node_id
int64
0
76.9k
label
int64
0
39
text
stringlengths
13
124k
neighbors
listlengths
0
3.32k
mask
stringclasses
4 values
1,385
3
Compaq_Presario_M2000:compaq presario m2000 many models compaq presario m2000 ran intel celeron processor although also made amd turion 64 amd mobile sempron processors hard drive 40 gb 5400 rpm br display 15 glare type lcd br processor intel celeron 1.4 ghz amd turion ml-28 1.6ghz amd sempron br os provided windows xp...
[ 4736 ]
Test
1,386
3
PowerPC_e5500:powerpc e5500 powerpc e5500 64-bit power isa-based microprocessor core freescale semiconductor core implements core power isa v.2.06 hypervisor support altivec four issue seven-stage out-of-order pipeline double precision fpu three integer units 32/32 kb data instruction l1 caches 512 kb private l2 cache ...
[ 5097, 2719, 3348, 4661, 3936, 1075, 1346, 4847, 4479, 2458, 3440, 5100, 1454, 1083, 4408, 5652, 912, 5737, 7361, 2845, 3708, 7905, 7990, 5665, 6111, 4702, 1199, 1388, 7654, 7099, 2133, 234, 2501, 239, 6474, 2781, 8125, 4815, 2785, 7327, ...
Test
1,387
3
Fruity_Frank:fruity frank fruity frank 1984 computer game amstrad cpc msx home computers produced kuma software authored steve wallis graphics brother sean wallis gameplay similar mr though story involves frank protecting garden invading monsters player collect fruits lying around garden avoiding touching monsters appl...
[ 7944 ]
Test
1,388
3
Power_Processing_Element:power processing element power processing unit ppu 64-bit dual-threaded in-order powerpc 2.02 microprocessor core designed ibm use primarily game consoles playstation 3 xbox 360 also found applications high performance computing supercomputers record setting ibm roadrunner instances ppu joined ...
[ 6597, 450, 7327, 2719, 3348, 3936, 1075, 1346, 4847, 2458, 1083, 7442, 4408, 5652, 912, 5737, 7361, 2845, 3708, 5042, 7453, 4242, 5665, 1199, 1386, 7099, 1023, 2139, 4718, 2501, 239, 6474, 602, 763, 515, 2601, 2873, 4815, 8125, 1131, 62...
Test
1,389
9
Dc_(computer_program):dc computer program dc desk calculator cross-platform reverse-polish calculator supports arbitrary-precision arithmetic one oldest unix utilities predating even invention c programming language like utilities vintage powerful set features terse syntax traditionally bc calculator program infix nota...
[ 361, 6789, 2817, 1537, 5480, 3106, 578, 923, 5138, 667, 5946, 2589, 5503, 6470, 4447, 3915, 3417, 6404, 4283, 1435, 4020 ]
Train
1,390
1
Cdb_(software):cdb software cdb short constant database refers library data format created daniel j. bernstein cdb acts on-disk associative array mapping keys values allows multiple values stored single key constant database allows two operations creation reading operations designed fast highly reliable since database ...
[ 1710, 1989, 2054, 1105, 3818 ]
Test
1,391
3
Disk_mirroring:disk mirroring data storage disk mirroring replication logical disk volumes onto separate physical hard disks real time ensure continuous availability commonly used raid 1 mirrored volume complete logical representation separate volume copies disaster recovery context mirroring data long distance referre...
[ 980, 5012, 1254, 7242, 6892, 2390, 7822, 6117, 1394, 5760, 6748, 3134, 2776, 5447, 1315, 6586, 4554, 4199, 6860, 1703, 2442, 6505 ]
Test
1,392
8
Apache_Karaf:apache karaf apache karaf modular open source osgi release 6 runtime environment project became top level project 2010 previously subproject apache servicemix apache karaf work top two used osgi frameworks apache felix equinox osgi providing additional features karaf container modern polymorphic container ...
[ 5369, 4303, 5728, 1834, 7896, 26, 7544, 4701, 6821, 5054, 5408, 417, 5075, 6137, 1511, 4742, 7952, 7238, 5820, 2646, 2291, 6536, 7988, 840, 3031, 5863, 3408, 5874, 1602, 894, 5206, 5214, 6270, 2741, 917, 5571, 3463, 1286, 3479, 3135, 16...
