node_id int64 0 76.9k | label int64 0 39 | text stringlengths 13 124k | neighbors listlengths 0 3.32k | mask stringclasses 4
values |
|---|---|---|---|---|
1,285 | 1 | SQL_Server_Management_Objects:sql server management objects sql server management objects smo .net objects introduced microsoft microsoft sql server 2005 designed allow easy simple programmatic management microsoft sql server using smo .net programmers design applications similar functionality microsoft sql server mana... | [
2054
] | Test |
1,286 | 8 | Apache_Axis2:apache axis2 apache axis2 core engine web services complete re-design re-write widely used apache axis soap stack implementations axis2 available java c. axis2 provides capability add web services interfaces web applications also function standalone application server new architecture axis2 introduced augu... | [
5631,
7238,
894,
4303,
4766,
5728,
7805,
4770,
4043,
6986,
2741,
7444,
7896,
917,
5571,
3463,
3542,
4422,
3204,
6821,
5054,
840,
1392,
3031,
5408,
3558,
5677,
3479,
4436,
5863,
6387,
5075,
6137,
7488,
7763,
7857,
773,
5874,
3915,
3239,
... | Test |
1,287 | 2 | MacRuby:macruby macruby discontinued implementation ruby language ran objective-c runtime corefoundation framework development apple inc. supposed replace rubycocoa targeted ruby 1.9 used high performance llvm compiler infrastructure starting version 0.5 supports ahead-of-time just-in-time compilation macruby supported... | [
1532,
5369,
6428,
3779,
6002,
7259,
5571,
397,
3021,
4151,
3879,
3889,
2679,
3478,
7671,
952,
8137,
5786,
1989,
1435
] | Validation |
1,288 | 2 | ANDOS:andos andos russian operating system electronika bk-0010 electronika bk-0011 electronika bk-0011m series computers created 1990 first released 1992 initially developed alexey nadezhin whose name system named later also sergey kamnev joined project widespread system bk series computers used ms-dos-compatible file ... | [
1522,
6076,
7794,
5462,
3690,
7079,
5571,
3538,
5048,
5140,
2864,
6380,
336,
861,
2887,
3748
] | Validation |
1,289 | 2 | 17_(app):17 app 17 live video streaming mobile app designed taiwanese pop singer jeffery huang member machi features instant photo video sharing functions client apps available ios android smartphone systems first launched app store 5 june 2015 sooner play store 10 june 2015 app re-released 28 october 2015 banned due p... | [
6312
] | Test |
1,290 | 1 | SHERPA/Juliet:sherpa/juliet sherpa/juliet online database open access mandates adopted academic funding bodies part sherpa suite services around open access run jisc formerly university nottingham database contains information 100 funders mostly united kingdom juliet indicates policy regarding self-archiving open acces... | [
5533
] | Test |
1,291 | 4 | L7-filter:l7-filter l7-filter software package provides classifier linux netfilter subsystem categorize internet protocol packets based application layer data major goal tool make possible identification peer-to-peer programs use unpredictable port numbers two versions software first implemented kernel module linux 2.4... | [
1249,
3165,
1809,
4759,
806,
994,
3185,
4492,
6984,
7351,
4138,
385,
7536,
2296,
2746,
6107,
578,
3637,
8100,
6456,
6025,
3551,
7275,
7744,
3394,
6560,
4977,
7289,
7478,
3223,
3484,
3821,
4091,
2790,
7683,
6235,
6149,
6951,
7597,
875,
6... | Test |
1,292 | 5 | Net-SNMP:net-snmp net-snmp suite software using deploying snmp protocol v1 v2c v3 agentx subagent protocol supports ipv4 ipv6 ipx aal5 unix domain sockets transports contains generic client library suite command line applications highly extensible snmp agent perl modules python modules net-snmp housed sourceforge usual... | [
5983,
6489,
5965,
5571,
1435,
1989,
578,
3819,
2219
] | Train |
1,293 | 7 | National_Grid_Service:national grid service national e-infrastructure service nes formerly national grid service organisation uk academics researchers 2004 2011 funded two governmental bodies engineering physical sciences research council epsrc joint information systems committee jisc nes provided compute data resource... | [
6963,
2962,
4159,
7055,
7214,
1004,
5834,
3947,
7930
] | Validation |
1,294 | 2 | Lions'_Commentary_on_UNIX_6th_Edition,_with_Source_Code:lions commentary unix 6th edition source code lions commentary unix 6th edition source code john lions 1976 contains source code 6th edition unix kernel plus commentary commonly referred lions book despite age still considered excellent commentary simple high qual... | [
4447,
6577,
5341,
5571,
352,
5021,
6016,
1435,
6046
] | Test |
1,295 | 7 | Distributed_memory:distributed memory computer science distributed memory refers multiprocessor computer system processor private memory computational tasks operate local data remote data required computational task must communicate one remote processors contrast shared memory multiprocessor offers single memory space ... | [
553,
5371,
5559,
1546,
4049,
4318,
3458,
5042,
7453,
4154,
1481,
5939,
4159,
1023,
4839,
5947,
7279,
3041,
1405,
240,
1678,
515,
1586,
1042,
8024,
2961,
3578,
8130,
4993,
3667,
1786,
2969,
1237,
4742,
5447,
357,
2266,
5890
] | Test |
1,296 | 5 | Bidirectional_Forwarding_Detection:bidirectional forwarding detection bidirectional forwarding detection bfd network protocol used detect faults two forwarding engines connected link provides low-overhead detection faults even physical media n't support failure detection kind ethernet virtual circuits tunnels mpls labe... | [
2650,
6879,
7637,
1543,
3819
] | Test |
