years 34 million pages information collected estimated cost rs 7 crore least 36 cases identified epo 40 cases uspto using tkdl future project people ’ register biodiversity set government document protect traditional knowledge passed oral tradition india ’ national biodiversity act 2002 | [] | Validation |
2,616 | 2 | Queued_Sequential_Access_Method:queued sequential access method ibm mainframe operating systems queued sequential access method qsam access method read write datasets sequentially qsam available os/360 os/vs2 mvs z/os related operating systems qsam used devices naturally sequential punched card readers punches line printers data devices could also addressed directly magnetic disks qsam offers device independence extent possible api calls used different devices qsam is—as name says—queued specific context meaning buffered deblocking reads blocking writes allows programs read write logical records within physical blocks data opposed less advanced basic sequential access method bsam allows programs access physical blocks data provides support accessing logical records within blocks indeed qsam manages truncated final blocks truncated embedded blocks completely transparently user qsam application program interface compared interface offered open read write close calls using file handles operating systems unix windows | [
11656,
6797,
7053,
7312,
7836,
7983,
10415,
8393,
10958,
8911,
8272,
3669,
10072,
2395,
8290,
868,
7272,
4586,
10094,
5492,
6647,
2168,
11131
] | Test |
2,617 | 9 | CLU_(programming_language):clu programming language clu programming language created massachusetts institute technology mit barbara liskov students 1974 1975 find extensive use introduced many features used widely seen step development object-oriented programming oop key contributions include abstract data types call-by-sharing iterators multiple return values form parallel assignment type-safe parameterized types type-safe variant types also notable use classes constructors methods without inheritance syntax clu based algol starting point new language designs key addition concept cluster clu type extension system root language name cluster clusters correspond generally concept class oo language similar syntax instance clu syntax cluster implements complex numbers cluster module encapsulates components except explicitly named clause correspond public components class recent oo languages cluster also defines type named outside cluster case complex_number representation type rep hidden external clients cluster names global namespace mechanism provided group clusters allow created locally inside clusters clu perform implicit type conversions cluster explicit type conversions change abstract type representation universal type procedure force check object certain type objects may mutable immutable latter base types integers booleans characters strings another key feature clu type system iterators return objects collection serially one another iterators offer identical application programming interface api matter data used thus iterator collection codice_1s used interchangeably array codice_2s distinctive feature clu iterators implemented coroutines value provided caller via yield statement iterators like clu common feature many modern languages c ruby python though recently often referred generators clu also includes exception handling based various attempts languages exceptions raised using codice_3 handled codice_4 unlike languages exception handling exceptions implicitly resignaled calling chain also unlike languages provide exception handling exceptions clu considered part ordinary execution flow considered normal efficient typesafe way break loops return functions allows direct assignment return values except conditions apply exceptions neither caught resignaled explicitly immediately converted special failure exception typically terminates program clu often credited first language type-safe variant types called oneofs language ml final distinctive feature clu parallel assignment multiple assignment one variable appear left hand side assignment operator instance writing codice_5 would exchange values codice_6 codice_7 way functions could return several values like codice_8 parallel assignment though multiple return values predates clu appearing cpl 1963 named simultaneous assignment clu popularized often credited direct influence leading parallel assignment later languages objects clu program live heap memory management automatic clu supports type parameterized user-defined data abstractions first language offer type-safe bounded parameterized types using structure clauses express constraints actual type arguments clu influenced many languages many ways approximate chronological order include clu ada major inspirations c++ templates clu exception handling mechanisms influenced later languages like c++ java sather python c include iterators first appeared clu perl lua took multiple assignment multiple returns function calls clu python ruby borrowed several concepts clu call sharing yield statement multiple assignment | [
512,
9345,
3076,
8582,
6160,
9245,
10145,
4777,
428,
5677,
10043,
2556,
10435,
70,
8262,
10568,
1610,
11219,
11604,
7894,
7386,
6502,
11625,
8554,
1399,
7292,
2045
] | None |
2,618 | 9 | Dafny:dafny dafny imperative compiled language targets c supports formal specification preconditions postconditions loop invariants loop variants language combines ideas primarily functional imperative paradigms includes limited support object-oriented programming features include generic classes dynamic allocation inductive datatypes variation separation logic known implicit dynamic frames reasoning side effects dafny created rustan leino microsoft research previous work developing esc/modula-3 esc/java spec dafny used widely teaching features regularly software verification competitions e.g vstte'08 vscomp'10 cost'11 verifythis'12 dafny designed provide simple introduction formal specification verification used widely teaching dafny builds boogie intermediate language uses z3 automated theorem prover discharging proof obligations dafny provides methods implementation may side-effects functions use specification pure methods consist sequences statements following familiar imperative style whilst contrast body function simply expression side-effecting statements method e.g assigning element array parameter must accounted noting parameters mutated codice_1 clause dafny also provides range immutable collection types including sequences e.g codice_2 sets e.g codice_3 maps codice_4 addition mutable arrays e.g codice_5 provided dafny supports proofs imperative programs based ideas hoare logic following illustrates many features dafny including use preconditions postconditions loop invariants loop variants method max arr array int returns max int examples computes maximum element array method precondition postcondition given codice_6 codice_7 clauses respectively likewise loop invariant loop variant given codice_8 codice_9 clauses respectively treatment loop invariants dafny differs traditional hoare logic variables mutated loop treated information known prior loop discarded information required prove properties variables must expressed explicitly loop invariant contrast variables mutated loop retain information known beforehand following provides illustrates method sumandzero ns array int returns sum nat fails verification dafny establish codice_10 holds assignment precondition intuitively codice_11 holds loop since codice_12 nop however assignment causes dafny treat codice_13 mutable variable drop information known loop verify program dafny either remove redundant assignment codice_12 add loop invariant codice_15 dafny additionally employs limited static analysis infer simple loop invariants possible example would seem loop invariant codice_16 also required variable codice_17 mutated within loop whilst underlying logic require invariant dafny automatically infers hence omitted source level dafny includes features support use proof assistant whilst proofs simple properties within codice_18 codice_19 shown unusual tools nature dafny also allows proof properties one codice_18 another common proof assistant proofs often inductive nature dafny perhaps unusual employing method invocation mechanism applying inductive hypothesis following illustrates datatype list nil link data int next list function sum l list int predicate isnatlist l list ghost method natsumlemma l list n int requires isnatlist l n == sum l ensures n 0 codice_21 proves useful property codice_22 codice_23 i.e codice_24 use codice_25 encoding lemma theorems standard dafny recursion employed induction typically structural induction case analysis performed using codice_26 statements non-inductive cases often discharged automatically verifier must also complete access contents codice_18 codice_28 order unroll necessary implications used conjunction access modifiers specifically hiding contents codice_18 using codice_30 modifier limit properties established | [
9345,
10786,
4791,
10571,
7671,
3613
] | Validation |
2,619 | 9 | Structured_program_theorem:structured program theorem structured program theorem also called böhm–jacopini theorem result programming language theory states class control flow graphs historically called charts context compute computable function combines subprograms three specific ways control structures structured chart subject constraints may however use additional variables form bits stored extra integer variable original proof order keep track information original program represents program location construction based böhm programming language p′′ theorem typically credited 1966 paper corrado böhm giuseppe jacopini david harel wrote 1980 böhm–jacopini paper enjoyed universal popularity particularly proponents structured programming harel also noted due rather technical style 1966 böhm–jacopini paper apparently often cited read detail reviewing large number papers published 1980 harel argued contents böhm–jacopini proof usually misrepresented folk theorem essentially contains simpler result result traced inception modern computing theory papers von neumann kleene harel also writes generic name proposed h.d mills structure theorem early 1970s version theorem replaces original program control flow single global codice_1 loop simulates program counter going possible labels flowchart boxes original non-structured program harel traced origin folk theorem two papers marking beginning computing one 1946 description von neumann architecture explains program counter operates terms loop harel notes single loop used folk version structured programming theorem basically provides operational semantics execution flowchart von neumann computer another even older source harel traced folk version theorem stephen kleene normal form theorem 1936 donald knuth criticized form proof results pseudocode like one pointing structure original program completely lost transformation similarly bruce ian mills wrote approach spirit block structure style language simulating von neumann machine produce behavior spaghetti code within confines block-structured language prevent spaghetti proof böhm jacopini paper proceeds induction structure flow chart employed pattern matching graphs proof böhm jacopini really practical program transformation algorithm thus opened door additional research direction böhm–jacopini proof settle question whether adopt structured programming software development partly construction likely obscure program improve contrary signalled beginning debate edsger dijkstra famous letter go statement considered harmful followed 1968 academics took purist approach böhm–jacopini result argued even instructions like codice_2 codice_3 middle loops bad practice needed böhm–jacopini proof thus advocated loops single exit point purist approach embodied pascal programming language designed 1968–1969 mid-1990s preferred tool teaching introductory programming classes academia edward yourdon notes 1970s even philosophical opposition transforming unstructured programs structured ones automated means based argument one needed think structured programming fashion get go pragmatic counterpoint transformations benefited large body existing programs among first proposals automated transformation 1971 paper edward ashcroft zohar manna direct application böhm–jacopini theorem may result additional local variables introduced structured chart may also result code duplication latter issue called loop half problem context pascal affected problems according empirical studies cited eric s. roberts student programmers difficulty formulating correct solutions pascal several simple problems including writing function searching element array 1980 study henry shapiro cited roberts found using pascal-provided control structures correct solution given 20 subjects subject wrote incorrect code problem allowed write return middle loop 1973 s. rao kosaraju proved possible avoid adding additional variables structured programming long arbitrary-depth multi-level breaks loops allowed furthermore kosaraju proved strict hierarchy programs exists nowadays called kosaraju hierarchy every integer n exists program containing multi-level break depth n rewritten program multi-level breaks depth less n without introducing additional variables kosaraju cites multi-level break construct bliss programming language multi-level breaks form codice_4 keyword actually introduced bliss-11 version language original bliss single-level breaks bliss family languages n't provide unrestricted goto java programming language would later follow approach well simpler result kosaraju paper program reducible structured program without adding variables contain loop two distinct exits reducibility defined kosaraju loosely speaking computing function using primitive actions predicates original program possibly using different control flow structures narrower notion reducibility böhm–jacopini used inspired result section vi highly-cited paper introduced notion cyclomatic complexity thomas j. mccabe described analogue kuratowski theorem control flow graphs cfg non-structured programs say minimal subgraphs make cfg program non-structured subgraphs good description natural language mccabe actually found four graphs independent appearing subgraphs meaning necessary sufficient condition program non-structured cfg subgraph one subset three four graphs also found non-structured program contains one four sub-graphs must contain another distinct one set four latter result helps explain control flow non-structured program becomes entangled popularly called spaghetti code mccabe also devised numerical measure given arbitrary program quantifies far ideal structured program mccabe called measure essential complexity mccabe characterization forbidden graphs structured programming considered incomplete least dijkstra structures considered building blocks 1990 quite proposed methods eliminating gotos existing programs preserving structure various approaches problem also proposed several notions equivalence stricter simply turing equivalence order avoid output like folk theorem discussed strictness chosen notion equivalence dictates minimal set control flow structures needed 1988 jacm paper lyle ramshaw surveys field point well proposing method ramshaw algorithm used example java decompilers java virtual machine code branch instructions targets expressed offsets high-level java language multi-level codice_2 codice_6 statements ammarguellat 1992 proposed transformation method goes back enforcing single-exit 1980s ibm researcher harlan mills oversaw development cobol structuring facility applied structuring algorithm cobol code mills transformation involved following steps procedure note construction improved converting cases selection statement subprocedures material yet covered | [
7940,
6950,
3529,
10953,
9739,
8524,
5677,
2798,
3854,
5872,
1841,
5585,
4980,
5204,
10680,
3323
] | Test |
2,620 | 9 | Optimizing_compiler:optimizing compiler computing optimizing compiler compiler tries minimize maximize attributes executable computer program common requirements minimize program execution time memory requirement power consumption last two popular portable computers compiler optimization generally implemented using sequence optimizing transformations algorithms take program transform produce semantically equivalent output program uses fewer resources and/or executes faster shown code optimization problems np-complete even undecidable practice factors programmer willingness wait compiler complete task place upper limits optimizations compiler implementer might provide optimization generally cpu- memory-intensive process past computer memory limitations also major factor limiting optimizations could performed factors optimization rarely produces optimal output sense fact optimization may impede performance cases rather heuristic methods improving resource usage typical programs techniques used optimization broken among various scopes affect anything single statement entire program generally speaking locally scoped techniques easier implement global ones result smaller gains examples scopes include addition scoped optimizations two general categories optimization following instance local machine dependent optimization set register 0 obvious way use constant 0 instruction sets register value constant less obvious way xor register compiler know instruction variant use many risc machines instructions would equally appropriate since would length take time many microprocessors intel x86 family turns xor variant shorter probably faster need decode immediate operand use internal immediate operand register potential problem xor may introduce data dependency previous value register causing pipeline stall however processors often xor register special case cause stalls large extent compiler optimization techniques following themes sometimes conflict optimization techniques primarily designed operate loops include data-flow optimizations based data-flow analysis primarily depend certain properties data propagated control edges control flow graph include optimizations intended done transforming program special form called static single assignment see ssa form every variable assigned one place although function without ssa effective ssa many optimizations listed sections also benefit special changes register allocation although many also apply non-functional languages either originate easily implemented particularly critical functional languages lisp ml interprocedural optimization works entire program across procedure file boundaries works tightly intraprocedural counterparts carried cooperation local part global part typical interprocedural optimizations procedure inlining interprocedural dead code elimination interprocedural constant propagation procedure reordering usual compiler needs perform interprocedural analysis actual optimizations interprocedural analyses include alias analysis array access analysis construction call graph interprocedural optimization common modern commercial compilers sgi intel microsoft sun microsystems long time open source gcc criticized lack powerful interprocedural analysis optimizations though improving another open source compiler full analysis optimization infrastructure open64 due extra time space required interprocedural analysis compilers perform default users must use compiler options explicitly tell compiler enable interprocedural analysis expensive optimizations early history compilers compiler optimizations good hand-written ones compiler technologies improved good compilers typically generate code good enough generally longer warrant much higher effort program hand-optimized code assembly language except special cases risc cpu architectures even vliw hardware compiler optimization key obtaining efficient code risc instruction sets compact hard human manually schedule combine small instructions get efficient results indeed architectures designed rely compiler writers adequate performance however optimizing compilers means perfect way compiler guarantee program source code fastest smallest possible equivalent compiled program output compiler fundamentally impossible would solve halting problem assuming turing completeness may proven considering call function foo function returns nothing side effects i/o modify global variables live data structures etc. fastest possible equivalent program would simply eliminate function call however function foo fact return program call foo would different program without call optimizing compiler determine solving halting problem additionally number practical issues optimizing compiler technology moreover optimization algorithms complicated especially used compile large complex programming languages bugs introduce errors generated code cause internal errors compilation compiler errors kind disconcerting user especially case since may clear optimization logic fault case internal errors problem partially ameliorated fail-safe programming technique optimization logic compiler coded failure trapped warning message issued rest compilation proceeds successful completion work improve optimization technology continues one approach use so-called post-pass optimizers commercial versions date back mainframe software late 1970s tools take executable output optimizing compiler optimize even post pass optimizers usually work assembly language machine code level contrast compilers optimize intermediate representations programs performance post-pass compilers limited fact much information available original source code always available processor performance continues improve rapid pace memory bandwidth improves slowly optimizations reduce memory bandwidth requirements even cost making processor execute relatively instructions become useful examples already mentioned include loop nest optimization rematerialization early compilers 1960s often primarily concerned simply compiling code correctly efficiently – compile times major concern one earliest notable optimizing compilers bliss 1970 described design optimizing compiler 1975 late 1980s optimizing compilers sufficiently effective programming assembly language declined co-evolved development risc chips advanced processor features instruction scheduling speculative execution designed targeted optimizing compilers rather human-written assembly code | [
6664,
4112,
2066,
31,
5154,
10786,
5677,
5684,
2620,
9794,
8262,
7245,
2638,
7273,
9331,
8822,
7292,
6815,
6817,
6821,
9911,
187,
9432,
8421,
10469,
1776,
8435,
3317,
2808,
7421,
7940,
7941,
3854,
7438,
5911,
10013,
7462,
9002,
814,
1841,... | Test |
2,621 | 1 | Strozzi_NoSQL:strozzi nosql strozzi nosql shell-based relational database management system initialized developed carlo strozzi runs unix-like operating systems others compatibility layers e.g. cygwin windows file name nosql merely reflects fact express queries using structured query language nosql rdbms distinct circa-2009 general concept nosql databases typically non-relational unlike nosql rdbms strozzi nosql released gnu gpl nosql uses operator-stream paradigm number operators perform unique function passed data stream used supplied unix input/output redirection system pipe system result calculation passed operators unix pipes run memory efficient way implementation nosql development led carlo strozzi latest perhaps active line implementations stream-operator database design originally described evan shaffer rod manis robert jorgensen 1991 unix review article associated paper implementations include perl-based rdb commercial version original authors called /rdb starbase version added astronomical data operators john roll harvard smithsonian astrophysical observatory strengths dealing pipe data implementations mixture awk programming languages usually c perl concept originally described 1991 unix review article later expanded paper see reference well book unix relational database management nosql along similar stream-operator databases well-suited number fast analytical database tasks significant advantage keeping tables ascii text form allowing many powerful text processing tools used adjunct database functions popular tools use nosql include python perl awk shell scripts using ubiquitous unix text processing tools cut paste grep sort uniq etc nosql written mostly interpretive languages slowing actual process execution ability use ordinary pipes filesystems means extremely fast many applications using ram filesystems heavily leveraging pipes mostly memory-based many implementations reasons avoiding sql follows contrast rdbms nosql full power unix application development usage user interface uses unix shell necessary learn set new commands administer database view nosql database set files similar user file scripting type database language used besides unix shell shell-nature encourages casual use database makes use familiar resulting formal use words nosql set shell routines access normal files operating system retrieve information particular employee query sql might look like since document-oriented nosql database often retrieves pre-connected document representing entire employee query might look like stream-operator paradigm differs conventional sql since nosql db relational possible map nosql operators sql equivalents | [
8582,
6797,
8499,
5492,
7325
] | None |
2,622 | 3 | Emerald_Isle_(video_game):emerald isle video game emerald isle text adventure game level 9 computing released 1984 plane crashed struck storm bermuda triangle sole occupant escaped parachute finds unknown island inhabited strange peoples creatures game standard text adventure limited graphics platforms | [
10931,
9006
] | None |