Test
1,393
4
Riskware:riskware riskware portmanteau risk software word used describe software whose installation execution poses possible yet definite risk host computer relatively normal programs often fall category riskware applications modified another purpose used computer user owner
[ 3859, 3042 ]
Test
1,394
2
Bioctl:bioctl bio 4 pseudo-device driver bioctl 8 utility implement generic raid volume management interface openbsd netbsd idea behind software similar ifconfig single utility operating system used control raid controller using generic interface instead rely plentiful proprietary custom raid management utilities speci...
[ 885, 6414, 1254, 2001, 2453, 6972, 191, 5373, 7822, 732, 5571, 6630, 8194, 2219, 1572, 1391, 6743, 6211, 6748, 7752, 3134, 5447, 3572, 1315, 4990, 1133, 5518, 2883, 1052, 6242, 1697, 6149, 1793, 8037, 4199, 1703, 1245, 2442, 1435, 6505 ]
Validation
1,395
4
VirusTotal:virustotal virustotal website created spanish security company hispasec sistemas launched june 2004 acquired google inc. september 2012 company ownership switched january 2018 chronicle subsidiary alphabet inc.. virustotal aggregates many antivirus products online scan engines check viruses user antivirus ma...
[ 2086, 5452, 91, 4115, 5807, 7425, 7617, 7522, 3357, 3096, 5914, 7809, 3859, 385, 910, 6006, 4235, 4689, 2842, 124, 3111, 5401, 496, 6644, 5144, 3123, 142, 935, 3561, 5949, 5066, 5601, 518, 6305, 1500, 3495, 5700, 6776, 6777, 2167, 88 ]
Validation
1,396
7
Open_Source_Cluster_Application_Resources:open source cluster application resources open source cluster application resources oscar linux-based software installation high-performance cluster computing oscar allows users install beowulf type high performance computing cluster
[ 2159 ]
Validation
1,397
4
Code42:code42 code42 american software company develops markets crashplan backup software services suite code42 started project create facebook-like desktop application ended focusing online storage element released crashplan 2007 company raised 52.5 million 2012 consumers use crashplan small business plan requires mon...
[ 6289, 4759, 578 ]
Test
1,398
9
Stan_(software):stan software stan probabilistic programming language statistical inference written c++ stan language used specify bayesian statistical model imperative program calculating log probability density function stan licensed new bsd license stan named honour stanislaw ulam pioneer monte carlo method stan cre...
[ 3606, 2820, 1626, 4759, 5548, 1731, 5288, 5117, 5571, 4872, 4705, 4067, 3981, 3388, 4070, 3807, 7848, 6934, 1879, 7579, 3410, 6489, 256, 3915 ]
Test
1,399
2
CopperheadOS:copperheados copperheados source-available operating system smartphones tablet computers based android mobile platform adds privacy security features official releases android open source project google goal upstreaming back android linux openbsd august 2016 copperheados announced future versions operating...
[ 3933, 5372, 6427, 1095, 2564, 5386, 5391, 740, 4340, 42, 3310, 5062, 2591, 5068, 5771, 2240, 5775, 424, 5794, 6158, 7956, 5473, 4400, 474, 6183, 822, 2300, 5486, 136, 6209, 3039, 1582, 6937, 5872, 6232, 4116, 5195, 2003, 3081, 195, 6978...
Test
1,400
9
LINC_4GL:linc 4gl linc logic information network compiler fourth-generation programming language used mostly unisys computer systems linc originally developed short-cut template two programmers reproduce automate production computer applications different companies similar requirements specifications requirements simil...
[ 4759, 7715, 6986, 1180, 1743, 7733, 578, 2866, 3990, 1785, 6497 ]
Validation
1,401
4
Let's_Encrypt:let encrypt let encrypt non-profit certificate authority run internet security research group isrg provides x.509 certificates transport layer security tls encryption charge certificate valid 90 days renewal take place time offer accompanied automated process designed overcome manual creation validation s...
[ 363, 794, 96, 6795, 993, 2291, 5824, 6006, 8189, 4783, 6540, 578, 3383, 2043, 4071, 7567, 7925, 7848, 5965, 1425, 1059, 84 ]
Test
1,402
7
Azure_Stream_Analytics:azure stream analytics microsoft azure stream analytics serverless scalable complex event processing engine microsoft enables users develop run real-time analytics multiple streams data sources devices sensors web sites social media applications users set alerts detect anomalies predict trends tr...