1,297 | 1 | Canmore_(database):canmore database canmore online database information 320,000 archaeological sites monuments buildings scotland begun royal commission ancient historical monuments scotland historic environment scotland maintained since 2015 canmore database part national record historic environment nrhe formerly nati... | [
176,
2054
] | Test |
1,298 | 3 | Unisys_2200_Series_system_architecture:unisys 2200 series system architecture figure shows high-level architecture os 2200 system identifying major hardware software components majority unisys software included subsystems applications area model example database managers subsystems compilers applications details system... | [
1743,
1867,
4759,
1237,
578
] | Test |
1,299 | 7 | Ansarada:ansarada ansarada provider ai-powered virtual data rooms material information platforms business transactions material events mergers acquisitions fundraising tenders ipos historically ansarada virtual data rooms enabled hosting exchange management confidential material information bidders sellers mergers acqu... | [
4295
] | Test |
1,300 | 4 | Device_configuration_overlay:device configuration overlay device configuration overlay dco hidden area many today ’ hard disk drives hdds usually information stored either dco host protected area hpa accessible bios os user however certain tools used modify hpa dco system uses identify_device command determine supporte... | [
6488,
1052,
6380,
5571,
7825,
6327
] | Validation |
1,301 | 4 | Risk_management_framework:risk management framework risk management framework united states federal government policy standards help secure information systems computers networks developed national institute standards technology two main publications cover details rmf nist special publication 800-37 guide applying risk... | [
7558
] | Train |
1,302 | 5 | Dynamic_synchronous_transfer_mode:dynamic synchronous transfer mode dynamic synchronous transfer mode dtm optical networking technology standardized european telecommunications standards institute etsi 2001 beginning specification etsi es 201 803-1 dtm time division multiplexing circuit-switching network technology com... | [
7232,
7148,
456,
6879,
2281,
6521,
6976,
3775,
3855,
2644,
7170,
6531,
1462,
2650,
7637,
2119,
6908,
7091,
2219,
3383,
3640,
3797,
2043,
3312,
2057,
3819,
3820,
3821,
7214,
7217,
7765,
259,
5880,
1988
] | Test |
1,303 | 2 | Foomatic:foomatic foomatic configurable printing filter uses ppd files configuration generate appropriate output given printer spooler independent means used common unix printing system cups lprng others uses ghostscript background using options according ppd file printer currently developed openprinting workgroup linu... | [
7606,
2815,
5826,
4780,
7223,
6016
] | Validation |
1,304 | 9 | Creative_Basic:creative basic creative basic cb third-generation event-driven programming language windows integrated development environment ide current version executables interpreted require runtime libraries installed end-user computer planned future version compiled executables creative basic extensive command set... | [
5367,
1255,
4759,
12,
2463,
6891,
8183,
4139,
5651,
2925,
7448,
5926,
5129,
5571,
7906,
5137,
5234,
2941,
3303,
61,
6394,
4003,
7864,
1789,
5877,
6778,
4012,
4745,
1064
] | Validation |
1,305 | 6 | Dot_Hill_Systems:dot hill systems dot hill systems corp manufacturer computer storage area network arrays providing computer hardware software products small large computer data storage systems dot hill started 1997 carlsbad california 2004 dot hill acquired chaparral network storage longmont colorado chaparral network... | [
1254,
578
] | Test |
1,306 | 4 | Crackme:crackme crackme often abbreviated cm small program designed test programmer reverse engineering skills programmed reversers legal way crack software since intellectual property infringed upon crackmes reversemes keygenmes generally similar protection schemes algorithms found proprietary software however due wid... | [
7093,
4759,
578
] | Validation |
1,307 | 4 | 2014_Russian_hacker_password_theft:2014 russian hacker password theft 2014 russian hacker password theft alleged hacking incident resulting possible theft 1.2 billion internet credentials including usernames passwords hundreds millions corresponding e-mail addresses data breach first reported new york times reported ma... | [
704,
623,
3932,
4025,
7328,
1528,
2991,
7799,
7066,
2912,
376,
1173,
6526,
998,
3528,
3277,
2923,
7818,
208,
2021,
3864,
5922,
6628,
6904,
5305,
1376,
6541,
6194,
924,
1383,
2854,
7600,
6740,
5675,
2587,
2678,
3038,
4531,
5330,
600,
304... | Test |
1,308 | 9 | Alan_Perlis:alan perlis alan jay perlis april 1 1922 – february 7 1990 american computer scientist professor purdue university carnegie mellon university yale university best known pioneering work programming languages first recipient turing award perlis born jewish family pittsburgh pennsylvania graduated taylor allde... | [
7707,
811,
470,
6263,
1361,
1746,
1381,
3464,
6285,
7009,
3470,
7277,
43,
1114,
752,
5322,
1774,
7758,
5424,
6846,
6064,
6485,
7863,
1600,
3060,
6146,
1892,
8137,
1243,
356,
360
] | Validation |
1,309 | 9 | ActiveJDBC:activejdbc activejdbc java implementation active record design pattern developed igor polevoy inspired activerecord orm ruby rails based convention configuration similar ruby rails activejdbc infers meta data database result models require setters getters creation saving new records table one line updating e... | [
2180,
6594
] | Validation |