2,623 | 3 | Processor_design:processor design processor design design engineering task creating processor key component computer hardware subfield computer engineering design development implementation electronics engineering fabrication design process involves choosing instruction set certain execution paradigm e.g vliw risc results microarchitecture might described e.g vhdl verilog microprocessor design description manufactured employing various semiconductor device fabrication processes resulting die bonded onto chip carrier chip carrier soldered onto inserted socket printed circuit board pcb mode operation processor execution lists instructions instructions typically include compute manipulate data values using registers change retrieve values read/write memory perform relational tests data values control program flow cpu design divided design following components cpus designed high-performance markets might require custom optimized application specific see designs items achieve frequency power-dissipation chip-area goals whereas cpus designed lower performance markets might lessen implementation burden acquiring items purchasing intellectual property control logic implementation techniques logic synthesis using cad tools used implement datapaths register files clocks common logic styles used cpu design include unstructured random logic finite-state machines microprogramming common 1965 1985 programmable logic arrays common 1980s longer common device types used implement logic include cpu design project generally major tasks re-designing cpu core smaller die-area helps shrink everything photomask shrink resulting number transistors smaller die improves performance smaller transistors switch faster reduces power smaller wires less parasitic capacitance reduces cost cpus fit wafer silicon releasing cpu size die smaller cpu core keeps cost allows higher levels integration within one very-large-scale integration chip additional cache multiple cpus components improving performance reducing overall system cost complex electronic designs logic verification effort proving design bugs dominates project schedule cpu key cpu architectural innovations include index register cache virtual memory instruction pipelining superscalar cisc risc virtual machine emulators microprogram stack variety proposed including reconfigurable logic clockless cpus computational ram optical computing benchmarking way testing cpu speed examples include specint specfp developed standard performance evaluation corporation consumermark developed embedded microprocessor benchmark consortium eembc commonly used metrics include may tradeoffs optimizing metrics particular many design techniques make cpu run faster make performance per watt performance per dollar deterministic response much worse vice versa several different markets cpus used since markets differ requirements cpus devices designed one market cases inappropriate markets vast majority revenues generated cpu sales general purpose computing desktop laptop server computers commonly used businesses homes market intel ia-32 64-bit version x86-64 architecture dominate market rivals powerpc sparc maintaining much smaller customer bases yearly hundreds millions ia-32 architecture cpus used market growing percentage processors mobile implementations netbooks laptops since devices used run countless different types programs cpu designs specifically targeted one type application one function demands able run wide range programs efficiently made cpu designs among advanced technically along disadvantages relatively costly high power consumption 1984 high-performance cpus required four five years develop scientific computing much smaller niche market revenue units shipped used government research labs universities 1990 cpu design often done market mass market cpus organized large clusters proven affordable main remaining area active hardware design research scientific computing high-speed data transmission systems connect mass market cpus measured units shipped cpus embedded machinery telephones clocks appliances vehicles infrastructure embedded processors sell volume many billions units per year however mostly much lower price points general purpose processors single-function devices differ familiar general-purpose cpus several ways embedded cpu family largest number total units shipped 8051 averaging nearly billion units per year 8051 widely used inexpensive design time roughly zero widely available commercial intellectual property often embedded small part larger system chip silicon cost 8051 low us 0.001 implementations use 2,200 logic gates take 0.0127 square millimeters silicon 2009 cpus produced using arm architecture instruction set 32-bit instruction set arm architecture first arm chip designed one half years 5 human years work time 32-bit parallax propeller microcontroller architecture first chip designed two people 10 human years work time 8-bit avr architecture first avr microcontroller conceived designed two students norwegian institute technology 8-bit 6502 architecture first mos technology 6502 chip designed 13 months group 9 people 32 bit berkeley risc risc ii architecture first chips mostly designed series students part four quarter sequence graduate courses design became basis commercial sparc processor design decade every student taking 6.004 class mit part team—each team one semester design build simple 8 bit cpu 7400 series integrated circuits one team 4 students designed built simple 32 bit cpu semester undergraduate courses require team 2 5 students design implement test simple cpu fpga single 15-week semester multititan cpu designed 2.5 man years effort considered relatively little design effort time 24 people contributed 3.5 year multititan research project included designing building prototype cpu embedded systems highest performance levels often needed desired due power consumption requirements allows use processors totally implemented logic synthesis techniques synthesized processors implemented much shorter amount time giving quicker time-to-market | [
7173,
9739,
2066,
7699,
5655,
8727,
10779,
10781,
6181,
8229,
8231,
10285,
3630,
4144,
6705,
7218,
11314,
2113,
7234,
3142,
2638,
1122,
3175,
8808,
8815,
7281,
630,
8822,
6268,
3197,
7313,
9366,
3226,
6815,
8352,
5793,
6818,
6821,
682,
78... | None |
2,624 | 1 | SilverPlatter:silverplatter silverplatter information inc. one first companies produce commercial reference databases cd-roms founded 1983 united kingdom béla hatvany walt winshall explicit intention using cd technology publish data thus provide alternative searching databases magnetic tape format ron rietdyk company first president firm started 1986 small building newton lower falls massachusetts company began experimenting four databases eric lisa psyclit embase 1987 company 12 databases revenues approximately 6m competing cd plus ovid technologies aries cambridge scientific abstracts dialog company offered libraries wide range cd-roms next years company expanded academic base medical business health safety cd publishing 1989 firm launched multiplatter system networking cd-roms across local area network 1991 introduced searching data held company site erl electronic reference library system providing hard disk access databases via dxp protocol last proved successful 500 sites using firm technology 1997 year company grown 75m revenues 250 databases 2001 silverplatter sold wolters kluwer reputed price 113m forms part ovid technologies wolters kluwer subsidiary | [
4726
] | None |
2,625 | 2 | Memory_management_(operating_systems):memory management operating systems operating systems memory management function responsible managing computer primary memory memory management function keeps track status memory location either allocated free determines memory allocated among competing processes deciding gets memory receive much allowed memory allocated determines memory locations assigned tracks memory freed unallocated updates status distinct application memory management process manages memory assigned operating system single allocation simplest memory management technique computer memory usually exception small portion reserved operating system available single application ms-dos example system allocates memory way embedded system running single application might also use technique system using single contiguous allocation may still multitask swapping contents memory switch among users early versions music operating system used technique partitioned allocation divides primary memory multiple memory partitions usually contiguous areas memory partition might contain information specific job task memory management consists allocating partition job starts unallocating job ends partitioned allocation usually requires hardware support prevent jobs interfering one another operating system ibm system/360 used lock-and-key technique systems used base bounds registers contained limits partition flagged invalid accesses univac 1108 storage limits register separate base/bound sets instructions data system took advantage memory interleaving place called bank bank separate memory modules partitions may either static defined initial program load ipl boot time computer operator dynamic automatically created specific job ibm system/360 operating system multiprogramming fixed number tasks mft example static partitioning multiprogramming variable number tasks mvt example dynamic mvt successors use term region distinguish dynamic partitions static ones systems partitions may relocatable using hardware typed memory like burroughs corporation b5500 base bounds registers like pdp-10 ge-635 relocatable partitions able compacted provide larger chunks contiguous physical memory compaction moves in-use areas memory eliminate holes unused areas memory caused process termination order create larger contiguous free areas systems allow partitions swapped secondary storage free additional memory early versions ibm time sharing option tso swapped users single time-sharing partition paged allocation divides computer primary memory fixed-size units called page frames program virtual address space pages size hardware memory management unit maps pages frames physical memory allocated page basis address space appears contiguous usually paged memory management job runs address space however single address space operating systems run processes within single address space ibm runs processes within large address space ibm os/vs2 svs ran jobs single 16mib virtual address space paged memory demand-paged system move pages required primary secondary memory segmented memory memory management technique provide user program linear contiguous address space segments areas memory usually correspond logical grouping information code procedure data array segments require hardware support form segment table usually contains physical address segment memory size data access protection bits status swapped swapped etc segmentation allows better access protection schemes memory references relative specific segment hardware permit application reference memory defined segment possible implement segmentation without paging without paging support segment physical unit swapped memory required paging support pages usually unit swapping segmentation adds additional level security addresses segmented system usually consist segment id offset relative segment base address defined offset zero intel ia-32 x86 architecture allows process 16,383 segments 4gib ia-32 segments subdivisions computer linear address space virtual address space provided paging hardware multics operating system probably best known system implementing segmented memory multics segments subdivisions computer physical memory 256 pages page 1k 36-bit words size resulting maximum segment size 1mib 9-bit bytes used multics process could 4046 segments rollout/rollin computer operating system memory management technique entire non-shared code data running program swapped auxiliary memory disk drum free main storage another task programs may rolled demand end or…when waiting long event rollout/rollin commonly used time-sharing systems user think time relatively long compared time swap unlike virtual storage—paging segmentation rollout/rollin require special memory management hardware however unless system relocation hardware memory map base bounds registers program must rolled back original memory locations rollout/rollin largely superseded virtual memory rollout/rollin optional feature os/360 multiprogramming variable number tasks mvt rollout/rollin allows temporary dynamic expansion particular job beyond originally specified region job needs space rollout/rollin attempts obtain unassigned storage job use unassigned storage another job rolled -- i.e. transferred auxiliary storage -- region may used first job released first job additional storage available either 1 unassigned storage source 2 receive job transferred back main storage rolled note rollin/rollout os/360 used batch jobs rollin occur jobstep borrowing region terminates | [
6675,
7187,
10776,
25,
541,
4637,
9762,
5158,
7217,
9784,
10809,
576,
6730,
6221,
86,
10333,
97,
2152,
8298,
6772,
7285,
9335,
2168,
634,
1147,
3197,
1150,
2179,
10883,
4747,
6797,
9366,
6296,
7325,
9887,
1702,
6314,
3248,
6837,
1219,
8... | Validation |
2,626 | 9 | Galaksija_BASIC:galaksija basic galaksija basic basic interpreter galaksija build-it-yourself home computer yugoslavia partially based code taken trs-80 level 1 basic creator believed microsoft basic extensive modifications galaksija basic—such include rudimentary array support video generation code cpu absence dedicated video circuitry generally improvements programming language—is said left much flow-control floating point code remaining original core implementation interpreter fully contained 4 kib rom 1 computer original mainboard reserved slot extension rom b 2 added commands features built-in zilog z80 assembler core implementation rom 1 contained 3 special symbols 32 keywords extended basic features rom b 2 contained one extra reserved symbol 22 extra keywords | [
9714,
477,
8262
] | Test |
2,627 | 2 | Data_segment:data segment computing data segment often denoted .data portion object file corresponding virtual address space program contains initialized static variables global variables static local variables size segment determined size values program source code change run time data segment read-write since values variables altered run time contrast read-only data segment segment .rodata contains static constants rather variables also contrasts code segment also known text segment read-only many architectures zero-initialized data variables constants instead bss segment historically able support memory address spaces larger native size internal address register would allow early cpus implemented system segmentation whereby would store small set indexes use offsets certain areas intel 8086 family cpus provided four segments code segment data segment stack segment extra segment segment placed specific location memory software executed instructions operated data within segments performed relative start segment allowed 16-bit address register would normally able access 64 kb memory space access 1 mb memory space segmenting memory space discrete blocks specific tasks carried programming languages day concept still widely use within modern programming languages computer program memory largely categorized two sections read-only read-write distinction grew early systems holding main program read-only memory mask rom prom eeprom systems became complex programs loaded media ram instead executing rom idea portions program memory modified retained became .text .rodata segments program remainder could written divided number segments specific tasks code segment also known text segment simply text portion object file corresponding section program virtual address space contains executable instructions stored generally read-only fixed size .data segment contains global static variables pre-defined value modified variables defined within function thus accessed anywhere defined function defined static retain address across subsequent calls examples c include values variables initially stored within read-only memory typically within .text copied .data segment start-up routine program note example variables declared within function would default stored local stack frame bss segment also known uninitialized data usually adjacent data segment bss segment contains global variables static variables initialized zero explicit initialization source code instance variable defined codice_1 would contained bss segment heap area commonly begins end .bss .data segments grows larger addresses heap area managed malloc calloc realloc free may use brk sbrk system calls adjust size note use brk/sbrk single heap area required fulfill contract malloc/calloc/realloc/free may also implemented using mmap/munmap reserve/unreserve potentially non-contiguous regions virtual memory process virtual address space heap area shared threads shared libraries dynamically loaded modules process stack area contains program stack lifo structure typically located higher parts memory stack pointer register tracks top stack adjusted time value pushed onto stack set values pushed one function call termed stack frame stack frame consists minimum return address automatic variables also allocated stack stack area traditionally adjoined heap area grew towards stack pointer met heap pointer free memory exhausted large address spaces virtual memory techniques tend placed freely still typically grow converging direction standard pc x86 architecture stack grows toward address zero meaning recent items deeper call chain numerically lower addresses closer heap architectures grows opposite direction interpreted languages offer similar facility data segment notably perl ruby languages including line codice_2 perl codice_3 ruby old perl marks end code segment start data segment contents prior line executed contents source file line available file object codice_4 perl e.g. codice_5 codice_6 ruby considered form document file literal | [
1152,
1922,
8582,
6664,
6921,
11411,
9245,
6829,
5040,
3386,
6078,
5059,
6087,
4424,
8531,
6868,
10333,
8545,
7933
] | Validation |
2,628 | 4 | CSC_Version_6.0:csc version 6.0 center internet security critical security controls version 6.0 released october 15 2015 consists | [
9049,
3994,
2628
] | Validation |
2,629 | 4 | Parisa_Tabriz:parisa tabriz parisa tabriz american computer security expert works google director engineering chose title security princess due experience hacking internet security desire less staid whimsical title business card 2012 forbes magazine included top 30 people 30 watch technology industry list tabriz appears protagonist intrepid innovator book ara star engineer komal singh parisa tabriz born iranian father doctor american mother nurse polish-american descent grew suburbs chicago older sister two brothers neither parents computer literate tabriz n't encounter world computing first year university tabriz initially enrolled university illinois urbana–champaign study engineering soon became interested computer science instead completed bachelor master degrees university research wireless networking security attacks privacy-enhancing technologies co-authoring papers advisor nikita borisov also active member student club interested website security joined website hacked introduced field internet security tabriz offered summer internship google security team college joined company months graduation 2007 preparing attend conference tokyo google decided use job title security princess business card rather conventional information security engineer since sounded less boring considered ironic career tabriz trained google staff interested learning security worked youth expose diverse set people field computer security 2013 tabriz took responsibility security google chrome 2018 response rsa conference one non-male keynote speaker line-up 20 tabriz co-founded security advocates conference oursa five days pulled together speaker line-up consisting speakers under-represented backgrounds 14 speakers women | [
8671,
7899,
2558,
679
] | Test |
2,630 | 4 | Lock_screen:lock screen lock screen computer user interface element used various operating systems regulate immediate access device requiring user perform certain action order receive access entering password using certain button combination performing certain gesture using device touchscreen lock functions pc operating systems utilize login screen lock screens mobile devices often provide functionality beyond unlocking phone notifications emails text messages date time display shortcuts certain applications mobile operating system run smartphones tablets typically use gesture based lock-screen phones manufactured neonode unlocked swiping right touchscreen apple ios used iphone ipad lines utilized similar unlock mechanism ios 10 on-screen slider slid right beginning ios 5 sliding direction sends user directly camera app ios 7 slider widget removed part larger overhaul ios interface users could swipe point screen lock screen also displays clock notifications provides audio playback controls ios 10 made major changes lock screen removing swiping gesture accessing home screen requiring touch home button swiping still used access camera well additional page left widgets iphone x uses swipe gesture access home screen authenticated physical home button first android use gesture-based lock screen electing require user press phone menu button android 2.0 new gesture-based lock screen introduced displaying two icons one unlocking phone one setting volume mode activated dragging relevant icon center screen curve similarly rotary dial android 2.1 rotary dial replaced two tabs either end screen android 3.0 introduced new design ball padlock icon dragged outside circular area 4.0 option unlock straight camera provided 4.1 adds ability unlock google search screen dragging android 4.2 makes additional changes lock screen allowing users add widgets pages accessible lock screen swiping left edge screen camera accessed similar manner swiping right edge screen android also allows devices locked using password passcode pattern grid 9 circles fingerprint sensing facial recognition android distributions manufacturers typically use different lock screen designs stock android utilizes newer versions htc sense used metallic ring dragged bottom screen unlock phone also allows users launch apps dragging respective shortcut icon ring instead recent samsung devices lock screen involves dragging direction location screen touchwiz nature devices galaxy iii s4 also accompanied visual effect pond ripple lens flare similarly htc lock screen app shortcuts dragged bottom screen unlock directly apps may contain adware hijacks default lock screen replace one displays advertising november 2017 google play store officially banned non-lock screen apps monetizing lock screen windows nt offered ability users lock computers displaying login window requires active user password entered re-gain access system since windows xp lock function also bound keyboard shortcut windows 8 lock screen re-designed closer resemble used mobile operating systems users choose distinct wallpaper use lock screen also displays clock calendar events notifications apps screen dragged upwards mouse touchscreen unlock device windows 10 maintains design whilst adding ability use cortana voice assistant lock screen support slide shows windows spotlight service retrieve daily wallpapers optionally receive promotional suggestions related wallpaper screen locking functionality also built screensaver systems unix-like operating systems xscreensaver gnome-screensaver apple holds several patents related sliding lock screen used ios devices granted 2010 2011 describing system involves continuously dragging image certain point unlock device part ongoing patent wars numerous companies surrounding patents related mobile devices apple asserted patents several patent infringement lawsuits outside united states competing vendors apple lawsuits samsung netherlands htc united kingdom led failure courts ruled patents invalid citing similar lock screen n1 mobile phone manufactured swedish company neonode prior art apple design british court specifically ruled apple lock screen obvious improvement neonode n1 due additional visual feedback on-screen slider graphic unlike n1 displayed written instruction explaining gesture early work touchscreen technology university maryland human – computer interaction lab also cited prior art particular 1991 touchscreen slider developed catherine plaisant january 2012 apple permanent injunction german court ruled motorola mobility violated patents recent devices although motorola xoom tablet ruled infringed patent however apple warned would required put bond insurance allow injunction take effect potential sales ban result would limited germany | [
10755,
5892,
9732,
9610,
6539,
8333,
4624,
8976,
5397,
10009,
2852,
7595,
7983,
2737,
1083,
4032,
3409,
2259,
8019,
1623,
4458,
8299,
877,
6644,
6783
] | None |
2,631 | 1 | Dapper_ORM:dapper orm dapper object-relational mapping orm product microsoft .net platform provides framework mapping object-oriented domain model traditional relational database purpose relieve developer significant portion relational data persistence-related programming tasks dapper free open source software distributed dual license either apache license 2.0 mit license following key features dapper | [
2401,
9286,
3080,
5612,
7983,
3763,
3573,
632,
9467
] | Test |
2,632 | 1 | AutoNumber:autonumber autonumber type data used microsoft access tables generate automatically incremented numeric counter may used create identity column uniquely identifies record table one autonumber allowed table data type called counter access 2.0 three forms autonumbers generated default size autonumber 4-byte long integer size used start+increment random autonumbers replication id autonumbers codice_1 property field changed long integer codice_2 autonumber long integer codice_3 property determines whether start+increment random form values property take increment random default autonumber type start+increment counter start value 1 increment 1 although many instances autonumber field appear contains row count deletion rows table example cause autonumber fields re-numbered instead leaves holes numbering similarly transaction add row table begun later aborted autonumber assigned row re-used default start+increment form start value 1 increment 1 suitable circumstances reasons choose form trade-offs default start increment values might reveal information table desired reveal people viewing individual table rows example using autonumber field customer id might reveal information desirable reveal say customer number 6 one example occasion start value autonumber field raised customer number 6 say autonumber field value 10006 using random values desirable cases would unfortunate possible guess next values assigned new rows table usage rare however common problem autonumber fields encountered tables replicated multiple users using multiple replicas table likely end assigning values autonumber fields new rows add causing replication conflicts replicas merged problem addressed two ways first possible use replication ids autonumbers replication ids guids unique across replicas low probability collision second access creates table replicas automatically changes autonumbers start+increment form random form following data definition language ddl query creates autonumber field start value increment query resets counter alternative method resetting counter drop column re-add side effect renumbering existing rows table | [
10632,
8201,
11144,
8979,
2068,
10389,
7446,
2456,
1049,
5658,
5403,
9631,
10145,
9634,
8230,
4263,
2344,
7080,
10029,
10286,
9397,
440,
3004,
10048,
5953,
9286,
460,
2901,
10326,
987,
2780,
4065,
7523,
9828,
10471,
6124,
2669,
6383,
1904,
... | Test |
2,633 | 3 | Mystery_House:mystery house mystery house adventure game released on-line systems 1980 designed written illustrated roberta williams programmed ken williams apple ii mystery house first graphical adventure game first game produced on-line systems company would evolve sierra on-line one earliest horror video games game starts near abandoned victorian mansion player soon locked inside house option explore mansion contains many interesting rooms seven people tom plumber sam mechanic sally seamstress dr. green surgeon joe grave-digger bill butcher daisy cook initially player search house order find hidden cache jewels however terrible events start happening dead bodies people begin appearing becomes obvious murderer loose house player must discover become next victim end 1970s ken williams sought set company enterprise software market-dominating apple ii computer one day took teletype terminal house work development accounting program looking catalogue found game called colossal cave adventure buying game introduced wife roberta played finished colossal cave adventure began search something similar found market underdeveloped roberta decided could write conceived plot mystery house taking inspiration agatha christie novel none recognizing knew programming needed someone else code game convinced husband help ken agreed borrowed brother apple ii computer write game roberta suggested adding graphical scenes otherwise text-based game would make interesting players pair bought versawriter machine allowed users trace line drawing convert digital drawing roberta drew seventy scenes game ken found however resulting digital drawings large fit 5¼-inch floppy disk stored images game instructions program redraw lines scenes rather static images well writing better version versawriter scanning software resulting game text-based adventure depiction character location displayed text game code completed days finished may 5 1980 pair took advertisement micro magazine on-line systems mass-produced ziploc bags containing floppy disk sheet instructions sold 24.95 williams surprise roberta initially considered hobby project sold 10,000 copies mail-order including 1982 rerelease sierraventure line game sold 80,000 units world-wide making one best-selling computer games time computer gaming world 1996 ranked fourth magazine list innovative computer games gamepro named mystery house 51st important game time 2007 introducing visual component adventure games featuring graphics time computer games though game often considered first adventure game use graphics dungeon crawl role-playing video games already using graphics prior release applying graphics adventure game however unprecedented previous story-based adventure games entirely text-based mystery house success led williams create hi-res adventures brand note game hi-res adventure 1 follow-on success next game wizard princess pair moved game development full-time on-line systems incorporated 1980 sierra on-line game later released public domain 1987 part sierra seventh anniversary celebration japan several different adventure games title mystery house released 1982 microcabin released mystery house unrelated inspired on-line systems game name following year japanese company starcraft released enhanced remake on-line systems mystery house realistic art work depiction blood nec pc-6001 pc-8801 mystery house ii msx released sequel microcabin mystery house japanese versions mystery house sold 50,000 units including 30,000 copies msx 20,000 copies pc-6001 pc-8001 pc-8801 pc-9801 fm-7 x1 computers mystery house satirized 1982 adventure game prisoner 2 one location game spooky house whereupon arrival player told killed ken —that ken williams—and must seek absolution murder elements game later reintroduced sierra on-line game colonel bequest 1989 | [
5184,
6404,
6405,
9006,
7023
] | Test |
2,634 | 4 | Morgan_Marquis-Boire:morgan marquis-boire morgan marquis-boire new zealand-born hacker journalist security researcher late 2017 accused multiple sexual assaults director security first look media contributing writer intercept research security surveillance censorship front pages new york times washington post covered news media including bbc news bloomberg wall street journal der spiegel work tracking digital component ongoing syrian civil war book black code inside battle cyberspace marquis-boire previously served advisor freedom press foundation special advisor electronic frontier foundation eff advisor united nations interregional crime justice research institute marquis-boire resigned september 2017 position technical advisory group citizen lab multi-disciplinary advanced research laboratory university toronto citizen lab later disclosed resignation received allegation 2014 sexual assault involving marquis-boire profiled wired cnn süddeutsche zeitung tages anzeiger one wired italy top 50 people 2014 march 2015 named young global leader marquis-boire born new zealand began hacking teenager name headhntr holds bachelor degree political science university auckland marquis-boire conducted research blue coat systems palo alto company provides internet blocking monitoring solutions reports include devices wander mistake planet blue coat redux 2013 planet blue coat mapping global censorship surveillance tools 2013 research covered news media including front page washington post new york times globe mail jakarta post following publication reports blue coat systems announced would longer provide “ support updates services ” software syria april 2013 us government bureau industry security imposed fine usd 2.8 million emirati company responsible purchasing filtering products blue coat exporting syria without license marquis-boire conducted research global proliferation targeted surveillance software toolkits including finfisher hacking team finfisher suite remote intrusion surveillance software developed munich-based gamma international gmbh marketed sold exclusively law enforcement intelligence agencies uk-based gamma group 2012 morgan marquis-boire bill marczak provided first public identification finfisher software marquis-boire collaborators done investigations finfisher including revealing use bahraini activists analyzing variants finfisher suite target mobile phone operating systems uncovering targeted spying campaigns political dissidents malaysia ethiopia documenting finfisher command control servers 36 countries research informed responses civil society organizations pakistan mexico united kingdom mexico local activists politicians collaborated demand investigation state ’ acquisition surveillance technologies uk led crackdown sale software worries misuse repressive regimes hacking team milan italy-based company provides intrusion surveillance software called remote control system rcs law enforcement intelligence agencies marquis-boire collaborators mapped rcs network endpoints 21 countries provided evidence rcs used target human rights activist united arab emirates moroccan media organization independent news agency run members ethiopian diaspora following publication reports eff privacy international took legal action related allegations ethiopian government compromised computers ethiopian expatriates us uk 23rd usenix security symposium marquis-boire researchers released paper governments hack opponents look actors technology examining government targeting activists opposition members ngos observed bahrain syria united arab emirates 2012 2017 marquis-boire reported digital campaigns targeting syrian activists eff citizen lab many findings translated arabic disseminated along recommendations detecting removing malware work cover businessweek covered new york times al jazeera wired december 31 2013 marquis-boire gave interview covering work npr radio show things considered 2012 gave presentation use targeted malware attacks arab spring black hat briefings las vegas covered use malware campaigns purposes digital surveillance espionage libya syria bahrain morocco iran released paper eva galperin eff targeting vietnamese diaspora malware attacks detailed ongoing state-sponsored hacking campaign targeting prominent bloggers academics journalists marquis-boire given interviews wake global surveillance disclosures die zeit international business times dazed named al jazeera media trends watch 2015 shane huntley marquis-boire co-authored paper government targeting journalists media organizations presented black hat singapore 2014 paper reported 21 world top 25 media organizations targeted state-sponsored hacking april 2015 marquis-boire spoke western regional conference society professional journalists san francisco california presented paper entitled data security beginners black hat usa 2015 held las vegas august marquis-boire presented paper entitled big game hunting peculiarities nation-state malware research marquis-boire presented paper entitled security humans privacy coercion resistant design strange loop conference st. louis missouri september 2015 may 2016 state surveillance episode hbo series vice along edward snowden ron wyden september 2017 marquis-boire resigned position senior researcher citizen lab october organization cut ties informed accused sexually assaulting individual 2014 cyber dialogue event eff also released statement saying marquis-boire longer associated november verge published report specific claims assault rape second article contained claims including alleged quotes chat extracts marquis-boire admits drunkenly sexually assaulted raped women — exact number currently determining number women quoted articled sexually assaulted raped least ten | [
3520,
5024,
2275,
4903,
3495,
9227,
8172,
5135,
7893,
4314,
7515,
4956,
8671
] | Test |
2,635 | 3 | Tegra:tegra tegra system chip soc series developed nvidia mobile devices smartphones personal digital assistants mobile internet devices tegra integrates arm architecture central processing unit cpu graphics processing unit gpu northbridge southbridge memory controller onto one package early tegra socs designed efficient multimedia processors recent models emphasize performance gaming machine learning applications without sacrificing power efficiency tegra apx 2500 announced february 12 2008 tegra 6xx product line revealed june 2 2008 apx 2600 announced february 2009 apx chips designed smartphones tegra 600 650 chips intended smartbooks mobile internet devices mid first product use tegra microsoft zune hd media player september 2009 followed samsung m1 microsoft kin first cellular phone use tegra however phone app store tegra power provide much advantage september 2008 nvidia opera software announced would produce version opera 9.5 browser optimised tegra windows mobile windows ce mobile world congress 2009 nvidia introduced port google android tegra january 7 2010 nvidia officially announced demonstrated next generation tegra system-on-a-chip nvidia tegra 250 consumer electronics show 2010 nvidia primarily supports android tegra 2 booting arm-supporting operating systems possible devices bootloader accessible tegra 2 support ubuntu gnu/linux distribution also announced nvidia developer forum nvidia announced first quad-core soc february 2011 mobile world congress event barcelona though chip codenamed kal-el branded tegra 3 early benchmark results show impressive gains tegra 2 chip used many tablets released second half 2011 january 2012 nvidia announced audi selected tegra 3 processor in-vehicle infotainment systems digital instruments display processor integrated audi entire line vehicles worldwide beginning 2013 process iso 26262-certified summer 2012 tesla motors began shipping model electric high performance sedan contains two nvidia tegra 3d visual computing modules vcm one vcm powers 17-inch touchscreen infotainment system one drives 12.3-inch digital instrument cluster march 2015 nvidia announced tegra x1 first soc graphics performance 1 teraflop announcement event nvidia showed epic games unreal engine 4 elemental demo running tegra x1 october 20 2016 nvidia announced nintendo upcoming switch hybrid home/portable game console powered tegra hardware march 15 2017 techinsights revealed nintendo switch powered tegra x1 model t210 second generation tegra soc dual-core arm cortex-a9 cpu ultra low power ulp geforce gpu 32-bit memory controller either lpddr2-600 ddr2-667 memory 32kb/32kb l1 cache per core shared 1mb l2 cache tegra 2 cortex a9 implementation include arm simd extension neon version tegra 2 soc supporting 3d displays soc uses higher clocked cpu gpu tegra 2 video decoder largely unchanged original tegra limited support hd formats lack support high-profile h.264 particularly troublesome using online video streaming services common features tegra 3 codenamed kal-el functionally soc quad-core arm cortex-a9 mpcore cpu includes fifth companion core nvidia refers variable smp architecture cores cortex-a9s companion core manufactured low-power silicon process core operates transparently applications used reduce power consumption processing load minimal main quad-core portion cpu powers situations tegra 3 first tegra release support arm simd extension neon gpu tegra 3 evolution tegra 2 gpu 4 additional pixel shader units higher clock frequency also output video 2560×1600 resolution supports 1080p mpeg-4 avc/h.264 40 mbit/s high-profile vc1-ap simpler forms mpeg-4 divx xvid tegra 3 released november 9 2011 common features tegra 4 codenamed wayne announced january 6 2013 soc quad-core cpu includes fifth low-power cortex a15 companion core invisible os performs background tasks save power power-saving configuration referred variable smp architecture operates like similar configuration tegra 3 geforce gpu tegra 4 evolution predecessors however numerous feature additions efficiency improvements implemented number processing resources dramatically increased clock rate increased well 3d tests tegra 4 gpu typically several times faster tegra 3 additionally tegra 4 video processor full support hardware decoding encoding webm video 1080p 60mbit/s 60fps along tegra 4 nvidia also introduced i500 optional software modem based nvidia acquisition icera reprogrammed support new network standards supports category 3 100mbit/s lte later updated category 4 150mbit/s common features pixel shaders vertex shaders pixel pipelines tegra 4i codenamed grey announced february 19 2013 hardware support audio video formats using cortex-a9 cores instead cortex-a15 tegra 4i low-power variant tegra 4 designed phones tablets unlike tegra 4 counterpart tegra 4i also integrates icera i500 lte/hspa+ baseband processor onto die common features pixel shaders vertex shaders pixel pipelines nvidia ’ tegra k1 codenamed logan features arm cortex-a15 cores 4+1 configuration similar tegra 4 nvidia 64-bit project denver dual-core processor well kepler graphics processing unit support direct3d 12 opengl es 3.1 cuda 6.5 opengl 4.4/opengl 4.5 vulkan nvidia claims outperforms xbox 360 ps3 whilst consuming significantly less power support adaptive scalable texture compression late april 2014 nvidia shipped jetson tk1 development board containing tegra k1 soc running ubuntu linux unified shaders texture mapping units render output units december 2015 web page wccftech.com published article stating tesla going use tegra k1 based design derived template nvidia visual computing module vcm driving infotainment systems providing visual driving aid respective vehicle models time news found similar successor clear confirmation later place combination multimedia auto pilot system vehicle models nvidia tegra x1 codenamed erista features four arm cortex-a57 cores four arm cortex-a53 cores well maxwell-based graphics processing unit supports adaptive scalable texture compression contrary initial belief nvidia use eight cores arm big.little configuration instead devices utilizing tegra x1 always show four arm cortex-a57 cores available four arm cortex-a53 cores accessed operating system used automatically low power scenarios determined cpu nvidia tegra x2 codenamed parker features nvidia custom general-purpose armv8-compatible core denver 2 well code-named pascal graphics processing core gpgpu support chips made using finfet process technology using tsmc 16 nm finfet+ manufacturing process recent tegra soc xavier named comic book character professor x announced 28 september 2016 march 2019 released contains 7 billion transistors 8 custom armv8 cores volta gpu 512 cuda cores open sourced tpu tensor processing unit called dla deep learning accelerator able encode decode 8k ultra hd 7680×4320 users configure operating modes 10w 15w 30w tdp needed die size 350 mm nvidia confirmed fabrication process 12 nm finfet ces 2018 linux kernel mailing list tegra194 based development board type id p2972-0000 got reported board consists p2888 compute module p2822 baseboard nvidia announced next-gen soc codename orin resembling name aquaman comic hero march 27 2018 gpu technology conference 2018 presentations already indicate design two orin chips planned par performance pegasus board four chips supposed formed two xavier chips two gpu chips factor five performance xavier orin seems indicated nowiki /nowiki pixel shaders vertex shaders since kepler unified shaders used nvidia distributes proprietary device drivers tegra oems part linux tegra formerly l4t development kit newer powerful devices tegra family supported nvidia vibrante linux distribution vibrante comes larger set gnu/linux tools plus several nvidia provided libraries acceleration area data processing especially image processing driving safety automated driving level deep learning neuronal networks make e.g heavy use cuda capable accelerator blocks via opencv make use neon vector extensions arm cores due different business needs geforce line graphics cards nvidia one embedded partners avionic design gmbh germany also working submitting open-source drivers tegra upstream mainline linux kernel nvidia co-founder ceo laid tegra processor roadmap using ubuntu unity gpu technology conference 2013 end 2018 evident nvidia employees contributed substantial code parts make t186 t194 models run hdmi display audio upcoming official linux kernel 4.21 q1 2019 thus positively affected software modules open source nouveau closed source nvidia graphics drivers along nvidia proprietary cuda interface drive px2 board announced qnx rtos support april 2016 gpu technology conference socs platforms comparable specifications e.g audio/video input output processing capability connectivity programmability entertainment/embedded/automotive capabilities certifications power consumption | [
3585,
7170,
8720,
11282,
9235,
3605,
11289,
10784,
1057,
38,
4139,
8237,
9774,
2097,
5681,
8250,
1083,
11322,
8253,
7745,
7235,
7747,
2635,
99,
8812,
11374,
4211,
5237,
10361,
6268,
638,
3203,
644,
11396,
8842,
146,
659,
1170,
1682,
7833,... | Test |
2,636 | 4 | ICWATCH:icwatch icwatch public database mainly linkedin profiles people united states intelligence community database created transparency toolkit hosted wikileaks publication global surveillance disclosures 2013 revealed code names surveillance projects including marina mainway discovered linkedin profiles individuals intelligence community mentioned code names well additional ones transparency toolkit took advantage automated collection linkedin profiles mentioning code names collating searchable database name icwatch play icreach alleged top-secret surveillance-related search engine created united states national security agency nsa september 11 attacks initial commit git repository lookingglass made august 23 2014 lookingglass search tool built use icwatch icwatch launched may 6 2015 day transparency toolkit group created icwatch presented conference launch database contained information 27,000 linkedin profiles mid-may 2015 transparency toolkit began receiving requests individuals removed icwatch including death threats following threats well distributed denial-of-service attacks made site wikileaks began hosting website database end may 2015 may 20 2015 number profiles icwatch increased almost 140,000 august 2016 techcrunch reported linkedin suing 100 unnamed individuals scraped linkedin website named icwatch possible target database tracks 100,000 profiles linkedin indeed public sources database searched using company location industry parameters intelligence workers discovered profiles national security agency working contractors project also revealed possible trends employment intelligence community instance number people claiming work sigint databases … increased dramatically years since 2008 small decline starting 2013 m. c. mcgrath transparency toolkit believes workers part pretty normal people ian paul pc world voiced concern safety individuals listed database | [
3462,
6344,
7887,
7893,
11221,
9245
] | Test |
2,637 | 2 | DexOS:dexos dexos 32-bit operating system written x86 assembly designed coders want direct access hardware including cpu graphics well-commented code documentation licensed free use license commercial non-commercial use written maintained craig bamford voluntary developers around world dexos two modes interaction graphical user interface gui command line interface available user boot version 5.0 dexos fasm port text editor image viewer full tcp/ip stack many games web server support sound ethernet cards programs following list commands supported dexos command line | [
2179,
292,
6596,
8262,
9964,
7983,
499,
5363,
6675,
1750,
8729,
9946,
7483,
7356,
477
] | Test |
2,638 | 3 | Complex_instruction_set_computer:complex instruction set computer complex instruction set computer cisc computer single instructions execute several low-level operations load memory arithmetic operation memory store capable multi-step operations addressing modes within single instructions term retroactively coined contrast reduced instruction set computer risc therefore become something umbrella term everything risc large complex mainframe computers simplistic microcontrollers memory load store operations separated arithmetic instructions modern risc processor therefore much complex say modern microcontroller using cisc-labeled instruction set especially complexity electronic circuits also number instructions complexity encoding patterns typical differentiating characteristic risc designs use uniform instruction length almost instructions employ strictly separate load/store-instructions examples instruction set architectures retroactively labeled cisc system/360 z/architecture pdp-11 vax architectures data general nova many others well known microprocessors microcontrollers also labeled cisc many academic publications include motorola 6800 6809 68000-families intel 8080 iapx432 x86-family zilog z80 z8 z8000-families national semiconductor 32016 ns320xx-line mos technology 6502-family intel 8051-family others designs regarded borderline cases writers instance microchip technology pic labeled risc circles cisc others 6502 6809 described risc-like although complex addressing modes well arithmetic instructions operate memory contrary risc-principles risc philosophy became prominent many computer architects tried bridge so-called semantic gap i.e. design instruction sets directly support high-level programming constructs procedure calls loop control complex addressing modes allowing data structure array accesses combined single instructions instructions also typically highly encoded order enhance code density compact nature instruction sets results smaller program sizes fewer slow main memory accesses time early 1960s onwards resulted tremendous saving cost computer memory disc storage well faster execution also meant good programming productivity even assembly language high level languages fortran algol always available appropriate indeed microprocessors category sometimes still programmed assembly language certain types critical applications 1970s analysis high-level languages indicated complex machine language implementations determined new instructions could improve performance instructions added never intended used assembly language fit well compiled high-level languages compilers updated take advantage instructions benefits semantically rich instructions compact encodings seen modern processors well particularly high-performance segment caches central component opposed embedded systems fast complex expensive memories inherently limited size making compact code beneficial course fundamental reason needed main memories i.e. dynamic ram today remain slow compared high-performance cpu core many designs achieved aim higher throughput lower cost also allowed high-level language constructs expressed fewer instructions observed always case instance low-end versions complex architectures i.e using less hardware could lead situations possible improve performance using complex instruction procedure call enter instruction instead using sequence simpler instructions one reason architects microcode writers sometimes over-designed assembly language instructions including features could implemented efficiently basic hardware available could instance side effects conventional flags setting register memory location perhaps seldom used done via ordinary non duplicated internal buses even external bus would demand extra cycles every time thus quite inefficient even balanced high-performance designs highly encoded relatively high-level instructions could complicated decode execute efficiently within limited transistor budget architectures therefore required great deal work part processor designer cases simpler typically slower solution based decode tables and/or microcode sequencing appropriate time transistors components limited resource also left fewer components less opportunity types performance optimizations circuitry performs actions defined microcode many cisc processors processor many ways reminiscent structure early cpu designs early 1970s gave rise ideas return simpler processor designs order make feasible cope without relatively large expensive rom tables and/or pla structures sequencing and/or decoding first retroactively risc- labeled processor ibm 801 ibm watson research center mid-1970s tightly pipelined simple machine originally intended used internal microcode kernel engine cisc designs also became processor introduced risc idea somewhat larger public simplicity regularity also visible instruction set would make easier implement overlapping processor stages pipelining machine code level i.e level seen compilers however pipelining level already used high performance cisc supercomputers order reduce instruction cycle time despite complications implementing within limited component count wiring complexity feasible time internal microcode execution cisc processors hand could less pipelined depending particular design therefore less akin basic structure risc processors modern context complex variable-length encoding used typical cisc architectures makes complicated still feasible build superscalar implementation cisc programming model directly in-order superscalar original pentium out-of-order superscalar cyrix 6x86 well known examples frequent memory accesses operands typical cisc machine may limit instruction level parallelism extracted code although strongly mediated fast cache structures used modern designs well measures due inherently compact semantically rich instructions average amount work performed per machine code unit i.e per byte bit higher cisc risc processor may give significant advantage modern cache based implementation transistors logic plas microcode longer scarce resources large high-speed cache memories limited maximum number transistors today although complex transistor count cisc decoders grow exponentially like total number transistors per processor majority typically used caches together better tools enhanced technologies led new implementations highly encoded variable length designs without load-store limitations i.e non-risc governs re-implementations older architectures ubiquitous x86 see well new designs microcontrollers embedded systems similar uses superscalar complexity case modern x86 solved converting instructions one micro-operations dynamically issuing micro-operations i.e indirect dynamic superscalar execution pentium pro amd k5 early examples allows fairly simple superscalar design located fairly complex decoders buffers giving speak best worlds many respects technique also used ibm z196 later z/architecture microprocessors terms cisc risc become less meaningful continued evolution cisc risc designs implementations first highly tightly pipelined x86 implementations 486 designs intel amd cyrix ibm supported every instruction predecessors achieved maximum efficiency fairly simple x86 subset little typical risc instruction set i.e without typical risc load-store limitations intel p5 pentium generation superscalar version principles however modern x86 processors also typically decode split instructions dynamic sequences internally buffered micro-operations helps execute larger subset instructions pipelined overlapping fashion also facilitates advanced extraction parallelism code stream even higher performance contrary popular simplifications present also academic texts ciscs microcoded complex instructions cisc became catch-all term meaning anything load-store risc architecture number instructions complexity implementation instructions define cisc fact arithmetic instructions also perform memory accesses compared small 8-bit cisc processor risc floating-point instruction complex cisc even need complex addressing modes 32 64-bit risc processors may well complex addressing modes small 8-bit cisc processors pdp-10 pdp-8 intel 80386 intel 4004 motorola 68000 system z mainframe burroughs b5000 vax zilog z80000 mos technology 6502 vary wildly number sizes formats instructions number types sizes registers available data types hardware support operations like scanning substring arbitrary-precision bcd arithmetic transcendental functions others 8-bit addition subtraction cisc category load-operate instructions load and/or store memory contents within instructions perform actual calculations instance pdp-8 8 fixed-length instructions microcode cisc instructions work powerpc 230 instructions vaxes complex internals like register renaming reorder buffer risc minimal cisc 8 instructions clearly cisc combines memory access computation instructions | [
512,
7173,
9739,
4108,
9741,
5649,
2066,
7699,
5655,
10779,
8732,
10781,
6181,
8231,
3630,
6705,
7218,
2620,
2623,
2113,
7234,
3142,
1103,
6742,
1119,
1122,
7269,
3175,
4204,
8815,
7281,
9330,
8820,
630,
7286,
8822,
4217,
9851,
6268,
3197... | Validation |