1,310 | 4 | SyncBack:syncback syncback software allows backing synchronizing files several resources including internal external drive different media usb thumb drive cd dvd remote server nas ftp windows server cloud storage provider governing law shall governed laws singapore file backup move sync restore functions program highly... | [
6289,
2390,
1254,
5571,
3180
] | Train |
1,311 | 4 | Mandiant:mandiant mandiant american cybersecurity firm rose prominence february 2013 released report directly implicating china cyber espionage december 30 2013 mandiant acquired fireeye stock cash deal worth excess 1 billion kevin mandia former united states air force officer serves company chief executive officer fou... | [
429,
862,
5982,
124,
6756,
3875,
3486,
1805
] | Test |
1,312 | 9 | Rank_(computer_programming):rank computer programming computer programming rank specifications usually synonym refers number dimensions thus two-dimensional array rank two three-dimensional array rank three strictly formal definition provided applies every programming language since concepts semantics terminology term ... | [
1892
] | Test |
1,313 | 9 | Concurrent_ML:concurrent ml concurrent ml cml concurrent extension standard ml programming language characterized ability allow programmers create composable communication abstractions first class rather built language design cml primitive operations adopted several programming languages gnu guile racket manticore many... | [
3531,
1889,
2638,
1825,
5164,
6981
] | Test |
1,314 | 0 | Computational_linguistics:computational linguistics computational linguistics interdisciplinary field concerned statistical rule-based modeling natural language computational perspective well study appropriate computational approaches linguistic questions traditionally computational linguistics performed computer scien... | [
1808,
3601,
2178,
4660,
1444,
3941,
715,
2553,
1830,
3959,
7539,
3285,
5388,
7900,
733,
3289,
7909,
1477,
2215,
2579,
5756,
6829,
1488,
7202,
2595,
4724,
2603,
5429,
6494,
81,
84,
3680,
6507,
3349,
6166,
4760,
2638,
7627,
6530,
2648,
47... | Validation |
1,315 | 2 | Vinum_volume_manager:vinum volume manager vinum logical volume manager also called software raid allowing implementations raid-0 raid-1 raid-5 models individually combination original vinum part base distribution freebsd operating system since 3.0 also netbsd 2003-10-10 2006-02-25 well descendants freebsd including dra... | [
7514,
732,
3636,
5760,
3986,
5065,
6477,
424,
1133,
6149,
6860,
5447,
6505,
1523,
1534,
1547,
481,
2300,
1193,
4059,
8001,
6918,
6211,
4806,
4441,
5865,
5518,
6586,
1237,
8037,
875,
1254,
6972,
191,
4498,
7355,
3457,
5571,
6278,
8096,
5... | Validation |
1,316 | 4 | DroidKungFu:droidkungfu droidkungfu malware affects android os primarily targets users china first evidence malware found android market march 2011 droidkungfu discovered us-based researchers yajin zhou xuxian jiang two discovered malware working north carolina state university targets android 2.2 platform allows hacke... | [
1691,
74,
1766,
3848,
7186,
3486
] | Test |
1,317 | 9 | BASIC_Stamp:basic stamp basic stamp microcontroller small specialized basic interpreter pbasic built rom made parallax inc. popular electronics hobbyists since early 1990s although basic stamp 2 form 24 pin dip chip fact small printed circuit board pcb contains essential elements microprocessor system end result hobbyi... | [
3931,
7569,
6778,
5208,
2036
] | Test |
1,318 | 5 | Megaphone_desktop_tool:megaphone desktop tool megaphone desktop tool windows action alert tool developed give israel united support giyus distributed world union jewish students world jewish congress jewish agency israel world zionist organization standwithus hasbara fellowships honestreporting pro-israel public relati... | [] | Train |
1,319 | 4 | Malware_research:malware research notion self-reproducing computer program traced back initial theories operation complex automata john von neumann showed theory program could reproduce constituted plausibility result computability theory fred cohen experimented computer viruses confirmed neumann postulate investigated... | [
5274
] | Test |
1,320 | 4 | XSL_attack:xsl attack cryptography extended sparse linearization xsl attack method cryptanalysis block ciphers attack first published 2002 researchers nicolas courtois josef pieprzyk caused controversy claimed potential break advanced encryption standard aes cipher also known rijndael faster exhaustive search since aes... | [
1811,
4930,
464,
807,
1353,
2918,
907,
3100,
119,
7548,
1283,
6637,
1480,
6372,
6647,
7200,
4805,
5765,
5327,
6657,
7928,
1587,
5333,
6763,
6049,
161,
433,
613,
1146,
4917
] | Train |
1,321 | 4 | Voice_phishing:voice phishing voice phishing form criminal phone fraud using social engineering telephone system gain access private personal financial information purpose financial reward sometimes referred vishing portmanteau voice phishing landline telephone services traditionally trustworthy terminated physical loc... | [
5722,
5547,
7164,
5733,
7813,
7174,
3964,
6102,
5132,
4699,
7836,
2944,
3480,
1036,
3147,
4734,
1321,
3921,
6240
] | Test |
1,322 | 2 | Alexandre_Julliard:alexandre julliard alexandre julliard born 1970 computer programmer best known project leader wine compatibility layer run microsoft windows programs unix-like operating systems julliard studied computer science swiss federal institute technology lausanne spent 1990s working embedded systems works fu... | [
1128,
4759,
5571
] | Test |