2,639 | 5 | Load-balanced_switch:load-balanced switch load-balanced switch switch architecture guarantees 100 throughput central arbitration cost sending packet across crossbar twice load-balanced switches subject research large routers scaled past point practical central arbitration internet routers typically built using line cards connected switch routers supporting moderate total bandwidth may use bus switch high bandwidth routers typically use sort crossbar interconnection crossbar output connects one input information flow every output simultaneously crossbars used packet switching typically reconfigured tens millions times per second schedule configurations determined central arbiter example wavefront arbiter response requests line cards send information one another perfect arbitration would result throughput limited maximum throughput crossbar input output example traffic coming line cards b destined line card c maximum traffic cards b process together limited c. perfect arbitration shown require massive amounts computation scales much faster number ports crossbar practical systems use imperfect arbitration heuristics islip computed reasonable amounts time load-balanced switch related load balancing switch refers kind router used front end farm web servers spread requests single website across many servers shown figure right load-balanced switch n input line cards rate r connected n buffers link rate r/n buffers turn connected n output line cards rate r links rate r/n buffers center partitioned n virtual output queues input line card spreads packets evenly n buffers something clearly without contention buffer writes packets single buffer-local memory combined rate r. simultaneously buffer sends packets head virtual output queue output line card rate r/n card output line card clearly forward packets line contention buffer load-balanced switch acts shared-memory switch load-balanced switch essentially way scale shared-memory switch cost additional latency associated forwarding packets rate r/n twice stanford group investigating load-balanced switches concentrating implementations number buffers equal number line cards one buffer placed line cards two interconnection meshes actually mesh supplying rate 2r/n every pair line cards basic load-balanced switch architecture require buffers placed line cards number buffers line cards one interesting property load-balanced switch although mesh connecting line cards buffers required connect every line card every buffer requirement mesh act non-blocking crossbar connections responsive traffic pattern connection far simpler centrally arbitrated crossbar two packets destined output arrive back-to-back one line card spread two different buffers could two different occupancies packets could reordered time delivered output although reordering legal typically undesirable tcp perform well reordered packets adding yet latency buffering load-balanced switch maintain packet order within flows using local information one algorithm foff fully ordered frames first foff additional benefits removing vulnerability pathological traffic patterns providing mechanism implementing priorities stanford university tiny tera project see abrizio introduced switch architecture required least two chip designs switching fabric crossbar slice arbiter upgrading arbiter include load-balancing combining devices could reliability cost throughput advantages since line cards load-balanced switch need physically near one another one possible implementation use entire continent- global-sized backbone network interconnection mesh core routers line cards implementation suffers latencies increased twice worst-case transmission latency number intriguing advantages | [
10924
] | Test |
2,640 | 5 | Stop-and-wait_ARQ:stop-and-wait arq stop-and-wait arq also referred alternating bit protocol method telecommunications send information two connected devices ensures information lost due dropped packets packets received correct order simplest automatic repeat-request arq mechanism stop-and-wait arq sender sends one frame time special case general sliding window protocol transmit receive window sizes equal one greater one respectively sending frame sender n't send frames receives acknowledgement ack signal receiving valid frame receiver sends ack ack reach sender certain time known timeout sender sends frame timeout countdown reset frame transmission behavior basic example stop-and-wait however real-life implementations vary address certain issues design typically transmitter adds redundancy check number end frame receiver uses redundancy check number check possible damage receiver sees frame good sends ack receiver sees frame damaged receiver discards send ack—pretending frame completely lost merely damaged one problem ack sent receiver damaged lost case sender n't receive ack times sends frame receiver two copies frame n't know second one duplicate frame next frame sequence carrying identical data another problem transmission medium long latency sender timeout runs frame reaches receiver case sender resends packet eventually receiver gets two copies frame sends ack one sender waiting single ack receives two acks may cause problems assumes second ack next frame sequence avoid problems common solution define 1 bit sequence number header frame sequence number alternates 0 1 subsequent frames receiver sends ack includes sequence number next packet expects way receiver detect duplicated frames checking frame sequence numbers alternate two subsequent frames sequence number duplicates second frame discarded similarly two subsequent acks reference sequence number acknowledging frame stop-and-wait arq inefficient compared arqs time packets ack data received successfully twice transit time assuming turnaround time zero throughput channel fraction could solve problem one send one packet time larger sequence number use one ack set done go-back-n arq selective repeat arq | [
2752,
2912,
1154,
5071,
2772,
4918,
7865,
2203
] | Test |
2,641 | 7 | Azure_Data_Lake:azure data lake azure data lake scalable data storage analytics service service hosted azure microsoft public cloud azure data lake service released november 16 2016 azure data lake built learnings technologies cosmos microsoft ’ internal big data system cosmos used store process data applications azure adcenter bing msn skype windows live cosmos features sql-like query engine called scope upon u-sql built users store structured semi-structured unstructured data produced applications including social networks relational data sensors videos web apps mobile desktop devices single azure data lake store account store trillions files single file greater petabyte size azure data lake analytics parallel on-demand job service parallel processing system based microsoft dryad solution dryad represent arbitrary directed acyclic graphs dags computation data lake analytics provides distributed infrastructure dynamically allocate de-allocate resources customers pay services use azure data lake analytics uses apache yarn central part apache hadoop govern resource management deliver operations across hadoop clusters microsoft azure data lake store supports application uses open apache hadoop distributed file system hdfs standard using data lake analytics users develop run parallel data transformation processing programs u-sql query language combines sql c u-sql designed evolution declarative sql language native extensibility user code written c u-sql uses c data types c expression language | [
4704,
5666,
10413,
1935,
7537,
11571,
2004,
2140
] | Test |
2,642 | 3 | Formation_Z:formation z taking place year 2701 player controls robot transform aero fighter mission stop alien super weapon reaching earth robot may move forwards backwards jump aero fighter may travel anywhere screen limited fuel combination two must used avoid obstacles well destroy on-screen enemies extra points | [
1776,
10931,
3788,
9006
] | Test |
2,643 | 4 | Peter_Garza:peter garza peter garza born august 6 1960 united states computer forensics expert cybercrime investigator special agent naval criminal investigative service peter garza conducted first court-ordered internet wiretap united states investigating julio cesar ardita el griton hacking case ardita charged u.s. justice department using compromised user accounts harvard university hack government university computer systems u.s. abroad ardita pleaded guilty may 19 1998 united states district court massachusetts unlawfully intercepting electronic communications damaging files military computer systems garza founded evidentdata inc. private sector consulting firm specializing computer forensics electronic discovery expert consulting 1999 evidentdata acquired first advantage left 2009 form data forté garza continues involved many high-profile civil cases gave expert testimony regarding altered electronic documents case beckman coulter inc. v. dovatron international inc. resulted 934 million jury award testified regarding critical deleted recoverable data case steinberg moorad dunn inc. v. dunn brought sports agent leigh steinberg former partner david dunn resulted 45 million jury award peter garza earned master science information systems claremont graduate university 2001 also developed taught graduate course computer forensics california state polytechnic university pomona | [
4945,
4956,
9319
] | Test |
2,644 | 2 | Object_Description_Language:object description language object description language odl original interface definition language created microsoft specifying interfaces used ole automation superset omg idl microsoft provided utility codice_1 compile odl files odl merged microsoft interface definition language | [
8473,
10465,
8262,
1407
] | None |
2,645 | 2 | List_of_Linux_containers:list linux containers linux containers implementations operating system-level virtualization linux operating system several implementations exist based virtualization isolation resource management mechanisms provided linux kernel notably linux namespaces cgroups include | [
318,
5378,
7140,
295,
4238,
7983,
7920,
823,
2236,
2910
] | Test |
2,646 | 4 | Clear_channel_assessment_attack:clear channel assessment attack clear channel assessment attack queensland attack physical layer dos attack wi-fi networks attack focuses need wireless network receive clear channel assessment function within csma/ca determine whether wireless medium ready able receive data transmitter may start sending attack makes appear airwaves busy basically puts entire system hold attack works 802.11b effective ofdm-based protocols 802.11g 802.11a however hybrid 802.11b/g access points hinder 802.11g network 802.11b network attacked attack originally discovered researchers queensland university technology information security research center thus name queensland attack comes signal telling system airwaves busy course sent attacker nic placing continuous transmit mode attack set use intersil prism test utility prismtestutil322.exe | [] | Test |
2,647 | 9 | MOL-360:mol-360 mol-360 mid-level systems programming language ibm system/360 family computers based algol data structure supported language arrays support floating point data allows direct access processor registers inline assembly language mol-360 used system development corporation sdc develop adept time-sharing system similar language mol940 written sds 940 computer system | [
11075,
8262,
4998,
1552,
9911,
3323
] | Test |
2,648 | 4 | Secure_environment:secure environment computing secure environment system implements controlled storage use information event computing data loss secure environment used protect personal and/or confidential data often secure environments employ cryptography means protect information secure environments employ cryptographic hashing simply verify information altered since last modified | [
1801,
5226
] | None |
2,649 | 3 | Hareraiser:hareraiser hareraiser computer game originally released 1984 uk home computer platforms released two parts prelude finale prize worth £30,000 offer game could solved game released acorn electron amstrad cpc bbc micro model b commodore 64 commodore vic-20 ex dragon 32 msx oric atmos 48k sinclair zx spectrum 1984 £8.95 part game takes form series graphical screens depicting grass sky trees occasional text clues interaction pressing cursor keys follow hare moves across screen disappears one sides hints puzzle solved may case text position trees sun clouds elements different screen interpreted way solvers prelude would also buy solve finale could enter competition locate prize bejewelled 18 carat golden hare pendant featured cover golden hare previously prize solving book masquerade british artist kit williams buried secret location ampthill park bedfordshire object game solve clues book would lead successful treasure-hunter location golden prize several sources state erroneously hareraiser based masquerade fact thing apart prize two common feature hare haresoft founded dugald thompson controversial winner masquerade business partner john guard haresoft claimed game released two parts make fun enable competitors ages participate sinclair user magazine however suggested simply make money haresoft stated additional clue revealed harrods tv personality anneka rice nature clue remains unknown whether rice even revealed clue game sell well haresoft went liquidation hareraiser never solved hare sold sotheby auction creditors 1988 although given guide price £3,000–6,000 fact exceed haresoft stated value selling £31,900 although rumoured sold early 1990s whereabouts unknown 20 years july 2009 appeal made bbc radio 4 current owner granddaughter got touch kit williams reunited hare bbc tv documentary game awarded 3/10 sinclair user reviewer richard price struggling find reason play game except sincere need get rich norwich gaming festival 2017 comedian computer game historian stuart ashen described showed game play called worst game ever revealing solution videogame predecessor discovered via cheating ashen stated believed puzzle intentionally designed unsolvable haresoft would lose art piece golden hare | [
9006
] | Test |
2,650 | 9 | IMP_(programming_language):imp programming language imp early systems programming language developed edgar t. irons late 1960s early 1970s unlike systems programming languages imp even though designer refers language based algol imp excludes many defining features language supporting non-algol-like one syntax extensibility compiler imp existed early 1965 used programming cdc 6600 time-sharing system use institute defense analyses since 1967 although compiler slower comparable ones non-extensible languages used practical production work imp compilers developed cdc-6600 cray pdp-10 pdp-11 computers important imp versions imp65 imp70 imp72 imp allows programmer extend syntax although specific means provided add new datatypes structures achieve syntax-extensibility imp uses powerful parse algorithm based syntax graph several connectivity matrices programmer may add new bnf productions graph imp72 syntax extended means extended-bnf syntax statements included source program mechanism powerful allowed implementation language i.e. imp72 source file consisting entirely syntax statements input trivial compiler initially able translate simplest case syntax statement also simple form syntax statement looks like macro casual user basically syntax statement augmented bnf production associated semantics added right example add construct described following bnf semantics codice_1 translate codice_2 programmer would need insert following imp statement semantic-part also contain calls semantic routines following syntax statement semantic part statement consists call semantic routine codice_3 arguments octal constant codice_4 semantic routine call codice_5 codice_6 object top stack moment production invoked codice_3 semantic routine respectively takes arguments pdp-10 machine language opcode register object object produces object whose value result executing designated machine instruction using address field object last argument specific example opcode codice_4 designates codice_9 instruction thus result syntax statement compile code compute absolute value codice_6 imp language used nsa homegrown time-sharing system known folklore | [
512,
10560,
11075,
8262,
7432,
7634,
372,
1045,
8474
] | Validation |
2,651 | 7 | HTCondor:htcondor htcondor open-source high-throughput computing software framework coarse-grained distributed parallelization computationally intensive tasks used manage workload dedicated cluster computers farm work idle desktop computersso-called cycle scavenging htcondor runs linux unix mac os x freebsd microsoft windows operating systems htcondor integrate dedicated resources rack-mounted clusters non-dedicated desktop machines cycle scavenging one computing environment htcondor developed htcondor team university wisconsin–madison freely available use htcondor follows open-source philosophy licensed apache license 2.0 htcondor makes use unused computing time leaving computers turned use htcondor increase energy consumption associated costs starting version 7.1.1 htcondor hibernate wake machines based user-specified policies feature previously available via third-party software htcondor formerly known condor name changed october 2012 resolve trademark lawsuit htcondor scheduler software used distribute jobs first draft assembly human genome way example nasa advanced supercomputing facility nas htcondor pool consists approximately 350 sgi sun workstations purchased used software development visualization email document preparation etc workstation runs daemon watches user i/o cpu load workstation idle two hours job batch queue assigned workstation run daemon detects keystroke mouse motion high non-htcondor cpu usage point job removed workstation placed back batch queue htcondor run sequential parallel jobs sequential jobs run several different universes including vanilla provides ability run batch ready programs standard universe target application re-linked htcondor i/o library provides remote job i/o job checkpointing htcondor also provides local universe allows jobs run submit host world parallel jobs htcondor supports standard message passing interface parallel virtual machine goux et al 2000 addition master worker mw library extremely parallel tasks htcondor-g allows htcondor jobs use resources direct control mostly used talk grid cloud resources like pre-ws ws globus nordugrid arc unicore amazon elastic compute cloud also used talk batch systems like torque/pbs lsf support sun grid engine currently development part egee project htcondor supports drmaa job api allows drmaa compliant clients submit monitor htcondor jobs saga c++ reference implementation provides htcondor plug-in adaptor makes htcondor job submission monitoring available via saga python c++ apis htcondor features include dagman provides mechanism describe job dependencies | [
9665,
4194,
1507,
5956,
10051,
198,
5414,
8702,
6797,
2990,
7983,
9040,
5492,
2710,
823,
11353,
8030,
11135
] | Test |
2,652 | 9 | SAS_(software):sas software sas previously statistical analysis system software suite developed sas institute advanced analytics multivariate analysis business intelligence data management predictive analytics sas developed north carolina state university 1966 1976 sas institute incorporated sas developed 1980s 1990s addition new statistical procedures additional components introduction jmp point-and-click interface added version 9 2004 social media analytics product added 2010 sas software suite mine alter manage retrieve data variety sources perform statistical analysis sas provides graphical point-and-click user interface non-technical users advanced options sas language sas programs data steps retrieve manipulate data proc steps analyze data step consists series statements data step executable statements result software taking action declarative statements provide instructions read data set alter data appearance data step two phases compilation execution compilation phase declarative statements processed syntax errors identified afterwards execution phase processes executable statement sequentially data sets organized tables rows called observations columns called variables additionally piece data descriptor value proc step consists proc statements call upon named procedures procedures perform analysis reporting data sets produce statistics analyses graphics 300 procedures one contains substantial body programming statistical work proc statements also display results sort data perform operations sas macros pieces code variables coded referenced perform repetitive tasks sas data published html pdf excel formats using output delivery system first introduced 2007 sas enterprise guide sas point-and-click interface generates code manipulate data perform analysis automatically require sas programming experience use sas software suite 200 components sas components include development sas began 1966 north carolina state university re-hired anthony barr program analysis variance regression software would run ibm system/360 computers project funded national institute health originally intended analyze agricultural data improve crop yields barr joined student james goodnight developed software statistical routines two became project leaders 1968 barr goodnight integrated new multiple regression analysis variance routines 1972 issuing first release sas project lost funding according goodnight nih wanted fund projects medical applications goodnight continued teaching university salary 1 access mainframe computers use project funded university statisticians southern experiment stations following year john sall joined project 1973 contributed software econometrics time series matrix algebra another early participant caroll g. perkins contributed sas early programming jolayne w. service jane t. helwig created sas first documentation first versions sas named year released 1971 sas 71 published limited release used ibm mainframes main elements sas programming data step common procedures proc step following year full version released sas 72 introduced merge statement added features handling missing data combining data sets 1976 barr goodnight sall helwig removed project north carolina state incorporated sas institute inc. sas re-designed sas 76 open architecture allowed compilers procedures input infile statements improved could read data formats used ibm mainframes generating reports also added put file statements ability analyze general linear models also added format procedure allowed developers customize appearance data 1979 sas 79 added support cms operating system introduced datasets procedure three years later sas 82 introduced early macro language append procedure sas version 4 limited features made sas accessible version 5 introduced complete macro language array subscripts full-screen interactive user interface called display manager 1985 sas rewritten c programming language allowed sas multivendor architecture allows software run unix ms-dos windows previously written pl/i fortran assembly language 1980s 1990s sas released number components complement base sas sas/graph produces graphics released 1980 well sas/ets component supports econometric time series analysis component intended pharmaceutical users sas/ph-clinical released 1990s food drug administration standardized sas/ph-clinical new drug applications 2002 vertical products like sas financial management sas human capital management called cfo vision hr vision respectively also introduced jmp developed sas co-founder john sall team developers take advantage graphical user interface introduced 1984 apple macintosh shipped first time 1989 updated versions jmp released continuously 2002 recent release 2016 sas version 6 used throughout 1990s available wider range operating systems including macintosh os/2 silicon graphics primos sas introduced new features dot-releases 6.06 6.09 user interface based windows paradigm introduced support sql added version 7 introduced output delivery system ods improved text editor ods improved upon successive releases example output options added version 8 number operating systems supported reduced unix windows z/os linux added sas version 8 sas enterprise miner released 1999 2002 text miner software introduced text miner analyzes text data like emails patterns business intelligence applications 2004 sas version 9.0 released dubbed project mercury designed make sas accessible broader range business users version 9.0 added custom user interfaces based user role established point-and-click user interface sas enterprise guide software primary graphical user interface gui customer relationship management crm features improved 2004 sas interaction management 2008 sas announced project unity designed integrate data quality data integration master data management sas institute inc v world programming ltd lawsuit developers competing implementation world programming system alleging infringed sas copyright part implementing functionality case referred united kingdom high court justice european court justice 11 august 2010 may 2012 european court justice ruled favor world programming finding functionality computer program programming language protected copyright free version introduced students 2010 sas social media analytics tool social media monitoring engagement sentiment analysis also released year sas rapid predictive modeler rpm creates basic analytical models using microsoft excel introduced year jmp 9 2010 added new interface using r programming language jmp add-in excel following year high performance computing appliance made available partnership teradata emc greenplum 2011 company released enterprise miner 7.1 company introduced 27 data management products october 2013 october 2014 updates 160 others 2015 sas global forum announced several new products specialized different industries well new training software sas many releases since 1972 since release 9.3 sas/stat release numbering 2011 sas largest set products line customer intelligence numerous sas modules web social media marketing analytics may used profile customers prospects predict behaviors manage optimize communications sas also provides sas fraud framework framework primary functionality monitor transactions across different applications networks partners use analytics identify anomalies indicative fraud sas enterprise grc governance risk compliance provides risk modeling scenario analysis functions order manage visualize risk compliance corporate policies also sas enterprise risk management product-set designed primarily banks financial services organizations sas products monitoring managing operations systems collectively referred sas management solutions sas collects data various assets performance utilization creates reports analyses sas performance management products consolidate provide graphical displays key performance indicators kpis employee department organizational level sas supply chain intelligence product suite offered supply chain needs forecasting product demand managing distribution inventory optimizing pricing also sas sustainability management set software forecast environmental social economic effects identify causal relationships operations impact environment ecosystem sas product sets specific industries government retail telecommunications aerospace marketing optimization high-performance computing sas also offers free university edition downloaded anyone used non commercial use first announcement regarding free university edition seems appeared newspapers 28 may 2014 hence said university edition available freely since 2005 article journal marriage family comparing statistical packages sas competitors stata spss alan c. acock wrote sas programs provide extraordinary range data analysis data management tasks difficult use learn spss stata meanwhile easier learn better documentation less capable analytic abilities though could expanded paid spss free stata add-ons acock concluded sas best power users occasional users would benefit spss stata comparison university california los angeles gave similar results competitors revolution analytics alpine data labs advertise products considerably cheaper sas 2011 comparison doug henschen informationweek found start-up fees three similar though admitted starting fees necessarily best basis comparison sas business model weighted heavily initial fees programs instead focusing revenue annual subscription fees according idc sas largest market-share holder advanced analytics 35.4 percent market 2013 fifth largest market-share holder business intelligence bi software 6.9 share largest independent vendor competes bi market conglomerates sap businessobjects ibm cognos spss modeler oracle hyperion microsoft power bi sas named gartner leader quadrant data integration tool business intelligence analytical platforms study published 2011 bmc health services research found sas used 42.6 percent data analyses health service research based sample 1,139 articles drawn three journals | [
5129,
7945,
3980,
2317,
6797,
7950,
10508,
6419,
2457,
2168,
7580,
7326,
5678,
7983,
6962,
8502,
823,
4667,
8509,
6718,
963,
10051,
5830,
5703,
4808,
5833,
4042,
5450,
8011,
9166,
2000,
9944,
4057,
4186,
477,
8440,
10848,
10340,
4840,
624... | Test |
2,653 | 2 | Trap_(computing):trap computing computing operating systems trap also known exception fault typically type synchronous interrupt caused exceptional condition e.g. breakpoint division zero invalid memory access trap usually results switch kernel mode wherein operating system performs action returning control originating process trap system process serious trap user process systems fatal usages term trap refers specifically interrupt intended initiate context switch monitor program debugger deriving original usage trap sometimes used mechanism intercepting normal control flow domains snmp trap type pdu used report alert asynchronous event managed subsystem | [
4423,
8551,
7471,
10224,
5457,
9171,
10333,
10516,
11539,
663,
6296,
3133,
2334,
1247
] | Test |
2,654 | 4 | 360_Safeguard:360 safeguard 360 safeguard 360 total security program developed qihoo 360 internet security company based china 360 safeguard focus stopping malware computer viruses trojan horses providing security patches microsoft windows 360 safeguard trojan horse scanner cloud-based heuristics engine built scanner 2010 360 safeguard analyzed qq protocol accused qq automatically scanning users computers uploading personal information qq servers without users consent response tencent called 360 malware denied users 360 installed access qq services chinese ministry industry information reprimanded companies improper competition ordered come accord 30 april 2015 three independent security testing bodies av-comparatives av-test virus bulletin published joint press release criticizing qihoo 360 found qihoo 360 submitted products comparative behaved significantly different end user products products comparative used engine bitdefender end user products use qihoo 360 qvm engine instead testing bodies claimed end user products would provide considerably lower level protection higher likelihood false positives consequence three testing bodies revoked certifications rankings earlier year qihoo 360 denied cheating allegations claiming qvm engine developed qihoo 360 would effective china | [
2049,
4994,
131,
5891,
7809,
10756,
1417,
3981,
3342,
6797,
10637,
4374,
1052,
156,
6431,
2721,
5924,
2213,
550,
1318,
6823,
2601,
8614,
2859,
3243,
6699,
8493,
7983,
8615,
6834,
4403,
9523,
10166,
823,
7739,
7103,
704,
9537,
7362,
10308,... | None |
2,655 | 3 | SSE5:sse5 sse5 short streaming simd extensions version 5 simd instruction set extension proposed amd august 30 2007 supplement 128-bit sse core instructions amd64 architecture amd chose implement sse5 originally proposed may 2009 amd replaced sse5 three smaller instruction set extensions named xop fma4 f16c retain proposed functionality sse5 encode instructions differently better compatibility intel proposed avx instruction set three sse5-derived instruction sets introduced bulldozer processor core released october 2011 32 nm process amd sse5 extension bundle include full set intel sse4 instructions making competitor sse4 rather successor complicates software development recommended practice program test presence instruction set extensions means cpuid instruction entering code path depends upon instructions function correctly maximum portability optimized application require three code paths base code path compatibility older processors either vendor separately optimized intel code path exploiting sse4 avx separately optimized amd code path exploiting sse5 due proliferation benchmarks intel amd processors increasingly reflect cleverness implementation quality divergent code paths rather strength underlying platform proposed sse5 instruction set consisted 170 instructions including 46 base instructions many designed improve single-threaded performance sse5 instructions 3-operand instructions use increase average number instructions per cycle achievable x86 code selected new instructions include amd claims sse5 provide dramatic performance improvements particularly high-performance computing hpc multimedia computer security applications including 5x performance gain advanced encryption standard aes encryption 30 performance gain discrete cosine transform dct used process video streams detailed information consult instruction sets subsequently divided sse5 specification included proposed extension general coding scheme x86 instructions order allow instructions two operands 2008 intel announced planned avx instruction set proposed different way coding instructions two operands two proposed coding schemes sse5 avx mutually incompatible although avx scheme certain advantages sse5 scheme importantly avx plenty space future extensions including larger vector sizes may 2009 amd published revised specification planned future instructions revision changes coding scheme make compatible avx scheme differing prefix byte order avoid overlap instructions introduced amd instructions introduced intel revised instruction set longer carries name sse5 criticized misleading instructions new revision functionally identical original sse5 specification—only way instructions coded differs planned additions amd instruction set consists three subsets new instruction sets include support future extensions vector size 128 bits 256 bits unclear preliminary specifications whether bulldozer processor support 256-bit vector registers ymm registers | [
3459,
2821,
4491,
6924,
4237,
10383,
6038,
9369,
7963,
9500,
1915,
2088,
9391,
8120,
8506,
1085,
8125,
8126,
833,
7234,
9541,
3142,
5326,
977,
2514,
5329,
5844,
9428,
8795,
1122,
7783,
10985,
9964,
5358,
9582,
8944,
499,
1399,
9976,
4603,... | Test |
2,656 | 4 | CimTrak:cimtrak cimtrak computer software file integrity monitoring regulatory compliance auditing assists ensuring availability integrity critical assets detecting root-cause responding immediately unexpected changes host operating system applications network devices located infrastructure cimtrak works cross-platform supported multiple windows linux unix macintosh operating systems licensed commercial software cimtrak multiple core components cimtrak many functions detect additions deletions modifications files configurations computer operating systems components installed operating system initial configuration takes snapshot files configurations operating system uses data create cryptographic hash files configurations stores securely cimtrak master repository known good baseline cimtrak agents installed operating systems containing data configured monitoring case network device agent installed systems tcp/ip network connection supported network devices agent detects changes made monitored files configurations communicating kernel comparing changes known cryptographic hash associated affected files configurations calculated cryptographic hash different known baseline cimtrak initiate user-configured corrective action defined cimtrak object group policy send internal external event notifications using one many following methods cimtrak provides insight infrastructure detecting changes could compromise servers networks sensitive customer data payment card information payment card industry data security standard pci provide instant change remediation options without requiring integration external applications change detected cimtrak captures change exact moment occurs provides detailed audit trail incident including cimtrak report automated response taken configured initiate remediation automated responses termed corrective actions include corrective actions defined based type change action file/configuration addition file/configuration change file/configuration deletion addition automated remediation functionality cimtrak automatically launch different custom scripts based detected change type cimtrak file system agents network device agents perform change management functions monitoring file configurations based configured object group watch policies abilities vary operating system cimtrak plug-ins enhance abilities cimtrak adding additional monitoring functions attach tofile system agents network device agents plug-ins include cimtrak constructed follow software communication security standards government security product certifications information stored within cimtrak secure external modification access data rest data transit encrypted using cimcor cryptographic module several certifications including federal information processing standard fips publication 140-2 fips pub 140-2 u.s. government computer security standard used accredit cryptographic modules level 1 indicates cryptographic module supports lowest level acceptable security security level 1 allows cryptographic module executed using unevaluated operating system security level 2 enhances physical security mechanisms security level 1 adding requirement tamper-evidence protection common criteria information technology security evaluation common criteria cc international standard international organization standardization iso international electrotechnical commission iec 15408 computer security certification common criteria allows specifying verifying vendor claims relating security functionality assurance requirements verification claims performed using approved testing laboratories evaluation assurance level eal4 permits developer gain maximum assurance positive security engineering based good commercial development practices though rigorous require substantial specialist knowledge skills resources eal4 highest level likely economically feasible retrofit existing product line eal4 therefore applicable circumstances developers users require moderate high level independently assured security conventional commodity toes prepared incur additional security-specific engineering costs augmented alc_flr.2 establishes verifies claim developer established flaw remediation procedures describe tracking security flaws identification corrective actions distribution corrective action information toe users cimcor flagship software cimtrak file integrity monitoring tool department defense unified capabilities approved products list unique factor allows cimtrak file integrity monitoring product available use within department defense boundaries products contained united states army approved products list deemed acceptable use within boundaries united states army cimtrak application used facilitate following compliance security objectives microsoft windows versions linux versions microsoft windows versions microsoft windows versions unix linux versions | [
6273,
6797,
5523,
8471,
1304,
4505,
1435,
4777,
7983,
9909,
823,
3133,
9665,
8904,
847,
10962,
4316,
11363,
6372,
4074,
5612,
8944,
5492,
1399,
8700,
2045,
2558,
7295
] | Validation |
2,657 | 4 | GTRI_Cyber_Technology_and_Information_Security_Laboratory:gtri cyber technology information security laboratory cyber technology information security laboratory ctisl one eight labs georgia tech research institute created october 1 2010 focuses cyber security along gtri information communications laboratory part information cyber sciences directorate gtri ctisl known commitment open source software feature existing business areas secure information systems resilient command control emerging areas cyberwarfare laboratory additionally part georgia tech information security center | [] | Test |
2,658 | 2 | Android_software_development:android software development android software development process new applications created devices running android operating system google states android apps written using kotlin java c++ languages using android software development kit sdk using languages also possible non-jvm languages go javascript c c++ assembly need help jvm language code may supplied tools likely restricted api support programming languages tools allow cross-platform app support i.e android ios third party tools development environments language support also continued evolve expand since initial sdk released 2008 addition major business entities like walmart amazon bank america eyeing engage sell mobiles mobile application development witnessing transformation android software development kit sdk includes comprehensive set development tools include debugger libraries handset emulator based qemu documentation sample code tutorials currently supported development platforms include computers running linux modern desktop linux distribution mac os x 10.5.8 later windows 7 later sdk available android software development possible using specialized android applications around end 2014 officially-supported integrated development environment ide eclipse using android development tools adt plugin though intellij idea ide editions fully supports android development box netbeans ide also supports android development via plugin 2015 android studio made google powered intellij official ide however developers free use others google made clear adt officially deprecated since end 2015 focus android studio official android ide additionally developers may use text editor edit java xml files use command line tools java development kit apache ant required create build debug android applications well control attached android devices e.g. triggering reboot installing software package remotely enhancements android sdk go hand-in-hand overall android platform development sdk also supports older versions android platform case developers wish target applications older devices development tools downloadable components one downloaded latest version platform older platforms tools also downloaded compatibility testing android applications packaged .apk format stored codice_1 folder android os folder accessible root user security reasons apk package contains .dex files compiled byte code files called dalvik executables resource files etc android sdk platform tools separately downloadable subset full sdk consisting command-line tools codice_2 codice_3 android debug bridge adb tool run commands connected android device codice_4 daemon runs device codice_2 client starts background server multiplex commands sent devices addition command-line interface numerous graphical user interfaces exist control adb format issuing commands typically example android applications saved command codice_6 file whose name codice_7 default security issue reported march 2011 adb targeted vector attempt install rootkit connected phones using resource exhaustion attack fastboot protocol tool name included android sdk package used primarily modify flash filesystem via usb connection host computer requires device started boot loader secondary program loader mode basic hardware initialization performed enabling protocol device accept specific set commands sent via usb using command line commonly used fastboot commands include code written c/c++ compiled arm x86 native code 64-bit variants using android native development kit ndk ndk uses clang compiler compile c/c++ gcc included ndk r17 removed r18 2018 native libraries called java code running android runtime using codice_8 part standard android java classes command-line tools compiled ndk installed using adb android uses bionic c library llvm libc++ c++ standard library ndk also includes variety apis zlib compression opengl es vulkan graphics opensl es audio various android-specific apis things like logging access cameras accelerating neural networks ndk includes support cmake codice_9 based gnu make android studio supports running either gradle third-party tools allow integrating ndk eclipse visual studio cpu profiling ndk also includes simpleperf similar linux perf tool better support android specifically mixed java/c++ stacks android 3.1 platform also backported android 2.3.4 introduces android open accessory support allows external usb hardware android usb accessory interact android-powered device special accessory mode android-powered device accessory mode connected accessory acts usb host powers bus enumerates devices android-powered device acts usb device android usb accessories specifically designed attach android-powered devices adhere simple protocol android accessory protocol allows detect android-powered devices support accessory mode development tools intended help android device interact external electronics include ioio android open accessory development kit microbridge triggertrap etc android :build perl cpan module enables callers build android apk file using basic command line tools aapt dx javac jarsigner zipalign without rely either apache ant gradle reduced dependency set simplifies continuous release systems rely fully automated remote app generation testing july 12 2010 google announced availability app inventor android web-based visual development environment novice programmers based mit open blocks java library providing access android devices gps accelerometer orientation data phone functions text messaging speech-to-text conversion contact data persistent storage web services initially including amazon twitter could done android ’ architecture open said project director mit hal abelson development year block-editing tool taught non-majors computer science harvard mit wellesley trinity college hartford university san francisco professor david wolber developed introductory computer science course tutorial book non-computer science students based app inventor android second half 2011 google released source code terminated web service provided funding creation mit center mobile learning led app inventor creator hal abelson fellow mit professors eric klopfer mitchel resnick latest version created result google–mit collaboration released february 2012 first version created solely mit launched march 2012 upgraded app inventor 2 december 2013 2014 app inventor maintained mit basic4android commercial product similar simple inspired microsoft visual basic 6 microsoft visual studio makes android programming much simpler regular visual basic programmers find coding java difficult basic4android active coreliu enables non-technical users write immersive educational apps run natively android devices app authors use file held github repository describe images text used app speech generated text via amazon web services polly coreliu packages photos generated speech android apk file author distribute freely using creative commons license corona sdk software development kit sdk created walter luh founder corona labs inc.. corona sdk allows software programmers build mobile applications iphone ipad android devices corona lets developers build graphic applications using integrated lua language layered top c++/opengl sdk uses subscription-based purchase model without requiring per-application royalties imposes branding requirements delphi also used creating android application object pascal language latest release delphi 10 seattle developed embarcadero user interfaces developed using cross-platform gui framework firemonkey additionally non-visual components interaction various sensors like camera gyroscope gps bluetooth etc available services access certain keyboard events available platform-independent manner well done using interfaces compiler based llvm architecture debugging ide possible generated apps based ndk contrast xamarin runtime compiled application rapid application development tool developing native android applications using javascript tool used directly mobile device via browser based ide connected device via wifi makes use google chrome v8 javascript engine since version 1.4 go programming language writing applications android supported go version 1.7 help codice_10 tool i.e codice_11 compiling android apk ios apps supported go codebase strictly speaking java/jvm code always needed run android gomobile tool provides minimal jvm code needed objective-c code needed case ios go support restricted go types used currently restricted set android apis e.g openal opengl es 2 bindings provided could used make 2d/3d games one provided examples android ios graphics applications hypernext android creator hac software development system aimed beginner programmers help create android apps without knowing java android sdk based hypercard treated software stack cards one card visible one time well suited mobile phone applications one window visible time hypernext android creator main programming language simply called hypernext loosely based hypercard hypertalk language hypernext interpreted english-like language many features allow creation android applications supports growing subset android sdk including versions gui control types automatically runs background service apps continue run process information background kivy open source python library developing multitouch application software natural user interface nui wide selection devices kivy provides possibility maintaining single application numerous operating systems code run everywhere kivy custom-built deployment tool deploying mobile applications called bulldozer available linux bulldozer currently alpha software far less cumbersome older kivy deployment methods applications programmed kivy submitted android mobile application distribution platform lazarus ide may used develop android applications using object pascal pascal dialects based free pascal compiler starting version 2.7.1 processing environment also uses java language supported android mode since version 1.5 integration device camera sensors possible using ketai library qt android enables qt 5 applications run devices android v2.3.3 api level 10 later qt cross-platform application framework target platforms android linux ios sailfish os windows qt application development done standard c++ qml requiring android ndk sdk qt creator integrated development environment provided qt framework multi-platform application development rubymotion toolchain write native mobile apps ruby version 3.0 rubymotion supports android rubymotion android apps call entire set java android apis ruby use 3rd-party java libraries statically compiled machine code sdl library offers also development possibility beside java allowing development c simple porting existing sdl native c applications injection small java shim jni usage native sdl code possible allowing android ports like e.g jagged alliance 2 video game microsoft shipped 2015 free stand-alone emulator android dubbed visual studio emulator android emulator supports installation google play drag-and-drop interface work conjunction visual studio supports cross-platform development letting c++ developers create projects templates android native-activity applications create high-performance shared libraries include solutions features include platform-specific intellisense breakpoints device deployment emulation c shared codebase developers use xamarin write native ios android windows apps native user interfaces share code across multiple platforms square built lot android based libraries used android applications third party packages popular ones retrofit http calls dagger dependency injection picasso image caching android developer challenge competition find innovative application android google offered prizes totaling 10 million us dollars distributed adc adc ii adc accepted submissions january 2 april 14 2008 50 promising entries announced may 12 2008 received 25,000 award development ended early september announcement ten teams received 275,000 ten teams received 100,000 adc ii announced may 27 2009 first round adc ii closed october 6 2009 first-round winners adc ii comprising top 200 applications announced november 5 2009 voting second round also opened day ended november 25 google announced top winners adc ii november 30 sweetdreams doodle wavesecure nominated overall winners challenge community open-source enthusiasts build share android-based distributions i.e firmware number customizations additional features flac lossless audio support ability store downloaded applications microsd card usually involves rooting device rooting allows users root access operating system enabling full control phone rooting several disadvantages well including increased risk hacking high chances bricking losing warranty increased virus attack risks etc also possible install custom firmware although device boot loader must also unlocked custom firmware allows users older phones use applications available newer releases firmware packages updated frequently incorporate elements android functionality n't yet officially released within carrier-sanctioned firmware tend fewer limitations cyanogenmod omfgb examples firmware september 24 2009 google issued cease desist letter modder cyanogen citing issues re-distribution google closed-source applications within custom firmware even though android os open source phones come packaged closed-source google applications functionality google play gps navigation google asserted applications provided approved distribution channels licensed distributors cyanogen complied google license continued distribute mod without proprietary software provided method backup licensed google applications mod install process restore process complete obstacles development include fact android use established java standards java se prevents compatibility java applications written platforms written android platform android reuses java language syntax semantics provide full class libraries apis bundled java se however multiple tools market companies myriad group upontek provide java android conversion services android provides gui classes provide java awt swing javafx support full java beans api android created open handset alliance led google early feedback developing applications android platform mixed issues cited include bugs lack documentation inadequate qa infrastructure public issue-tracking system google announced issue tracker january 18 2008 december 2007 mergelab mobile startup founder adam macbeth stated functionality poorly documented n't work ... clearly ready prime time despite android-targeted applications began appear week platform announced first publicly available application snake game preview release android sdk released november 12 2007 july 15 2008 android developer challenge team accidentally sent email entrants android developer challenge announcing new release sdk available private download area email intended winners first round android developer challenge revelation google supplying new sdk releases developers others keeping arrangement private led widely reported frustration within android developer community time august 18 2008 android 0.9 sdk beta released release provided updated extended api improved development tools updated design home screen detailed instructions upgrading available already working earlier release september 23 2008 android 1.0 sdk release 1 released according release notes included mainly bug fixes although smaller features added also included several api changes 0.9 version multiple versions released since developed december 5 2008 google announced first android dev phone sim-unlocked hardware-unlocked device designed advanced developers modified version htc dream phone developers use regular consumer devices test use applications developers may choose dedicated unlocked no-contract device one million applications developed android 25 billion downloads june 2011 research indicated 67 mobile developers used platform time publication android smartphone shipments forecast exceed 1.2 billion units 2018 85 market share | [
4096,
5637,
11271,
1032,
7176,
8719,
3600,
7700,
9244,
10780,
11294,
5663,
3618,
1578,
2603,
3626,
5677,
10284,
7727,
3633,
1083,
572,
10817,
8771,
6212,
69,
7750,
8262,
4171,
4683,
4685,
7246,
11343,
3664,
7253,
8280,
10841,
3162,
8285,
... | None |