1,323 | 2 | Vital_Product_Data:vital product data vital product data vpd collection configuration informational data associated particular set hardware software vpd stores information part numbers serial numbers engineering change levels devices attached system provide vpd often available pci scsi devices parallel ata usb devices ... | [
578
] | Test |
1,324 | 2 | NOS/VE:nos/ve nos/ve network operating system virtual environment discontinued operating system time-sharing capabilities written control data corporation 1980s virtual memory operating system employing 64-bit virtual mode cdc cyber 180 series computers nos/ve replaced earlier nos nos/be operating systems 1970s command... | [
7765,
5571,
8066,
1537,
13,
5138,
5116,
4020
] | Test |
1,325 | 3 | Reset_vector:reset vector reset vector default location central processing unit go find first instruction execute reset reset vector pointer address cpu always begin soon able execute instructions address section non-volatile memory initialized contain instructions start operation cpu first step process booting system ... | [
5055,
5079,
3511,
1237,
7064,
352,
4810,
971,
1992
] | Test |
1,326 | 4 | Common_Criteria_Testing_Laboratory:common criteria testing laboratory common criteria model provides separation roles evaluator certifier product certificates awarded national schemes basis evaluations carried independent testing laboratories common criteria testing laboratory third-party commercial security testing fa... | [
4608,
6208,
4617,
3611,
3003
] | Train |
1,327 | 4 | Shannen_Rossmiller:shannen rossmiller shannen rossmiller born may 31 1969 american lecturer instructor cyber counter-intelligence forensics former montana municipal court judge controversial role vigilante online terrorist-hunter part 7seas group former high school cheerleader paralegal mother three rossmiller posed on... | [] | Test |
1,328 | 4 | Qualys:qualys qualys inc. provides cloud security compliance related services based foster city california founded 1999 qualys first company deliver vulnerability management solutions applications web using software service saas model 2013 gartner group fifth time gave qualys strong positive rating services added cloud... | [
3932,
230,
330,
5511,
2691,
7487,
4449,
688,
7506
] | Train |
1,329 | 7 | Filecoin:filecoin filecoin ⨎ open-source public cryptocurrency digital payment system intended blockchain-based cooperative digital storage data retrieval method made protocol labs builds top interplanetary file system allowing users rent unused hard drive space | [
6069,
2984,
3172,
7714,
2379,
7343,
6430,
2390,
3024,
2664,
744,
6025,
499,
2681,
6216,
3401,
3573,
8124,
2960,
2430,
2696,
5531,
3338,
4014,
538
] | Validation |
1,330 | 0 | Microsoft_Language_Portal:microsoft language portal microsoft language portal multilingual online dictionary computing terms also offers free downloads localization style guides translations user interface text feedback feature made public 2009 | [] | Test |
1,331 | 5 | OpenSTA:opensta opensta feature-rich gui-based web server benchmarking utility perform scripted http https heavy load tests performance measurements freely available distributable open source gnu general public license opensta currently runs microsoft windows-based operating systems scripts recorded proprietary languag... | [
1458,
7442,
2451,
7403,
2743,
2522,
4759,
5571,
3156,
352,
1451,
578
] | Test |
1,332 | 4 | Katie_Moussouris:katie moussouris katie moussouris american computer security researcher entrepreneur pioneer vulnerability disclosure best known ongoing work advocating responsible security research previously member stake created bug bounty program microsoft directly involved creating u.s. department defense first bu... | [
6412,
3932,
501,
3842,
5125,
4522,
5051,
578,
5511,
3486,
1805
] | Train |
1,333 | 8 | Apache_Nutch:apache nutch apache nutch highly extensible scalable open source web crawler software project nutch coded entirely java programming language data written language-independent formats highly modular architecture allowing developers create plug-ins media-type parsing data retrieval querying clustering fetche... | [
7238,
894,
4303,
7886,
5728,
7805,
1732,
2739,
2741,
7444,
7896,
7360,
917,
654,
5571,
3463,
3542,
3204,
1286,
2856,
6821,
5054,
840,
1392,
3031,
5408,
503,
3558,
5677,
7924,
3479,
5447,
6474,
855,
5863,
6387,
5075,
6137,
7488,
7857,
58... | Train |
1,334 | 4 | Internet_Crime_Complaint_Center:internet crime complaint center mission internet crime complaint center also known ic3 provide public reliable convenient reporting mechanism submit information federal bureau investigation fbi concerning suspected internet-facilitated criminal activity develop alliances law enforcement ... | [
2789,
3480,
1376,
6240,
5401,
1805
] | Validation |
1,335 | 3 | X86_instruction_listings:x86 instruction listings x86 instruction set refers set instructions x86-compatible microprocessors support instructions usually part executable program often stored computer file executed processor x86 instruction set extended several times introducing wider registers datatypes well new functi... | [
364,
6078,
719,
7533,
1465,
7541,
410,
4719,
421,
6133,
1881,
5431,
4009,
6498,
6865,
2989,
5107,
6171,
6523,
3020,
4077,
6563,
8033,
3747,
2351,
5190,
2000,
4845,
6969,
3442,
6616,
8077,
2744,
584,
6291,
6647,
5245,
3137,
4542,
6675,
2... | Test |
1,336 | 9 | Simulink:simulink simulink developed mathworks graphical programming environment modeling simulating analyzing multidomain dynamical systems primary interface graphical block diagramming tool customizable set block libraries offers tight integration rest matlab environment either drive matlab scripted simulink widely u... | [