2,659 | 5 | TCP_global_synchronization:tcp global synchronization tcp global synchronization computer networks happen tcp/ip flows periods congestion sender reduce transmission rate time packet loss occurs routers internet normally packet queues allow hold packets network busy rather discarding routers limited resources size queues also limited simplest technique limit queue size known tail drop queue allowed fill maximum size new packets simply discarded space queue causes problems used tcp/ip routers handling multiple tcp streams especially bursty traffic present network stable queue constantly full problems except full queue results high latency however introduction sudden burst traffic may cause large numbers established steady streams lose packets simultaneously tcp automatic recovery dropped packets interprets congestion network usually correct sender reduces sending rate certain amount time tries find network longer congested increasing rate subject ramp-up known slow-start algorithm almost senders use time delay increasing rates delays expire time senders send additional packets router queue overflow packets dropped senders back fixed delay ... ad infinitum compare thundering herd problem pattern sender decreasing increasing transmission rates time senders referred global synchronization leads inefficient use bandwidth due large numbers dropped packets must retransmitted senders reduced sending rate compared stable state backed-off following loss problem subject much research consensus appears tail drop algorithm leading cause problem queue size management algorithms random early detection red weighted red reduce likelihood global synchronization well keeping queue sizes face heavy load bursty traffic | [
10924,
1541
] | Test |
2,660 | 9 | RScheme:rscheme rscheme scheme implementation developed donovan kolbly object-orientation approach adapted dylan rscheme implements r4rs except transcript-on transcript-off r5rs except define-syntax addition rscheme reflective object system many operating system services modules threads systems programming features including ability integrate compile c code code rscheme compiled c c compiled normal c compiler generate machine code default keep compilation fast code size rscheme compiles bytecodes interpreted runtime virtual machine systems compiling c done on-the-fly resulting object code dynamically loaded back image execution rscheme known publicly available scheme implementation include real-time safe garbage collector | [
2304,
4992,
10752,
11269,
3334,
6919,
7562,
2062,
9231,
1301,
9749,
9877,
8728,
4633,
6556,
3869,
10012,
2335,
6047,
8226,
4516,
5031,
9128,
5803,
7983,
2225,
10547,
11255,
311,
2105,
7867,
6717,
4799,
5569,
6594,
8771,
4550,
8262,
7880,
... | Test |
2,661 | 4 | Great_Cannon:great cannon great cannon china attack tool used launch distributed denial-of-service attacks websites intercepting massive amounts web traffic redirecting targeted websites according researchers citizen lab international computer science institute princeton university center information technology policy coined term great cannon hijacks foreign web traffic intended chinese websites re-purposes flood targeted web servers enormous amounts traffic attempt disrupt operations co-located great firewall great cannon separate offensive system different capabilities design besides launching denial-of-service attacks tool also capable monitoring web traffic distributing malware targeted attacks ways similar quantum insert system used u.s. national security agency first known targets great cannon late march 2015 websites hosting censorship-evading tools including github web-based code hosting service greatfire service monitoring blocked websites china | [
4224,
5254,
138,
4883,
8726,
1692,
9117,
3625,
5887,
8630,
8640,
3777,
2884,
3781,
7887,
11221,
7515,
3423,
225,
10341,
3688,
2409,
9193,
8172,
4725,
5749,
4863
] | Validation |
2,662 | 7 | A_VerySpatial_Podcast:veryspatial podcast veryspatial podcast award winning weekly podcast provides information geography geospatial technologies podcast comments gis impact digital daily lives podcast seeks cover current trends gis technology industry receives mention industry blogs crew also interviewed directions magazine podcast opens episode number 30-second teaser podsafe song overview topics covered episode following sponsorship ad shout outs go twitter facebook followers hosts discuss 3-4 news items week relevant geography gis including new software releases web site highlighted 'webcorner moving main topic either interview someone industry discussion amongst hosts industry topic show rounds 'tip week highlights technology technique 'eventscorner highlights upcoming geography gis conferences full podsafe song teased beginning episode changes weekly podcast hosted jesse rouse sue bergeron frank lafone podcast started july 2005 since published well 200 weekly episodes numerous special episodes highlight specific topics avsp roadshow episodes cover activity geography gis conferences hosts sue bergeron frank lafone jesse rouse addition barbara maclennan blogs accompanying site veryspatial.com 2007 veryspatial llc parent organization veryspatial podcast awarded esri special achievement gis efforts disseminate information geography geospatial technologies broad audience podcasts blog veryspatial.com episodes licensed creative commons attribution share-alike noncommercial license distributed via direct download veryspatial.com website apple itunes store subscription using zune software common podcast channels download charge source show typically available two formats 64 kbit/s mp3 64 kbit/s aac 25,000 episodes downloaded per month current archived podcasts | [] | None |
2,663 | 2 | Runtime_Callable_Wrapper:runtime callable wrapper runtime callable wrapper rcw proxy object generated .net common language runtime clr order allow component object model com object accessed managed code although rcw appears ordinary object .net clients primary function marshal calls data .net client com object example managed application written c might make use existing com library written c++ visual basic 6 via rcws runtime creates exactly one rcw com object regardless number references exist object runtime maintains single rcw per process object create rcw one application domain apartment pass reference another application domain apartment proxy first object used | [
3573
] | Test |
2,664 | 4 | Institute_for_Information_Infrastructure_Protection:institute information infrastructure protection institute information infrastructure protection i3p consortium national cyber security institutions including academic research centers u.s. federal government laboratories nonprofit organizations long-standing widely recognized expertise cyber security research development r i3p managed george washington university home small administrative staff oversees helps direct consortium activities i3p coordinates funds cyber security research related critical infrastructure protection hosts high impact workshops bring together leaders public private sectors i3p brings multi-disciplinary multi-institutional perspective complex difficult problems works collaboratively stakeholders seeking solutions since founding 2002 100 researchers wide variety disciplines backgrounds worked together better understand mitigate critical risks field cyber security i3p came existence following several government assessments u.s. information infrastructure ’ susceptibility catastrophic failure first study published 1998 united states president council advisors science technology pcast recommended nongovernmental organization formed address national cyber security issues subsequent studies–by institute defense analyses well white paper jointly produced national security council office science technology policy–agreed pcast assessment affirming need organization dedicated protecting nation ’ critical infrastructures 2002 i3p founded dartmouth college grant federal government martin wybourne chaired i3p 2003 2015 since inception i3p funding i3p come various sources including department homeland security dhs national institute standards technology nist national science foundation nsf i3p consortium consists 18 academic research centers 5 national laboratories 3 nonprofit research organizations member institution appoints primary secondary representative attend regular consortium meetings advanced technological education i3p partnered community college system new hampshire ccsnh educational project “ cybersecurity healthcare industry curriculum adaptation implementation. ” funded national science foundation ’ nsf advanced technological education ate program goal project produce well-qualified technicians serve healthcare information technology needs rural northern new england i3p launched project called improving csirt skills dynamics effectiveness effort funded department homeland security science technology directorate aims explore makes sustains good csirt results help organizations ensure csirts fulfill maximum potential become invaluable tool securing cyber infrastructure interdisciplinary team working new project include cyber security business researchers dartmouth college organizational psychologists george mason university researchers practitioners hewlett-packard april 2011 i3p convened nist-sponsored workshop examining challenge integrating security usability design development software one several workshop recommendations development case studies show software developers usable security integrated organization software development process consequently i3p begun usable security project using uniform study methodology project document usable security three different organizations results used understand key usable security problems addressed teach developers solutions enable researchers perform comparable studies nation critical infrastructure threat cyber attack today never main response cyber threat facing country increased information sharing traditionally agencies store data data bases information readily available others might benefit obama administration made clear strategy work – data must readily available sharing preferred way would using cloud numerous government agencies would store information information would available appropriate credentials model tremendous added benefits – associated risks researchers rand university virginia took challenge answering question information sharing project privacy digital era researchers five i3p academic institutions engaged sweeping effort understand privacy digital era course 18 months research project take multidisciplinary look privacy examining roles human behavior data exposure policy expression way people understand protect privacy leveraging human behavior reduce cyber security risk project brings behavioral-sciences lens security examining interface human beings computers set rigorous empirical studies multi-disciplinary project draws together social scientists information security professionals illuminate intricacies human perceptions cognitions biases impact computer security project ’ goal leverage new insights way produces secure systems processes better security risk pricing i3p researchers project examined ways quantify cyber risk exploring potential multi-factor scoring system analogous risk scoring insurance sector overall work takes account two key determinants cyber risk technologies reduce likelihood attack internal capabilities respond successful potential attacks survivability recovery process control systems research project builds earlier i3p project control-systems security develop strategies enhancing control-system resilience allowing rapid recovery event successful cyber attack business rationale cyber security project offshoot earlier study economics security addresses challenge corporate decision-making comes investing cyber security attempted answer questions “ much needed ” “ much enough ” “ one measure return investment ” study includes investigation investment strategies including risks vulnerabilities supply-chain interdependencies technological fixes safeguarding digital identity multidisciplinary scope project addresses security digital identities emphasizing development technical approaches managing digital identities also meet political social legal needs work focused primarily two sectors privacy identity protection paramount financial services healthcare insider threat project addresses need detect monitor prevent insider attacks inflict serious harm organization researchers undertaken systematic analysis insider threat one addresses technical challenges also takes account ethical legal economic dimensions i3p delivered report titled national cyber security research development challenges industry academic government perspective u.s senators joseph lieberman susan collins february 18 2009 report reflects finding three forums hosted i3p 2008 brought together high-level experts industry government academia identify r opportunities would advance cyber security research next five 10 years report contains specific recommendations technology policy research reflect input participants also concerns public private sectors i3p connects engages stakeholders workshops outreach activities often held partnership organizations workshops encompass range topics directly related i3p research projects others intended bring right people together probe particularly difficult foundational challenge secure systems engineering workforce development i3p sponsored postdoctoral research fellowship program 2004-2011 provides funding year research i3p member institution competitive awards granted according merit proposed work extent proposed work explored creative original concepts potential impact topic u.s. information infrastructure prospective applicants expected address core area cyber security research including trustworthy computing enterprise security management secure systems engineering network response recovery identity management forensics wireless computing metrics well legal policy economic dimensions security | [
1312,
2558,
1823
] | Test |
2,665 | 2 | DOS_Wedge:dos wedge dos wedge popular piece commodore 64 system software written bob fairbairn included commodore cbm 1541 disk drive test/demo disk filename dos 5.1 also packaged c64 macro assembler filename dos wedge64 dos wedge referred 1541 drive manual dos support software startup screen dos manager original design developed bill seiler wedge made disk operations basic 2.0 significantly easier introducing several keyword shortcuts dos wedge became somewhat de facto standard third party vendors epyx often incorporating identical commands fastloader cartridges commodore 64 expansion devices compute gazette published several type-in variations dos wedge including c128 version february 1987 issue see external links original commodore dos wedge 1-kb program written mos 6502 assembly language resided otherwise unused memory block cc00– cfff 52224–53247 worked altering basic chrget subroutine 0073 115 character passing basic interpreter would checked wedge commands associated wedged-in routines run needed command contains symbol may substitute instead desired | [
2786,
2181,
11494,
8494,
7983,
7281,
4764,
477
] | None |
2,666 | 9 | Racket_(programming_language):racket programming language racket general-purpose multi-paradigm programming language based scheme dialect lisp designed platform programming language design implementation addition core racket language racket also used refer family racket programming languages set tools supporting development racket racket also used scripting computer science education research racket platform provides implementation racket language including run-time system libraries jit compiler along drracket integrated development environment ide written racket racket used programbydesign outreach program aims turn computer science indispensable part liberal arts curriculum core racket language known extensive macro system enables creating embedded domain-specific languages language constructs classes modules separate dialects racket different semantics platform distribution free open-source software distributed gnu lesser general public license lgpl extensions packages written community may uploaded racket package catalog matthias felleisen founded plt mid 1990s first research group soon project dedicated producing pedagogic materials novice programmers lectures exercises/projects software january 1995 group decided develop pedagogic programming environment based scheme matthew flatt cobbled together mred original virtual machine racket libscheme wxwidgets free systems years followed team including flatt robby findler shriram krishnamurthi cormac flanagan many others produced drscheme programming environment novice scheme programmers research environment soft typing main development language drscheme supported named plt scheme parallel team began conducting workshops high school teachers training program design functional programming field tests teachers students provided essential clues directing development following years plt added teaching languages algebraic stepper transparent read–eval–print loop constructor-based printer many innovations drscheme producing application-quality pedagogic program development environment 2001 core team felleisen findler flatt krishnamurthi also written published first textbook design programs based teaching philosophy racket manifesto details principles driving development racket presents evaluation framework behind design process details opportunities future improvements first generation plt scheme revisions introduced features programming large modules classes version 42 introduced units – first-class module system – complement classes large scale development class system gained features e.g java-style interfaces also lost several features e.g multiple inheritance throughout versions language evolved throughout number successive versions gaining milestone popularity version 53 leading extensive work following version 100 would equivalent 1.0 release current popular version systems next major revision named version 200 introduced new default module system cooperates macros particular module system ensures run-time compile-time computation separated support tower languages unlike units modules first-class objects version 300 introduced unicode support foreign library support refinements class system later 300 series improved performance language runtime addition jit compiler switch default generational garbage collection next major release project switched conventional sequence-based version numbering version 4.0 introduced codice_1 shorthand specify language module written revision introduced immutable pairs lists support fine-grained parallelism statically-typed dialect june 7 2010 plt scheme renamed racket renaming coincided release version 5.0 subsequently graphical user interface gui backend rewritten racket c++ version 5.1 using native ui toolkits platforms version 5.2 included background syntax checking tool new plotting library database library new extended repl version 5.3 included new submodule feature optionally loaded modules new optimization tools json library features version 5.3.1 introduced major improvements drracket background syntax checker turned default new documentation preview tool added version 6.0 racket released second-generation package management system part development principal drracket racket repository reorganized split large set small packages making possible install minimal racket install packages needed version 7 racket released new macro expander written racket part preparations supporting moving chez scheme runtime system supporting multiple runtime systems racket core language includes macros modules lexical closures tail calls delimited continuations parameters fluid variables software contracts green os threads language also comes primitives eventspaces custodians control resource management enables language act like operating system loading managing programs extensions language created powerful macro system together module system custom parsers control aspects language unlike programming languages lack macro systems language constructs racket written base language using macros include mixin class system component module system expressive ml opaque ascription pattern matching language features first contract system higher-order programming language racket contract system inspired design contract work eiffel extends work higher-order values first-class functions objects reference cells example object checked contract ensured make contract checks methods eventually invoked racket includes bytecode jit jit compilers bytecode compiler translates internal bytecode format run racket virtual machine jit compiler translating bytecode native code x86 x86-64 arm powerpc platforms runtime since 2004 language also shipped planet package manager integrated module system third-party libraries transparently imported used also planet built-in versioning policy prevent dependency hell end 2014 much racket code moved new packaging system separate main code base new packaging system serviced client program named raco new package system provides fewer features planet blog post jay mccarthy racket blog explains rationale change duplicate older system features clearly distinguish racket languages lisp family integrated language extensibility features support building new domain-specific general-purpose languages racket extensibility features built module system allow context-sensitive module-level control syntax example codice_2 syntactic form overridden change semantics function application similarly codice_3 form allows arbitrary static analysis entire module since module used language via codice_1 notation effectively means virtually aspect language programmed controlled module-level extensibility features combined scheme-like hygienic macro system provides features lisp s-expression manipulation system scheme 84 hygienic extend-syntax macros r5rs syntax-rules indeed fair say macro system carefully tuned application programming interface api compiler extensions using compiler api programmers add features entire domain-specific languages manner makes completely indistinguishable built-in language constructs macro system racket used construct entire language dialects includes typed racket gradually typed dialect racket eases migration untyped typed code lazy racket—a dialect lazy evaluation hackett combines haskell racket pedagogical programming language pyret originally implemented racket. ref name= index 2017 /ref dialects include frtime functional reactive programming scribble documentation language slideshow presentation language several languages education racket core distribution provides libraries aid process constructing new programming languages languages restricted s-expression based syntax addition conventional readtable-based syntax extensions racket codice_1 makes possible language programmer define arbitrary parser example using parser tools library see racket logic programming example language language platform provides self-hosted ide named drracket continuation-based web server graphical user interface tools racket also viable scripting tool used scripting unix shell parse command line arguments execute external tools includes libraries like common scripting languages drracket formerly drscheme widely used among introductory computer science courses teach scheme racket lauded simplicity appeal beginner programmers ide originally built use teachscheme project programbydesign outreach effort northeastern university number affiliated universities attracting high school students computer science courses college level editor provides source highlighting syntax run-time errors parenthesis matching debugger algebraic stepper student-friendly features include support multiple language levels beginning student intermediate student also integrated library support sophisticated analysis tools advanced programmers module-oriented programming supported module browser contour view integrated testing coverage measurements refactoring support provides integrated context-sensitive access extensive hyper-linked help system named help desk drracket available windows macos unix linux x window system programs behave similarly platforms trivial hello world program running program produces output slightly less trivial program program taken racket website draws sierpinski triangle nested depth 8 using codice_1 directive source file written different dialects racket example factorial program typed racket statically typed dialect racket apart basis programming language theory racket designed used general-purpose language production systems thus racket distribution features extensive library covers systems network programming web development uniform interface underlying operating system dynamic foreign function interface several flavours regular expressions lexer/parser generators logic programming complete gui framework racket several features useful commercial language among ability generate standalone executables windows macos unix profiler debugger included integrated development environment ide unit testing framework racket used commercial projects web applications notable example hacker news website runs arc developed racket naughty dog used scripting language several video games racket used teach students algebra game design bootstrap program | [
10752,
11269,
2056,
2062,
9231,
6160,
2577,
7184,
9749,
8728,
2585,
4122,
4633,
8226,
5677,
3119,
9780,
2105,
3132,
6717,
7234,
8258,
8771,
10819,
8262,
1613,
9299,
9304,
10841,
3675,
7267,
2660,
8293,
5751,
7805,
9345,
1159,
5255,
1673,
... | Test |
2,667 | 9 | OpenMusic:openmusic openmusic om object-oriented visual programming environment musical composition based common lisp may also used all-purpose visual interface lisp programming specialized level set provided classes libraries make convenient environment music composition openmusic last series computer-assisted composition software designed ircam versions openmusic currently available mac os x powerpc intel windows linux source code released gnu lesser general public license lgpl programs openmusic created connecting together process known 'patching either pre-defined user-defined modules similar manner graphical signal-processing environments max/msp pd unlike environments however result openmusic computation typically displayed conventional music notation directly manipulated required via editor substantial body specialized libraries contributed users extends openmusic functionality areas constraint programming aleatoric composition spectral music minimalist music music theory fractals music information retrieval sound synthesis etc | [
4865,
2691,
2438,
9865,
6797,
2062,
10256,
9877,
4122,
1448,
9128,
10153,
4779,
8883,
823,
6969,
6201,
7867,
8258,
8771,
4550,
8262,
11083,
8908,
1613,
9299,
1365,
2392,
7769,
7896,
6493,
7267,
3176,
9210,
8700,
4606
] | Test |
2,668 | 5 | Virtual_concatenation:virtual concatenation virtual concatenation vcat inverse multiplexing technique creating large capacity payload container distributed multiple smaller capacity tdm signals signals may transported routed independently virtual concatenation defined sonet/sdh otn pdh path signals alternate sonet/sdh concatenation techniques contiguous concatenation arbitrary concatenation virtual concatenation considered primary enhancement voice optimized sonet/sdh order support transport variable bit data streams recent sonet/sdh enhancements include link capacity adjustment scheme lcas generic framing procedure gfp conjunction lcas gfp virtual concatenation gives advantage splitting required bandwidth equally among set number sub paths called virtual tributaries vt virtual concatenation specified itu-t recommendations g.707 2007 g.783 2006 virtual concatenation used split sonet/sdh bandwidth right-sized groups virtually concatenated groups used support different customers services bill accordingly vcat works across existing infrastructure significantly increase network utilization effectively spreading load across whole network sonet/sdh hierarchical network level payloads concatenation lower-order payloads example sts192 10 gbit/s payload consists four oc48 2.5 gbit/s payloads concatenated together vcat sts192 payload could consist number virtually concatenated groups 192 non-contiguous sts1 51 mbit/s payloads sts1 within group may provisioned different parts network vcat supports high-order paths low-order tributary paths path within group approximately 51 mbit/s sts1/vc3 155 mbit/s sts3c/vc4 bandwidth allocated using h4 byte within path overhead bandwidth allocated multiples 51 mbit/s therefore high-order vcat used provision sub-rate traffic across gigabit ethernet makes high-order vcat ideal metro application path within group approximately 1.5 mbit/s vt1.5/vc11 2 mbit/s vt2/vc12 bandwidth allocated using z7/k4 byte within path overhead bandwidth allocated 2-mbit/s chunks therefore low-order vcat used provision sub-rate traffic across 10/100-mbit/s ethernet used access network several virtual tributaries form part virtual concatenation group vcg virtual tributaries transport data across vcat enabled network may many cases particularly underlying network relatively congested cost less finding one path meets required capacity splitting paths often finds shorter paths channel traffic virtual concatenation protocol performs content delivery process called byte-interleaving example given wish provision gigabit ethernet n 1gbit/s service would provision across 7 sts-nc vt ’ vcg members carry bandwidth equivalent v n/k bits/second case n 1gb k 7 typically happens data interleaved first byte put onto vt1 second byte put onto vt2 seventh byte put onto vt7 process repeats beginning eighth byte sent vt1 vcat helps providing services lower cost quickly contiguous concatenation however creates differential delay whereby path created represented vt different propagational delay across network difference delays called differential delay major problem differential delay requirement high speed buffers receiving node store incoming information paths converge buffer space b equated bandwidth delay product b n d. thus virtually concatenated connection requires b bits buffer space need buffer space eventually increases network cost important select paths minimize differential delay directly proportional buffer space required several heuristics based algorithms exist attempt minimize differential delay provide solution simple problem tackle referred mathematically np-complete problem set exists known algorithm finds optimum solution terminates polynomial time constraint | [
3168,
1977,
10558,
7478
] | None |
2,669 | 1 | Cursor_(databases):cursor databases computer science database cursor control structure enables traversal records database cursors facilitate subsequent processing conjunction traversal retrieval addition removal database records database cursor characteristic traversal makes cursors akin programming language concept iterator cursors used database programmers process individual rows returned database system queries cursors enable manipulation whole result sets scenario cursor enables sequential processing rows result set sql procedures cursor makes possible define result set set data rows perform complex logic row row basis using mechanics sql procedure also define result set return directly caller sql procedure client application cursor viewed pointer one row set rows cursor reference one row time move rows result set needed use cursors sql procedures need following work cursors must use following sql statements section introduces ways standard defines use cursors applications embedded sql application bindings relational database systems adhere standard cli jdbc use different interface programmer makes cursor known dbms using codice_1 ... codice_2 statement assigning cursor compulsory name code access data must open cursor codice_3 statement directly following successful opening cursor positioned first row result set applications position cursors specific row result set codice_4 statement fetch operation transfers data row application application processed available rows fetch operation positioned non-existing row compare scrollable cursors dbms returns sqlstate '02000 usually accompanied +100 indicate end result set final step involves closing cursor using codice_5 statement closing cursor program open implies dbms re-evaluates query different query builds new result set programmers may declare cursors scrollable scrollable scrollability indicates direction cursor move non-scrollable forward-only cursor codice_4 row cursor automatically moves next row fetch last row fetch put cursor last row get following code sqlstate 02000 sqlcode +100 program may position scrollable cursor anywhere result set using codice_4 sql statement keyword scroll must specified declaring cursor default codice_8 although different language bindings like jdbc may apply different default target position scrollable cursor specified relatively current cursor position absolutely beginning result set scrollable cursors potentially access row result set multiple times thus data modifications insert update delete operations transactions could affect result set cursor sensitive insensitive data modifications sensitive cursor picks data modifications affecting result set cursor insensitive cursor additionally cursor may insensitive case dbms tries apply sensitivity much possible cursors usually closed automatically end transaction i.e commit rollback implicit termination transaction occurs behavior changed cursor declared using hold clause default without hold holdable cursor kept open commit closed upon rollback dbms deviate standard behavior also keep holdable cursors open rollback commit occurs holdable cursor positioned next row thus positioned update positioned delete statement succeed fetch operation occurred first transaction note jdbc defines cursors holdable per default done jdbc also activates auto-commit per default cursors used fetch data dbms application also identify row table updated deleted sql:2003 standard defines positioned update positioned delete sql statements purpose statements use regular clause predicates instead cursor identifies row cursor must opened already positioned row means codice_4 statement cursor must operate updatable result set order successfully execute positioned update delete statement otherwise dbms would know apply data changes underlying tables referred cursor using cursors distributed transactions x/open xa environments controlled using transaction monitor different cursors non-distributed transactions one pay attention using holdable cursors however connections used different applications thus transaction ended committed subsequent transaction running different application could inherit existing holdable cursors herefore application developer aware situation xquery language allows cursors created using subsequence function format result result initial xquery start item number start item-count number items return equivalently also done using predicate codice_10 end sequence complete examples see following information may vary depending specific database system fetching row cursor may result network round trip time uses much network bandwidth would ordinarily needed execution single sql statement like delete repeated network round trips severely reduce speed operation using cursor dbmss try reduce effect using block fetch block fetch implies multiple rows sent together server client client stores whole block rows local buffer retrieves rows buffer exhausted cursors allocate resources server locks packages processes temporary storage example microsoft sql server implements cursors creating temporary table populating query result set cursor properly closed deallocated resources freed sql session connection closed wasting resources server lead performance degradations failures employees table | [
3076,
10632,
8201,
8979,
2068,
10389,
7446,
11030,
2456,
1049,
5658,
5403,
9112,
10137,
4255,
9248,
9631,
9634,
1447,
2344,
4263,
7080,
10793,
10413,
10286,
9397,
3004,
1341,
7868,
11324,
10048,
2369,
5953,
6850,
2246,
9286,
2632,
9290,
878... | Test |
2,670 | 9 | J_(programming_language):j programming language j programming language developed early 1990s kenneth e. iverson roger hui synthesis apl also iverson fp fl function-level languages created john backus avoid repeating apl special-character problem j uses basic ascii character set resorting use dot colon inflections form short words similar digraphs primary primitive j words serve mathematical symbols dot colon extending meaning basic characters available also many characters languages often must paired codice_1 codice_2 treated j stand-alone words inflected single-character roots multi-character words j terse array programming language suited mathematical statistical programming especially performing operations matrices also used extreme programming network performance analysis like original fp/fl languages j supports function-level programming via tacit programming features unlike languages support object-oriented programming j flexible hierarchical namespace scheme every name exists specific locale effectively used framework class-based prototype-based object-oriented programming since march 2011 j free open-source software gnu general public license version 3 gplv3 one may also purchase source negotiated license j permits point-free style function composition thus programs terse considered difficult read programmers hello world program j implementation hello world reflects traditional use j – programs entered j interpreter session results expressions displayed also possible arrange j scripts executed standalone programs might look unix system historically apl used codice_3 indicate fold codice_4 equivalent codice_5 meanwhile division represented classic mathematical division symbol obelus ÷ implemented overstriking minus sign colon ebcdic ascii paper text terminals ascii general support overstrikes device-independent way include division symbol per se j uses represent division visual approximation reminder illustrates something mnemonic character j tokens quandaries imposed use ascii defining j function named codice_6 calculate average list numbers yields test execution function codice_7counts number items array.codice_8sums items array.codice_9divides sum number items avg defined using train three verbs codice_10 codice_11 codice_12 termed fork specifically codice_13 codice_14 shows power j v0 v1 v2 denote verbs ny denotes noun examples using codice_6 rank crucial concept j significance j similar significance codice_16 sql codice_17 c. implementing quicksort j dictionary yields following implementation quicksort demonstrating tacit programming later involves composing functions together referring explicitly variables j support forks hooks dictates rules arguments applied function applied component functions sorting j usually accomplished using built-in primitive verbs codice_18 sort codice_19 sort user-defined sorts quicksort typically illustration following example demonstrates usage self-reference verb codice_20 recursively calculate fibonacci numbers recursion also accomplished referring verb name although course possible verb named following expression exhibits pi n digits demonstrates extended precision abilities j j supports three simple types numeric variants one j numeric types bit two bit values 0 1 also bits formed lists example codice_21 list eight bits syntactically j parser treats one word space character recognized word-forming character would otherwise numeric words lists arbitrary length supported j supports usual binary operations lists exclusive rotate shift etc example j also supports higher order arrays bits formed two-dimensional three-dimensional etc arrays operations perform equally well arrays numeric types include integer e.g. 3 42 floating point 3.14 8.8e22 complex 0j1 2.5j3e88 extended precision integer 12345678901234567890x extended precision rational fraction 1r2 3r4 bits formed lists arbitrarily dimensioned arrays bits operations performed numbers array lists bits converted integer using codice_22 verb integers converted lists bits using codice_23 verb parsing j codice_24 period codice_25 colon word-forming characters never tokens alone unless preceded whitespace characters j also supports literal character type literals enclosed quotes example codice_26 codice_27 lists literals also supported using usual convention putting multiple characters quotes codice_28 typically individual literals 8-bits wide ascii j also supports literals unicode numeric boolean operations supported literals collection-oriented operations rotate supported finally boxed data type typically data put box using codice_29 operation left argument left argument would less operation analogous c codice_30 operation left argument however result c codice_30 reference semantics result j codice_29 value semantics words codice_29 function produces result result 0 dimensions regardless structure contained data viewpoint j programmer codice_29 puts data box allows working array boxes assembled boxes and/or copies made box collection type offered j arbitrarily dimensioned array algorithms expressed concisely using operations arrays j arrays homogeneously typed example list codice_35 list integers despite codice_36 bit part sorts type issues transparent programmers certain specialized operations reveal differences type example list codice_37 would treated exactly operations list codice_38 j also supports sparse numeric arrays non-zero values stored indices efficient mechanism relatively values non-zero j also supports objects classes artifact way things named data types instead boxed literals used refer objects classes j data value semantics objects classes need reference semantics another pseudo-type—associated name rather value—is memory mapped file j documentation includes dictionary words j identified nouns verbs modifiers primary words listed vocabulary respective parts speech indicated using markup note verbs two forms monadic arguments right dyadic arguments left right example 'codice_39 hyphen monadic verb 'codice_40 hyphen dyadic verb monadic definition mostly independent dyadic definition regardless whether verb primitive verb derived verb j provides control structures details similar procedural languages prominent control words category include | [
7684,
2181,
1673,
9993,
6797,
6160,
5395,
3733,
6933,
1178,
667,
8987,
5917,
1826,
2216,
10668,
10413,
7983,
5168,
2045,
823,
1976,
4921,
9019,
963,
10819,
8262,
1099,
7630,
11219,
5588,
11221,
2519,
4057,
5081,
1883,
11099,
1887,
9825,
4... | Test |
2,671 | 4 | Parrot_OS:parrot os parrot linux linux distribution based debian focus computer security designed penetration testing vulnerability assessment mitigation computer forensics anonymous web browsing developed frank ruben aqua skid parrotsec intended provide suite penetration testing tools used attack mitigation security research forensics vulnerability assessment parrot based debian testing branch buster custom linux 4.19 kernel follows rolling release development model desktop environment mate default display manager lightdm project certified run devices minimum 256mb ram suitable 32-bit i386 64-bit amd64 processor architectures moreover project available armv7 armhf architectures even offers edition 32-bit 64-bit developed specifically servers carry cloud service penetration testing june 2017 parrotsec announced considering change debian devuan mainly problems highly controversial systemd january 21st 2019 parrot linux team phasing development 32-bit i386 versions future operating systems parrot multiple editions based upon debian various desktop environments available parrot home special edition parrot designed daily use targets regular users need lightweight always updated beautiful system laptops workstations distribution look feel regular parrot environment includes basic programs daily work parrot home also includes programs chat privately people encrypt documents highest cryptographic standards surf net completely anonymous secure way system also used starting point build customized pentesting platform tools need use build professional workstation taking advantage latest powerful technologies debian without hassle lightweight parrot release embedded systems aimed simplicity portability supported hardware brands raspberry pi orange pi pine64 cubieboard development team specified official release timeline based release changelogs notes included official review distribution project released monthly basis | [
4611,
3079,
3089,
4113,
8209,
8727,
543,
11297,
7204,
9253,
11305,
56,
3129,
4153,
59,
7228,
8248,
9276,
4673,
3654,
5190,
3147,
2125,
1107,
1110,
89,
5721,
4192,
3685,
9319,
10860,
5742,
2671,
11388,
2692,
8837,
9353,
9873,
11410,
8857,
... | Validation |
2,672 | 2 | CMD_file_(CP/M):cmd file cp/m cp/m-86 concurrent cp/m-86 personal cp/m-86 s5-dos dos plus concurrent dos flexos multiuser dos system manager real/32 well scp1700 cp/k k8918-os cmd filename extension used cp/m-style executable programs corresponds com cp/m-80 exe dos extension used command-line interpreter cmd.exe os/2 windows batch files cmd file 128-byte header followed 1-8 groups code data group 1 megabyte size later versions format cmd files also contain relocation information resident system extensions rsxs start header lists groups present file types type used first 256 bytes data group must zero populated cp/m-86 zero page comparable program segment prefix dos data group first 256 bytes code group used instead os/2 windows nt .cmd file extension associated batch scripts command processor cmd.exe since binary code executed way attempting run cp/m-86 cmd files cmd command processor work typically cause mild inconvenience users executable loader relocator cp/m-86 related operating systems test first byte file happens type byte first table entry cp/m cmd file value 1 9 accepting valid cp/m cmd file ascii values smaller 10 rarely never used batch scripts scheme gives reasonably good protection | [
10113,
1922,
6664,
6921,
6797,
3216,
3856,
8976,
2840,
2201,
2729,
7849,
11562,
178,
5557,
4409,
3386,
7999,
4548,
9166,
8529,
3410,
10067,
10083,
5220,
4712,
3056,
4337,
9329,
2804,
4727,
11513,
6778,
2942,
8959
] | Test |
2,673 | 2 | Cocoa_Touch:cocoa touch cocoa touch ui framework building software programs run ios iphone ipod touch ipad watchos apple watch tvos fourth-generation apple tv apple inc. cocoa touch provides abstraction layer ios operating system iphone ipod touch ipad cocoa touch based macos cocoa api toolset like primarily written objective-c language cocoa touch allows use hardware features found macos computers thus unique ios range devices like cocoa cocoa touch follows model-view-controller mvc software architecture cocoa touch contains different set graphical control elements cocoa tools developing applications based cocoa touch included ios sdk ios watchos tvos technologies seen set layers cocoa touch highest level core os/kernel bottom hierarchical view ios watchos tvos technologies shown follows main features technologies cocoa touch cocoa touch provides key frameworks developing applications devices running ios key frameworks | [
10755,
9732,
5647,
7697,
11289,
6186,
2603,
4139,
6700,
1074,
8754,
9784,
8253,
8771,
8783,
4180,
10838,
1623,
3672,
10841,
3681,
9826,
8806,
3691,
5743,
8303,
8304,
9848,
5754,
7292,
2686,
6783,
10878,
1666,
5784,
1177,
3228,
2207,
11430,
... | Test |
2,674 | 3 | Scramble_Spirits:scramble spirits player starts propelled plane fire air-to-air twin machine guns air-to-ground rockets weapons used destroying waves enemy planes ground sea units main plane destroyed one hit certain enemy destroyed player collect comrade fighter fight alongside main plane two comrade fighters collected comrade fighters assigned fight air fire bullets assigned fight low altitude fire air-to-ground rockets comrade fighters also launched kamikaze attack explosion enemy kamikaze attacks comrade fighters retrievable lost shot crash enemy areas certain stages player fly lower altitude armed twin machine guns shooting parked planes turrets take limited amount damage multiple shots crashes end stage player must destroy boss vehicle proceed | [
1776,
10931,
9006
] | Test |
2,675 | 9 | Thomas_W._Reps:thomas w. reps thomas w. reps born 28 may 1956 united states american computer scientist known contributions automatic program analysis dr. reps professor computer science computer sciences department university wisconsin–madison joined 1985 reps author co-author four books one hundred seventy-five papers describing research work covered wide variety topics including program slicing data-flow analysis pointer analysis model checking computer security instrumentation computer programming language-based program-development environments use program profiling software testing software renovation incremental algorithms attribute grammars reps ’ current work focuses static analysis stripped binary executables methods that—without relying symbol-table debugging information—recover intermediate representations similar intermediate phases compiler creates program written high-level language goal provide disassembler decompiler platform analyst use understand workings cots components plugins mobile code dlls well memory snapshots worms virus-infected code reps president co-founder grammatech inc. reps recipient following awards | [
1952,
2051,
4420,
10762,
10173,
10703,
7634,
2041,
7739,
7421,
2558
] | None |
2,676 | 2 | Quartz_(graphics_layer):quartz graphics layer apple macos operating system quartz quartz 2d quartz compositor part core graphics framework quartz includes 2d renderer core graphics composition engine sends instructions graphics card vertical nature quartz often synonymous core graphics general sense quartz quartz technologies refer almost every part graphics model rendering layer compositor including core image core video apple graphics technologies use quartz prefix include quartz 2d primary two-dimensional 2d text graphics rendering library directly supports aqua displaying two-dimensional graphics create user interface including on-the-fly rendering anti-aliasing quartz render text sub-pixel precision graphics limited traditional anti-aliasing default mode operation turned mac os x 10.4 tiger apple introduced quartz 2d extreme enabling quartz 2d offload rendering compatible gpus however gpu rendering enabled default due potential video redraw issues kernel panics mac os x v10.5 quartz 2d extreme renamed quartzgl however still remains disabled default situations degrade performance experience visual glitches per-application setting turned developer wishes quartz compositor compositing engine used macos mac os x jaguar later quartz compositor use graphics accelerator gpu vastly improve composition performance technology known quartz extreme enabled automatically systems supported graphics cards widely stated quartz uses pdf internally notably apple 2000 macworld presentation quartz early developer documentation often people making comparisons display postscript technology used nextstep openstep descendant quartz internal imaging model correlates well pdf object graph making easy output pdf multiple devices | [
9732,
4615,
1549,
4111,
5647,
1042,
6700,
4657,
1074,
9784,
10808,
576,
9802,
5713,
4178,
3670,
4184,
2141,
4702,
2149,
3691,
8303,
6771,
6264,
2686,
7806,
9343,
3719,
10888,
137,
11402,
7307,
8852,
1686,
7318,
5784,
4251,
3228,
7325,
220... | Test |
2,677 | 4 | Neil_Schwartzman:neil schwartzman neil schwartzman canadian anti-spam activist involved anti-spam efforts since 1995 co-founder executive director cauce sat canadian federal task force spam u.s. federal communications commission csric network abuse protection working group currently chair m3aawg awards committee | [
1681,
6762,
2188
] | Validation |
2,678 | 4 | NowSecure:nowsecure nowsecure formerly viaforensics chicago-based mobile security company publishes mobile app device security software former ceo co-founder andrew hoog working cio one employees dismissed dismissal hoog tasked reviewing whether employee stolen sensitive data company rather hire forensics firm investigate hoog performed investigation continued forensic work side hoog wife chee-young kim contributed money start company originally known chicago electronic discovery viaforensics hoog devoted full-time mobile forensics kim continued work corporate job day participated business development night weekends march 2011 viaforensics profitable extent could pay employee benefits kim left job went work viaforensics full-time june 5 year viaextract 1.0 released conference myrtle beach viaforensics introduced known vialab march 2013. vialab product allowed automated testing variety security flaws apps including man-in-the-middle attacks ssl strip attacks coding problems opportunities reverse engineering viaforensics subject inc 5000 13 fastest-growing tech company us award 2014 2014 viaforensics launched viaprotect app show users destinations sources data mobile devices rsa conference company began focus similar individual enterprise device protection result focus shift viaforensics decided rebrand nowsecure nowsecure publisher nowsecure forensics formerly viaextract nowsecure lab formerly vialab nowsecure mobile apps formerly viaprotect nowsecure forensics designed law enforcement extract artifacts mobile devices applying deleted data recovery data search nowsecure lab mobile app vulnerability scanning software nowsecure mobile free end-user oriented vulnerability scanner ios android blackphone 2014 2015 pc magazine awarded viaprotect editor choice android privacy utilities | [
2084,
2437,
9356,
9488,
4063,
7899,
10173,
4863
] | Test |