1908,
5363,
7516,
4759,
5117,
6527,
5571,
2659,
4504,
5397,
578,
4336,
1569,
7557,
2866,
7664,
3148,
7860,
2524,
1989,
7777,
1435
] | Test |
1,337 | 4 | Security_breach_notification_laws:security breach notification laws security breach notification laws data breach notification laws laws require entity subject data breach notify customers parties breach take steps remediate injuries caused breach laws irregularly enacted 50 u.s. states since 2002 last 3 states privacy... | [
860,
7836
] | Test |
1,338 | 3 | Cobra_Command_(1984_video_game):cobra command 1984 video game cobra command known japan interactive movie game originally released data east 1984 laserdisc-based coin-operated arcade game terrorists threatening free world amassed diabolical force brave pilot cobra command vanquish terrorist threat save free world total... | [
1714,
1946
] | Test |
1,339 | 9 | Relocation_(computing):relocation computing relocation process assigning load addresses position-dependent code data program adjusting code data reflect assigned addresses prior advent multiprocess systems still many embedded systems addresses objects absolute starting known location often zero since multiprocessing sy... | [
1616,
6249,
4662,
1254,
4843,
7611,
8066,
7804,
4942,
1361,
4779,
126,
3870,
3635,
2403,
1198,
7096,
1857,
3210,
3214,
3557,
4889,
6380,
757,
2418,
4810,
1495,
336,
5606,
1236,
1894,
1989,
1992,
5190,
2084
] | Test |
1,340 | 4 | Locky:locky locky ransomware malware released 2016 delivered email allegedly invoice requiring payment attached microsoft word document contains malicious macros user opens document appears full garbage includes phrase enable macro data encoding incorrect social engineering technique user enable macros save run binary ... | [
5452,
1482,
91,
2451,
1766,
3561,
1376,
376,
2733,
88,
744
] | Test |
1,341 | 2 | Samuel_J_Leffler:samuel j leffler samuel j leffler computer scientist known extensive work bsd 1980s freebsd present day among projects created flexfax libtiff freebsd wireless device drivers design implementation series books co-authored working computer systems research group csrg uc berkeley university california be... | [
4295,
7514,
6794,
6085,
732,
738,
3636,
2583,
5760,
3986,
5065,
6477,
424,
6489,
6149,
6860,
443,
6505,
1523,
1547,
481,
2300,
1193,
4059,
8001,
6918,
6211,
4806,
4441,
5865,
6583,
8037,
875,
1254,
191,
908,
4498,
7355,
3457,
1279,
6278... | Test |
1,342 | 4 | Forward_anonymity:forward anonymity forward anonymity analogous forward secrecy computer security cryptography property prevents attacker recorded past communications discovering identities participants even fact speaking forward secrecy system designers attempt prevent attacker recorded past communications discovering... | [
1353,
1805,
354
] | Test |
1,343 | 4 | ZmEu_(vulnerability_scanner):zmeu vulnerability scanner zmeu computer vulnerability scanner searches web servers open attack phpmyadmin program apparently named zmeu dragon-like romanian folklore | [
7214,
3652
] | Validation |
1,344 | 4 | Global_surveillance:global surveillance global surveillance refers mass surveillance entire populations across national borders roots traced back middle 20th century ukusa agreement jointly enacted united kingdom united states later expanded canada australia new zealand create present five eyes alliance alliance develo... | [
1998,
6788,
1344,
2548,
803,
2637,
2727,
1353,
6419,
6974,
7346,
6092,
1544,
820,
6438,
1278,
7646,
740,
3639,
5412,
147,
5509,
6756,
5689,
2343,
1505,
74,
2794,
3241,
4014
] | Validation |
1,345 | 9 | Comparison_of_programming_languages_(list_comprehension):comparison programming languages list comprehension list comprehension syntactic construct available programming languages creating list based existing lists follows form mathematical set-builder notation set comprehension distinct use map filter functions list d... | [
2451,
4573,
1445,
4302,
6882,
7333,
109,
6428,
2740,
4053,
6277,
831,
2661,
7005,
7460,
4705,
666,
7277,
4070,
1114,
4164,
5855,
7844,
5506,
3898,
5510,
2871,
7394,
8122,
7032,
2881,
8032,
1889,
5965,
2619
] | Test |
1,346 | 3 | IBM_Blue_Gene:ibm blue gene blue gene ibm project aimed designing supercomputers reach operating speeds petaflops pflops range low power consumption project created three generations supercomputers blue gene/l blue gene/p blue gene/q blue gene systems often led top500 green500 rankings powerful power efficient supercom... | [
6597,
7327,
2719,
3348,
4661,
3936,
1075,
8163,
802,
2458,
3440,
7428,
3521,
1083,
6428,
4408,
5652,
912,
1006,
3015,
5571,
2845,
3708,
5042,
7361,
578,
5665,
4702,
1199,
1386,
1388,
7010,
7099,
1023,
4168,
234,
2501,
239,
1494,
6474,
1... | Test |
1,347 | 4 | Holistic_Information_Security_Practitioner:holistic information security practitioner holistic information security practitioner certification course integration course provides practical education integration best practices information security management information systems auditing multiple regulatory compliance req... | [
3609
] | Test |
1,348 | 9 | Benjamin_C._Pierce:benjamin c. pierce benjamin crawford pierce henry salvatori professor computer science university pennsylvania pierce joined penn 1998 indiana university held research positions university cambridge university edinburgh received ph.d. carnegie mellon university 1991 research includes work programming... | [
5801,
7152,
5224,
260,
3895,
5397,
1243,
6911,
7005,
3225
] | Test |
1,349 | 8 | Monkey_HTTP_Server:monkey http server monkey http server optimized web server linux designed achieve high performance high loads making linux kernel terms specific system calls optimization techniques http/1.1 compliant rfc 2616 supports common features ipv6 tls virtual hosts cgi fastcgi directory listing security rule... | [
3168,
5369,
5206,
5820,
5214,
2646,
6270,
1834,
2291,
4496,
8182,
6536,
26,
5571,
7544,
7988,
578,
4701,
1392,
7786,
417,
3135,
2506,
1686,
3408,
1602,
352,
6061,
7411,
7952,
1435,
2807
] | Test |
1,350 | 1 | National_Security_Database:national security database national security database official accreditation program india awarded information security experts deemed credible trustworthy proven skills protect national critical infrastructure economy country program developed 'information sharing analysis center isac jointl... | [
4521
] | Test |
1,351 | 2 | Alexandre_Oliva:alexandre oliva alexandre alex oliva brazilian free software activist developer founding member free software foundation latin america fsfla currently on-hold phd studies institute computing state university campinas brazil whilst working compiler engineer red hat contributing gcc compiler maintainer li... | [
707,
3938,
1822,
2559,
5757,
7559,
3981,
5759,
412,
761,
2599,
7587,
5787,
2260,
4020,
1523,
2985,
6876,
462,
4401,
5829,
1192,
1563,
4070,
4435,
2689,
3404,
5515,
2698,
6586,
3084,
1637,
6981,
3780,
4872,
578,
7740,
589,
3133,
6674,
96... | Test |
1,352 | 6 | KGB_Archiver:kgb archiver kgb archiver discontinued file archiver data compression utility employs paq6 compression algorithm written visual c++ tomasz pawlak kgb archiver designed achieve high compression ratio ten levels compression weak maximum however higher compression levels time required compress file increases ... | [
4213,
1254,
7058,
985,
4759,
6992,
1471,
5571,
658,
4700,
7555,
1955,
7746,
3032,
2589,
7201,
7387,
3219,
510,
8126,
1127,
2334,
6940,
4732,
5256,
7584,
3152,
169,
1139,
5349,
4461,
2897,
619
] | Test |
1,353 | 4 | Cryptanalysis:cryptanalysis cryptanalysis greek kryptós hidden analýein loosen untie study analyzing information systems order study hidden aspects systems cryptanalysis used breach cryptographic security systems gain access contents encrypted messages even cryptographic key unknown addition mathematical analysis crypt... | [
358,
1811,
715,
1821,
1455,
2918,
7534,
2566,
7548,
5398,
1480,
7200,
4349,
7567,
5765,
7207,
762,
5773,
7209,
5776,
4730,
429,
6488,
433,
3335,
1146,
4746,
5796,
3350,
803,
464,
807,
119,
122,
3718,
4805,
147,
2325,
1587,
1592,
161,
... | Test |
1,354 | 4 | Application-level_gateway:application-level gateway context computer networking application-level gateway also known alg application layer gateway application gateway application proxy application-level proxy consists security component augments firewall nat employed computer network allows customized nat traversal fil... | [
6531,
2885,
4577,
4759,
2681,
3945,
3338,
4172,
5790,
7170
] | Validation |
1,355 | 8 | Deep_linking:deep linking context world wide web deep linking use hyperlink links specific generally searchable indexed piece web content website e.g nowiki http //example.com/path/page /nowiki rather website home page e.g. nowiki http //example.com /nowiki url contains information needed point particular item case exa... | [
1411,
2086,
4519,
1235,
4668,
80,
84,
3092,
87,
3383,
3999
] | Test |
1,356 | 4 | Ben_Laurie:ben laurie ben laurie software engineer protocol designer cryptographer founding director apache software foundation core team member openssl member shmoo group director open rights group director security bunker secure hosting trustee founder-member freebmd visiting fellow cambridge university computer labo... | [
1523,
794,
1341,
1254,
7514,
6795,
191,
6711,
1547,
2923,
4498,
7355,
208,
481,
3457,
732,
2300,
6278,
8194,
8096,
1193,
1013,
3636,
4059,
8001,
6918,
5760,
3476,
6211,
3986,
4806,
5065,
594,
4441,
5865,
4534,
6477,
617,
424,
2512,
5250... | Test |
1,357 | 7 | Hosted_desktop:hosted desktop hosted desktop product set within larger cloud-computing sphere generally delivered using combination technologies including hardware virtualization form remote connection software citrix xenapp microsoft remote desktop services two common processing takes place within provider datacentre ... | [
7820,
2961,
3756
] | Test |
1,358 | 4 | Call_blocking:call blocking call blocking also known call block call screening call rejection allows telephone subscriber block incoming calls specific telephone numbers feature may require additional payment subscriber telephone company third-party call blocking desired individuals wish block unwanted phone calls gene... | [
3759,
7813,
740
] | Validation |
1,359 | 1 | XtraDB:xtradb percona xtradb storage engine mariadb percona server databases intended drop-in replacement innodb one default engines available mysql database 10.1 mariadb mariadb server used percona xtradb default storage engine mariadb 10.2 innodb engine default xtradb xtradb incorporates innodb acid-compliant design ... | [
7957,
5717,
7248,
5126,
5571,
6279,
4708,
4167,
3652,
6755,
4363,
5780,
6056,
3915,
1695,
2259,
3244,
7598
] | Test |
1,360 | 9 | MEX_file:mex file mex file type computer file provides interface matlab octave functions written c c++ fortran stands matlab executable compiled mex files dynamically loaded allow external functions invoked within matlab octave built-in functions support development mex files matlab octave offer external interface func... | [
1710,
3981,
2803,
1435,
5117
] | Test |