2,679 | 5 | Exchange_ActiveSync:exchange activesync exchange activesync commonly known eas proprietary protocol designed synchronization email contacts calendar tasks notes messaging server smartphone mobile devices protocol also provides mobile device management policy controls protocol based xml mobile device communicates http https originally branded airsync supporting microsoft exchange servers pocket pc devices microsoft licenses technology widely synchronization groupware mobile devices number competing collaboration platforms including addition support windows phone eas client support included beyond premises installations exchange various personal enterprise hosted services microsoft also utilize eas including outlook.com office 365 built-in email application windows 8 desktop mail app also supports protocol apart eas client support included first version eas called airsync time part mobile information server mis 2002 version eas communicated web-based distributed authoring versioning webdav exchange 2000 servers syncing email contacts calendar allowed users select folder list sync email folders contacts calendars initial version eas user ’ device “ pull ” data rather server “ push ” new information soon available eas 2.0 shipped exchange server 2003 version protocol developed microsoft windows mobile team delivered binary drop massync.dll exchange server team eas used webdav connect user mailbox added ability sync non-default calendar contacts folders always date autd implemented way let device know new information short message service sms technology used deliver information device use sms notification configuration sms gateway required account needed configured user mobile phone number exchange server 2003 sp1 ghosting support added eas 2.1 ghosting tells server sync sent changes sent specified fields changed others deleted eas protocol also moved globally unique identifier guid 1 x short ids items reduced amount data sent across wireless network eas 2.5 part exchange server 2003 sp2 first version eas written exchange server team version also introduced direct push real-time push e-mail solution allows server say new item tells client device sync called ping sync global address list gal search added enable people look co-workers company directory find email address ability remotely wipe device also added administrators could remove company data device lost stolen employee left company tasks syncing added s/mime email encryption following policies added eas 12.0 came exchange server 2007 eas 12.0 complete re-write protocol managed code previous version new features included password reset allowed users reset forgotten pin lock code message flagging gave users ability mark message could remember follow got back computer office setting users could set “ away ” message phone sharepoint unc file share access links email file traffic proxied though eas empty deleted items allow people shrink mailboxes ’ exceed mailbox size limits fetch allowed users get parts message choose later get rest message attachment later device info allowed users administrators see phones connected accounts autodiscover although strictly speaking ’ part eas protocol allowed phones automatically configure eas connection user login password instead requiring people know computer name exchange server ability see invited meeting also added well ability search server email synced device new policies introduced eas 12.1 came exchange server 2007 sp1 version protocol one largest changes since version 2.5 featured header compression base64 encoding binary structure decrease amount data sent wirelessly multiple collections sync bundling sync requests together instead previous way sync folder separately hanging sync allowed server keep communications channel open client times battery life data ’ consumed constantly turning radio querying server “ true push sync ” solution far lower message delivery latencies opposed previous ping based “ push pull ” solution confirmation completed remote wipe well following 30 new policies eas 14.0 introduced part exchange server 2010 new version added new conversation view put email messages view connected several attributes including message-id email subject notes syncing ability look availability free/busy status contact calendar nickname cache shared names common used contacts outlook web app owa eas ability set server side rule always move messages conversation lunar calendar support syncing reply state let device server know message forwarded replied source new way identify unified messaging um messages voicemail appeared user ’ inbox could handled differently sms syncing allowed users see sms messages email inbox reply inbox instead phone following two new policies also first version eas identified clients using older versions eas alerted updated version client would enable newer features eas 14.1 came part exchange server 2010 sp1 version protocol added gal photos images stored active directory server user sent email message diffs means sending new portion email avoiding redundant information added device/user information provision command new allow/block/quarantine feature could easily allow administrators control devices connected organizations information rights management irm eas method apply digital rights management control encryption email messages sent received eas 14.1 may allow irm eas eas 16.0 announced june 2015 deployed office 365 first followed exchange server 2016 new protocol version adds mainly 3 enhancements redesigned calendar synchronisation avoid common eas calendar syncing problems added calendar attachments syncing email drafts folder eas 16.1 announced june 2016 deployed office 365 first followed exchange server 2016 version protocol contains three major capabilities improved keyword search propose new time account-only remote wipe beginning early 2000s eas began available licensing time client protocol license motorola first licensee began license 2.1 version eas various organizations licensed eas time microsoft eventually started licensing server side eas 2007 protocol licensing continued 2008 december 2008 microsoft shifted licensing eas protocol license licensing patents eas providing full protocol documentation eas licensed series patents given computer code companies different clients servers implement subset entire features protocol implementations written company obtained license google uses implementation eas g suite subscribers likewise ibm novell implemented technology allow competing groupware servers lotus domino novell groupwise support smartphones devices ibm notes traveler novell data synchronizer mobility pack respectively april 2011 microsoft launched eas logo program tests third-party eas clients mobile email devices handset manufacturers licensed eas protocol microsoft eligible join program order compliant eas clients must employ eas v14.0 later enable following features management policies | [
10242,
10886,
2695,
3847,
649,
9868,
1297,
3218,
9365,
10005,
11413,
5402,
5531,
3742,
10271,
2208,
9380,
2085,
9381,
3751,
3752,
10924,
3246,
562,
2996,
9909,
1083,
10171,
3133,
3006,
4797,
5181,
5437,
9408,
7364,
2887,
8265,
10956,
2509,
... | Validation |
2,680 | 9 | Quantum_programming:quantum programming quantum programming process assembling sequences instructions called quantum programs capable running quantum computer quantum programming languages help express quantum algorithms using high-level constructs quantum instruction sets used turn higher level algorithms physical instructions executed quantum processors sometimes instructions specific given hardware platform e.g ion traps superconducting qubits cqasm also known common qasm hardware-agnostic qasm guarantees interoperability quantum compilation simulation tools introduced qca lab tudelft quil instruction set architecture quantum computing first introduced shared quantum/classical memory model introduced robert smith michael curtis william zeng practical quantum instruction set architecture many quantum algorithms including quantum teleportation quantum error correction simulation optimization algorithms require shared memory architecture openqasm intermediate representation introduced ibm use qiskit ibm q experience blackbird quantum instruction set intermediate representation used xanadu strawberry fields designed represent continuous-variable quantum programs run photonic quantum hardware quantum software development kits provide collections tools create manipulate quantum programs also provide means simulate quantum programs prepare run using cloud-based quantum devices following software development kits used run quantum circuits prototype quantum devices well simulators ocean open source suite tools developed d-wave written mostly python programming language enables user formulate problems ising model quadratic unconstrained binary optimization formats qubo results obtained submitting online quantum computer leap d-wave ’ real-time quantum application environment customer-owned machines classical samplers open source project developed institute theoretical physics eth uses python programming language create manipulate quantum circuits results obtained either using simulator sending jobs ibm quantum devices open source project developed ibm quantum circuits created manipulated using python swift java results obtained either using simulators run user device simulators provided ibm prototype quantum devices provided ibm well ability create programs using basic quantum operations higher level algorithms available within qiskit aqua package qiskit based openqasm standard representing quantum circuits support pulse level control quantum systems specified openpulse standard open source project developed rigetti uses python programming language create manipulate quantum circuits results obtained either using simulators prototype quantum devices provided rigetti well ability create programs using basic quantum operations higher level algorithms available within grove package forest based quil instruction set public access quantum devices currently planned following sdks yet implemented project developed microsoft part .net framework quantum programs written run within visual studio vscode open source project developed google uses python programming language create manipulate quantum circuits results obtained using simulators run user device open-source python library developed xanadu designing simulating optimizing continuous variable cv quantum optical circuits three simulators provided one fock basis one using gaussian formulation quantum optics one using tensorflow machine learning library quantum programming environment developed cambridge quantum computing target simulators quantum hardware planned use hardware produced nqit hub well oxford quantum circuits full release expected september 2018 two main groups quantum programming languages imperative quantum programming languages functional quantum programming languages prominent representatives imperative languages qcl lanq q|si quantum computation language qcl one first implemented quantum programming languages important feature qcl support user-defined operators functions syntax resembles syntax c programming language classical data types similar primitive data types c. one combine classical code quantum code program quantum pseudocode proposed e. knill first formalized language description quantum algorithms introduced moreover tightly connected model quantum machine called quantum random access machine qram language developed microsoft used quantum development kit q|si platform embedded .net language supporting quantum programming quantum extension while-language platform includes compiler quantum while-language chain tools simulation quantum computation optimisation quantum circuits termination analysis quantum programs verification quantum programs q language second implemented imperative quantum programming language q language implemented extension c++ programming language provides classes basic quantum operations like qhadamard qfourier qnot qswap derived base class qop new operators defined using c++ class mechanism quantum memory represented class qreg qreg x1 // 1-qubit quantum register initial value 0 qreg x2 2,0 // 2-qubit quantum register initial value 0 computation process executed using provided simulator noisy environments simulated using parameters simulator quantum guarded command language qgcl defined p. zuliani phd thesis based guarded command language created edsger dijkstra described language quantum programs specification quantum macro assembler qmasm low-level language specific quantum annealers d-wave efforts underway develop functional programming languages quantum computing functional programming languages well-suited reasoning programs examples include selinger qpl haskell-like language qml altenkirch grattage higher-order quantum programming languages based lambda calculus proposed van tonder selinger valiron arrighi dowek qfc qpl two closely related quantum programming languages defined peter selinger differ syntax qfc uses flow chart syntax whereas qpl uses textual syntax languages classical control flow operate quantum classical data selinger gives denotational semantics languages category superoperators qml haskell-like quantum programming language altenkirch grattage unlike selinger qpl language takes duplication rather discarding quantum information primitive operation duplication context understood operation maps formula_1 formula_2 confused impossible operation cloning authors claim akin sharing modeled classical languages qml also introduces classical quantum control operators whereas languages rely classical control operational semantics qml given terms quantum circuits denotational semantics presented terms superoperators shown agree operational denotational semantics implemented classically haskell liqui| pronounced liquid quantum simulation extension f programming language currently developed quantum architectures computation group quarc part stationq efforts microsoft research liqui| seeks allow theorists experiment quantum algorithm design physical quantum computers available use includes programming language optimization scheduling algorithms quantum simulators liqui| used translate quantum algorithm written form high-level program low-level machine instructions quantum device quantum lambda calculi extensions classical lambda calculus introduced alonzo church stephen cole kleene 1930s purpose quantum lambda calculi extend quantum programming languages theory higher-order functions first attempt define quantum lambda calculus made philip maymin 1996 lambda-q calculus powerful enough express quantum computation however language efficiently solve np-complete problems therefore appears strictly stronger standard quantum computational models quantum turing machine quantum circuit model therefore maymin lambda-q calculus probably implementable physical device 2003 andré van tonder defined extension lambda calculus suitable proving correctness quantum programs also provided implementation scheme programming language 2004 selinger valiron defined strongly typed lambda calculus quantum computation type system based linear logic quipper published 2013 implemented embedded language using haskell host language reason quantum programs written quipper written haskell using provided libraries example following code implements preparation superposition | [
9345,
9224,
6798,
1051,
10145,
3876,
6182,
9385,
7851,
5677,
1591,
10042,
8514,
10819,
8262,
9926,
3529,
74,
9801,
7164,
11209,
10452,
5081,
2781,
477,
2273,
10083,
8554,
8430,
8688,
3698,
3573,
10102,
2680,
3323,
7292
] | Test |
2,681 | 1 | Database_application:database application database application computer program whose primary purpose entering retrieving information computerized database early examples database applications accounting systems airline reservations systems sabre developed starting 1957 characteristic modern database applications facilitate simultaneous updates queries multiple users systems 1970s might accomplished user front 3270 terminal mainframe computer mid-1980s becoming common give user personal computer program running pc connected database server information would pulled database transmitted network arranged graphed otherwise formatted program running pc starting mid-1990s became common build database applications web interface rather develop custom software run user pc user would use web browser program every application database application web interface advantage could used devices different sizes different hardware different operating systems examples early database applications web interfaces include amazon.com used oracle relational database management system photo.net online community whose implementation top oracle described book database-backed web sites ziff-davis press may 1997 ebay also running oracle electronic medical records referred emrexperts.com december 2010 software database application 2005 o'reilly book uses term title database applications web complex database applications remain accounting systems sap may contain thousands tables single module many today widely used computer systems database applications example facebook built top mysql etymology phrase database application comes practice dividing computer software systems programs operating system compilers file system tools database management system application programs payroll check processor standard pc running microsoft windows example windows operating system contains systems programs games word processors spreadsheet programs photo editing programs etc would application programs application short application program database application short database application program every program uses database would typically considered database application example many physics experiments e.g. large hadron collider generate massive data sets programs subsequently analyze data sets constitute database though typically managed standard relational database management system computer programs analyze data primarily developed answer hypotheses put information back database therefore overall program would called database application | [
2688,
9481,
10505,
10258,
10518,
4376,
9112,
7968,
290,
1314,
7461,
8742,
5550,
5808,
10418,
9527,
3768,
3004,
9661,
9663,
4416,
2369,
5441,
11457,
8518,
72,
853,
2901,
9942,
8921,
9177,
987,
860,
9183,
11362,
7523,
10471,
8808,
7022,
638... | Test |
2,682 | 9 | Constructed_product_result_analysis:constructed product result analysis field compiler implementation computer science constructed product result analysis cpr analysis static analysis determines functions given program return multiple results efficient manner typically means returning multiple results register opposed returning pointer tuple allocated heap whose components function multiple return values cpr analysis introduced context compiling haskell lazy functional language implemented glasgow haskell compiler may applicable programming languages well | [
1952,
4769,
3876,
230,
6536,
9911
] | None |
2,683 | 4 | Barrett_Brown:barrett brown barrett lancaster brown born august 14 1981 american journalist essayist satirist founded project pm research collaboration wiki facilitate analysis troves hacked emails leaked information concerning inner workings cyber-military-industrial complex january 2015 brown sentenced 63 months federal prison crimes accessory fact obstruction justice threatening federal officer stemming fbi investigation 2012 stratfor email leak prosecutors previously brought charges associated sharing http link leaked stratfor data charges dropped 2014 part sentence brown also required pay almost 900,000 stratfor prior 2011 brown ties hacktivist collective anonymous brown born dallas texas robert brown karen lancaster later divorced grew dallas exhibited early interest writing journalism creating newspapers family computer attending preston hollow elementary school went contribute school newspapers interned several weekly newspapers teenage years attended episcopal school dallas sophomore year high school spent would-be junior year tanzania father residing business africa brown completed high school online texas tech university program earning college credits well high school diploma 2000 enrolled university texas austin spent two semesters taking writing courses leaving school pursue full-time career freelance writer brown served director communications enlighten vote secularist pac provides financial strategic assistance political candidates advocate strict enforcement establishment clause 2010 brown began work crowdsourced investigation wiki project pm brown written main goals project pm increase positive influence calls capable segments blogosphere reducing negative influence well-regarded mainstream pundits may political agendas compatible public interest aim wiki project pm established way deliberate generation critical mass work following among dependable bloggers manner segments traditional media prompted even forced address critical issues methods means reportage experimental aim project pm also develop communicational schematic could provide bloggers reporters concerned citizen journalist best possible feed raw information produce content aim project pm brown stated institutions structures developed past two decades accelerating public internet use reasonably describe wholesome effect information flow information age work progress thus potential improvements made importantly improvements made initially small number influential participants working coordination purpose project pm implement solutions extent participants collectively able well demonstrate beneficial effects solutions others might spurred recreate even build upon independently efforts june 2011 project pm released exclusive report surveillance contract called romas/coin discovered e-mails hacked hbgary anonymous consisted sophisticated data-mining techniques leveraging mobile software aimed arab countries november 2011 brown said 75 names members zetas drug cartel would released member anonymous group kidnapped set free brown says member released truce drug cartel moment others said kidnapping fake january 18 2012 brown interviewed english language russian news network rt cyber attacks anonymous temporary blackout us government websites whitehouse.gov doj.gov fbi.gov march 6 2012 confirmed twitter fbi raided residence receiving information hector xavier monsegur also known online pseudonym sabu founder lulzsec early january 2014 announced second book begun 2006 published according legal defense website book originally titled hot fat clouded amazing amusing failures america ’ chattering class consisted attack ubiquitous newspaper columnists media pundits argues undeservedly influential able form public opinion … excited announce rescued book fate soon see light day newly titled keep rootin ’ putin establishment pundits twilight american competence text become available ebook spring 2014 donors legal defense fund september 2012 incarceration brown wrote series columns magazine titled barrett brown review arts letters jail 2015 transitioned intercept 2016 intercept national magazine award three barrett columns written daily beast vanity fair true/slant huffington post guardian publications media outlets presented brown spokesperson anonymous label disputes appeared documentaries legion terms conditions may apply hacker wars brown said renounced links group 2011 also reported 2011 brown anon alumnus gregg housh landed six-figure deal amazon book tentatively titled anonymous tales inside accidental cyberwar march 6 2012 fbi executed search warrants brown apartment mother house seeking evidence alleged crimes items seized included records relating hbgary infragard endgame systems anonymous lulzsec irc chats twitter wiki.echelon2.org pastebin.com agents took possession laptop computers suspect fbi working incorrect information brown told reporter september 12 2012 brown arrested dallas county texas threatening fbi agent youtube video arrest occurred left computer linked tinychat raid could heard background brown talked publicly history using heroin going withdrawal day arrest magistrate denied bail therefore kept pre-trial detention danger safety community risk flight september 24 2012 pastebin post appeared titled barrett brown – communiqué prison 9/20/12 brown thanked supporters described insufficient medical treatment received ribs injured arrest acknowledged past mistakes missive concludes personally thank everyone outside helped movement particularly critical time regained freedom nothing lose time war paper always war october 3 2012 federal grand jury indictment returned brown charges threats conspiracy retaliation federal law enforcement officer various tweets youtube uploads comments made brown arrest cited support within indictment later entered plea guilty three counts december 4 2012 brown indicted additional 12 federal charges related december 25 2011 hack austin-based private intelligence company stratfor carried jeremy hammond trove millions stratfor emails hack including authentication information thousands credit card accounts shared hacker collective lulzsec whistleblower site wikileaks main article 2012 stratfor email leak hammond pleaded guilty received maximum sentence ten years federal prison hack brown faced 45 years federal prison allegedly sharing link data part project pm presumed fbi entrapment maneuver attorney jesselyn radack raised connections brown case client peter van buren state department sought prosecute link personal blog wikileaks document two online commentators internet security issues criticized charges brown entered plea guilty twelve counts january 23 2013 third indictment filed brown two counts obstruction concealing evidence march 6 2012 fbi raid mother homes brief court hearing week later judge found mentally competent stand trial brown pleaded guilty additional charges may 1 2013 announced brown retained two attorneys charles swift ahmed ghappour represent legal cases september 4 2013 brown federal court-issued gag order lawyers allowed discuss case media lest taint jury assistant united states attorney candina s. heath lead prosecutor said brown tried manipulate media behind bars benefit brown attorney coordinates and/or approves use media publicity brown contained false information gross fabrications defense counsel maintained gag order unfounded unwarranted breach brown first amendment rights though forbidden write speak case brown continued pen articles prison cell unrelated topics gag order lifted april 23 2014 key documents unsealed brown custody since september 12 2012 mother sentenced november 8 2013 six months probation 1,000 fine misdemeanor charge obstructing execution search warrant better judgment clouded maternal instinct stated court judge said feel parent know best could march 2014 charges brown dropped april 2014 reported brown agreed plea bargain january 2015 brown sentenced 63 months prison also ordered pay 890,250 fines restitution journalist janus kopfstein said believed government considered brown threat suggested prosecutors made false allegations used increase length sentence supporting theory much brown december sentencing hearing spent drawn-out arguments definitions project pm brown brown released prison november 29 2016 moved halfway house five drug dealers close downtown dallas texas april 27 2017 brown arrested held unknown charges four days released gave interview democracy house arrest despite pressure government speak media brown expressed desire move iceland germany possible telling truthout interview ca n't stay us ca n't get work done 'm always subject little gusts bureaucracy wo n't another year 'm probation another two years generally goes one year n't act year 'll position leave 2017 lawyers donors brown legal fund filed suit assistant united states attorney candina heath filing subpoena wepay resulted divulgence identities lawyers argued irrelevance donor information case brown provision information directly special agent robert smith federal bureau investigation rather prosecutor judge trial led donors belief information intended surveil harass donors activity protected u.s. constitution filed destruction data monetary damages october 2 2017 judge maria elena james denied motion dismiss case introduced department justice sentencing statement brown alleged despite denial subpoena judge making statement identities contributors echelon2.org public wiki obtained means dozens people given time expertise hailed journalists advocacy groups crucial journalistic enterprise risk indicted sort spurious charges facing long ago government exposed decades prison time copying pasting link publicly available file journalists also linking without prosecuted relatively free documentary film released 2016 field vision brown drive across texas halfway house released prison barrett brown case included plot point season 2 u.s. tv series house cards brown serves advisory board international modern media institute | [
9240,
4956,
10950
] | Test |
2,684 | 2 | Maliit:maliit maliit input method framework computers particular focus implementing virtual keyboards designed mostly touchscreen devices maliit allows inputting text without presence physical keyboard advanced features word correction prediction also available originating part meego maliit free software licensed lgpl maliit deployed standard component nokia n9 kde plasma active luneos olpc devices ubuntu touch maliit originally developed part meego nokia eventually shipped part meego handset “ day 1 ” software platform meego project ended maliit transferred independent project free software consulting firm openismus first formally independent release 0.80.0 maliit 0.99 released switched qt 4 qt 5 among maliit ’ features plugin-based architecture word correction prediction multitouch context sensitive layouts running linux kernel handling input hardware relies evdev maliit adopted x11 well wayland | [
1728,
737,
8326,
4365,
6797,
7983,
9262,
10259,
1972,
5397,
5492,
11221
] | Test |
2,685 | 2 | Grapple_(network_layer):grapple network layer grapple free software package adding multiplayer support computer games applications uses internet protocols supporting tcp/ip udp/ip intended simple enough multiplayer features added game little dozen lines code also offers advanced features desired grapple takes care creating monitoring closing connections server supports multiple servers message-oriented system clients servers message queue also relay messages client client also provides fully functional lobby system package created 2006 michael simms linux game publishing released gnu lgpl features grapple supports time | [
11069,
10924,
6797,
7214,
7983,
11602,
2804,
11413,
6966,
5531,
2045
] | None |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.