1,361 | 9 | Compiler:compiler compiler computer program translates computer code written one programming language source language another programming language target language name compiler primarily used programs translate source code high-level programming language lower level language e.g. assembly language object code machine c... | [
1445,
1446,
5734,
1463,
2929,
1478,
35,
5757,
5771,
74,
5784,
90,
1520,
95,
7251,
1556,
1557,
5846,
7277,
144,
1579,
149,
152,
154,
7298,
4447,
162,
1598,
5883,
3069,
1616,
184,
213,
4504,
5932,
218,
4512,
7375,
7382,
7383,
5946,
5947... | Test |
1,362 | 9 | CGOL:cgol cgol pronounced see goll alternative syntax featuring extensible algebraic notation lisp programming language designed maclisp vaughan pratt subsequently ported common lisp notation cgol traditional algebraic notation sometimes called infix notation style algol rather lisp traditional uniformly-parenthesized ... | [
6507,
4543,
1445
] | Test |
1,363 | 4 | Dangling_pointer:dangling pointer dangling pointers wild pointers computer programming pointers point valid object appropriate type special cases memory safety violations generally dangling references wild references references resolve valid destination include phenomena link rot internet dangling pointers arise object... | [
1616,
2540,
3932,
549,
3351,
7333,
3515,
8066,
8174,
379,
2736,
7530,
2289,
4950,
572,
573,
1191,
3875,
1855,
1019,
6118,
749,
2318,
1208,
5948,
3726,
4347,
5506,
3566,
4810,
7391,
56,
1584,
6567,
3225,
858,
2337,
2153,
5353,
1435,
4920... | Test |
1,364 | 5 | Plesiochronous_digital_hierarchy:plesiochronous digital hierarchy plesiochronous digital hierarchy pdh technology used telecommunications networks transport large quantities data digital transport equipment fibre optic microwave radio systems term plesiochronous derived greek plēsios meaning near chronos time refers fa... | [
585,
6871,
7916,
4101,
2236,
3597,
5492,
1543,
1709
] | Test |
1,365 | 9 | Extended_Backus–Naur_form:extended backus–naur form computer science extended backus-naur form ebnf family metasyntax notations used express context-free grammar ebnf used make formal description formal language computer programming language extensions basic backus–naur form bnf metasyntax notation earliest ebnf develo... | [
7375,
3030,
4543,
1157,
6311,
5948,
5424,
6882,
764
] | Train |
1,366 | 4 | Boris_Loza:boris loza boris loza may 5 1960 founder safepatrol solutions tego systems well certified information systems security professional cissp born krasnodar russia attained masters degree age 22 phd age 26 computer science cybernetics still living former ussr loza published 30 scientific articles well secured on... | [
6004,
6046
] | Validation |
1,367 | 5 | Growl_(software):growl software growl global notification system pop-up notification implementation mac os x windows operating systems applications use growl display small notifications events may important user software allows users fully control notifications allowing application developers spend less time creating n... | [
5983,
7975,
6428,
5571,
1435,
486,
499,
6295,
4975,
3564,
5535,
5965,
7692,
445
] | Test |
1,368 | 4 | Identity-based_security:identity-based security identity-based security approach control access digital product service based authenticated identity individual allows organizations grant access specific users access variety digital services using credentials ensuring accurate match users entitled actually receive also ... | [
2489,
3884,
651,
3411,
2566,
4304,
3923,
3794,
1805,
6305
] | Test |
1,369 | 5 | TOC_protocol:toc protocol toc protocol talk oscar protocol protocol used third-party aol instant messenger clients several clients aol produced sometime near august 19 2005 aol discontinued support protocol longer uses instant messaging clients actively maintains windows mac clients aol instant messenger icq systems ho... | [
7148,
2450,
3172,
7967,
2555,
2284,
7170,
2201,
6624,
6629,
486,
1014,
4887,
1958,
1210,
2048,
2600,
3050,
2880,
4634,
6668,
5535
] | Test |
1,370 | 9 | POP-11:pop-11 pop-11 reflective incrementally compiled programming language many features interpreted language core language poplog programming environment developed originally university sussex recently school computer science university birmingham hosts poplog website pop-11 evolution language pop-2 developed edinbur... | [
4543,
1445,
3772,
4039,
1990
] | Test |
1,371 | 1 | History_of_Microsoft_SQL_Server:history microsoft sql server history microsoft sql server begins first microsoft sql server product sql server 1.0 16-bit server os/2 operating system 1989 extends current day june 12th 1988 microsoft joined ashton-tate sybase create variant sybase sql server ibm os/2 developed jointly m... | [
187,
6256,
895,
3849,
7715,
7071,
6986,
2924,
7080,
4697,
5055,
2226,
6462,
1670,
53,
941,
4985,
2702,
4739,
5617,
4743
] | Test |
1,372 | 4 | Tribe_Flood_Network:tribe flood network tribe flood network tfn set computer programs conduct various ddos attacks icmp flood syn flood udp flood smurf attack first tfn initiated attacks described cert incident note 99-04 tfn2k written mixter security professional hacker based germany | [
1412,
6459,
1691,
5125,
578,
3175,
5571,
1404,
1435
] | Train |
1,373 | 4 | Relying_party:relying party relying party rp computer term used refer server providing access secure software application claims-based applications claim statement entity makes order establish access also called relying party rp applications rps also called “ claims aware applications ” “ claims-based applications ” we... | [
5702,
6143
] | Test |
1,374 | 5 | Multiplexer:multiplexer electronics multiplexer mux device selects several analog digital input signals forwards single output line multiplexer formula_1 inputs formula_2 select lines used select input line send output multiplexers mainly used increase amount data sent network within certain amount time bandwidth multi... | [
5012,
1447,
5371,
3948,
7527,
7529,
5737,
4318,
2567,
7543,
4694,
5042,
1481,
5055,
2226,
1867,
7569,
416,
1127,
2248,
6148,
441,
2266,
453,
4392,
4047,
5483,
1556,
2659,
5487,
6198,
1568,
1570,
3724,
6922,
3731,
7666,
515,
8024,
5521,
... | Test |
1,375 | 5 | Orbital_angular_momentum_multiplexing:orbital angular momentum multiplexing orbital angular momentum oam multiplexing physical layer method multiplexing signals carried electromagnetic waves using orbital angular momentum electromagnetic waves distinguish different orthogonal signals orbital angular momentum one two fo... | [
1443,
3956,
5387,
7824,
2117,
740,
320,
4970,
8108,
3724,
6468,
84,
768,
2880,
5175,
1142,
1988
] | Test |
1,376 | 4 | Ransomware:ransomware ransomware type malware cryptovirology threatens publish victim data perpetually block access unless ransom paid simple ransomware may lock system way difficult knowledgeable person reverse advanced malware uses technique called cryptoviral extortion encrypts victim files making inaccessible deman... | [
704,
2173,
3932,
7151,
6417,
6419,
1821,
2912,
376,
1456,
1461,
2923,
3277,
2566,
1847,
7186,
2577,
5401,
744,
6823,
2587,
7571,
1123,
6844,
3323,
5779,
74,
3338,
7600,
3680,
3681,
88,
5452,
91,
4025,
6505,
6511,
5099,
1528,
5808,
6515,... | Test |
1,377 | 2 | OFono:ofono ofono free software project mobile telephony gsm/umts applications built 3gpp standards uses high-level d-bus api use telephony applications ofono free software released terms gnu general public license v2 ofono jointly announced linux intel nokia nokia since shipped ofono meego-based n9 meego project ended... | [
2182,
3262,
3613,
7528,
7532,
4685,
6440,
5744,
6443,
742,
4341,
5762,
6133,
3666,
1904,
5453,
7242,
1535,
1924,
6892,
1176,
1933,
496,
1202,
1208,
6211,
5865,
7669,
2332,
520,
1227,
1596,
6945,
165,
7312,
1607,
5884,
1991,
4840,
3082,
... | Test |
1,378 | 9 | Instance_variable:instance variable object-oriented programming classes instance variable variable defined class i.e member variable instantiated object class separate copy instance instance variable similar class variable instance variable variable declared class outside constructor method/function instance variables ... | [
1437,
8106,
3169,
1420,
4151,
1803,
6428,
4425
] | Test |
1,379 | 3 | Gran_Turismo_official_steering_wheel:gran turismo official steering wheel gran turismo official steering wheels gt force driving force see trademark symbols difference series steering wheels designed logitech a.k.a logicool japan collaboration polyphony digital racing games controllers designed used playstation 2 plays... | [
3304,
3704,
4011
] | Train |
1,380 | 4 | National_White_Collar_Crime_Center:national white collar crime center national white collar crime center also known nw3c congressionally funded non-profit corporation trains state local law enforcement agencies combat emerging economic cyber crime problems nw3c provides general public information research preventing ec... | [
3480,
4523,
3179,
1805
] | Test |
1,381 | 9 | John_Backus:john backus john warner backus december 3 1924 – march 17 2007 american computer scientist directed team invented implemented fortran first widely used high-level programming language inventor backus–naur form bnf widely used notation define formal language syntax later research function-level programming p... | [
3166,
7707,
4929,
1361,
1270,
4864,
1549,
3630,
1746,
1381,
6367,
3470,
7009,
7375,
43,
1114,
3895,
1774,
3570,
1308,
5424,
7489,
6485,
4543,
7863,
1600,
5784,
1892,
5703,
6146,
6497,
6778,
2803,
5621,
360
] | Test |
1,382 | 6 | Encrypting_File_System:encrypting file system encrypting file system efs microsoft windows feature introduced version 3.0 ntfs provides filesystem-level encryption technology enables files transparently encrypted protect confidential data attackers physical access computer efs available versions windows developed busin... | [
3599,
7879,
1812,
3937,
2547,
3263,
7161,
4672,
6088,
378,
2198,
6431,
6096,
3626,
2566,
1475,
5049,
7553,
6458,
6117,
7195,
5410,
7564,
2953,
759,
422,
5773,
6844,
1130,
2245,
6488,
6854,
5437,
435,
1140,
5440,
5442,
4014,
4375,
4377,
... | Test |
1,383 | 7 | Gameover_ZeuS:gameover zeus gameover zeus peer-to-peer botnet based components earlier zeus trojan malware created evgeniy mikhailovich bogachev russia believed spread use cutwail botnet unlike predecessor zeus trojan gameover zeus uses encrypted peer-to-peer communication system communicate nodes command control serve... | [
704,
3932,
2912,
376,
3277,
2923,
3281,
7186,
1482,
2587,
3323,
5779,
7600,
4025,
1528,
2991,
1173,
6526,
6904,
6541,
6194,
7657,
2678,
3038,
3047,
6569,
2693,
862,
7307,
6589,
5187,
1996,
7328,
2733,
208,
2021,
5922,
6628,
924,
4531,
6... | Validation |
1,384 | 4 | Co-managed_Security:co-managed security co-managed security service model entails security monitoring event correlation incident response system tuning compliance support across organization entire environment co-management allows organizations collaborate service providers blending security expertise provider contextu... | [
8123,
7111
] | Test |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.