[ 3958, 2451, 1870 ]
Validation
1,403
4
Monitor_mode:monitor mode monitor mode rfmon radio frequency monitor mode allows computer wireless network interface controller wnic monitor traffic received wireless channel unlike promiscuous mode also used packet sniffing monitor mode allows packets captured without associate access point ad hoc network first monito...
[ 6574, 7207, 7534, 726, 588, 4759, 6211, 7220, 1284, 6220, 7029 ]
Test
1,404
4
Mixter:mixter mixter computer security specialist mixter first made transition computer underground large-scale public awareness 2000 time newspapers magazines worldwide mentioned link massively destructive effective distributed denial service ddos attacks crippled shut major websites including yahoo buy.com ebay amazo...
[ 7175, 1691, 1813, 1372, 3338, 3592, 972, 6411, 6092 ]
Test
1,405
7
FinisTerrae:finisterrae finisterrae 100th supercomputer top500 ranking november 2007 running 12.97 teraflops would rank position 258 list june 2008 also third powerful supercomputer spain marenostrum magerit located galicia project promoted xunta de galicia regional government galicia spanish national research council ...
[ 3764, 553, 5371, 5559, 4049, 4318, 3458, 5042, 578, 4154, 1481, 5939, 4159, 1023, 1295, 5947, 3041, 240, 1586, 7930, 515, 8024, 2961, 3578, 4993, 2803, 5447, 357, 2266, 5890 ]
Test
1,406
2
GNU_Guix:gnu guix gnu guix cross-platform package manager tool instantiate manage operating system unix-like operating systems based nix package manager guile scheme apis specializes providing exclusively free software differing traditional package managers guix like nix utilizes purely functional deployment model soft...
[ 707, 5017, 5726, 4675, 6428, 2559, 5386, 2581, 5757, 7555, 7559, 3981, 2594, 761, 2599, 7587, 1893, 5787, 781, 7954, 5092, 4020, 1523, 2985, 6876, 4759, 7619, 7251, 474, 3366, 4778, 1941, 1563, 4059, 4070, 6209, 3036, 1582, 4441, 5515, ...
Test
1,407
9
Visitor_pattern:visitor pattern object-oriented programming software engineering visitor design pattern way separating algorithm object structure operates practical result separation ability add new operations existing object structures without modifying structures one way follow open/closed principle essence visitor a...
[ 2176, 2451, 2986, 5014, 3686, 6415, 4031, 1445, 6886, 2638, 2827, 1730, 5650, 1554, 5751, 6025, 231, 7924, 5091, 235, 3396, 7391, 517, 6224, 2961, 5965, 1803 ]
Validation
1,408
3
Self-stabilization:self-stabilization self-stabilization concept fault-tolerance distributed computing distributed system self-stabilizing end correct state matter state initialized correct state reached finite number execution steps first glance guarantee self stabilization may seem less promising traditional fault-to...
[ 4469, 1114, 1600, 6748, 6466, 7863, 3895, 8137, 4812, 4651, 2667, 5424 ]
Test
1,409
4
XACML:xacml xacml stands extensible access control markup language standard defines declarative fine-grained attribute-based access control policy language architecture processing model describing evaluate access requests according rules defined policies published standard specification one goals xacml promote common t...
[ 6507, 1998, 5111, 4770, 1935, 302, 1760, 3884, 5500, 5149, 751, 7565, 8137, 3498 ]
Test
1,410
4
Isyvmon:isyvmon isyvmon computer system network monitoring software application system created it-cube systems designed monitor track status various applications network services servers network hardware isyvmon based open source software nagios centreon licensed gnu gpl v3 special features development isyvmon „ full d...
[ 3915, 5571 ]
Test
1,411
8
Hypervideo:hypervideo hypervideo hyperlinked video displayed video stream contains embedded interactive anchors allowing navigation video hypermedia elements hypervideo thus analogous hypertext allows reader click word one document retrieve information another document another place document hypervideo combines video n...
[ 2086, 3935, 2528, 84, 1355, 5355, 3999, 3383, 5375 ]
Validation
1,412
4
Trinoo:trinoo trinoo trin00 set computer programs conduct ddos attack believed trinoo networks set thousands systems internet compromised remote buffer overrun exploits first suspected trinoo attacks described cert incident note 99-04 trinoo network connected february 2000 distributed denial service attack yahoo websit...
[ 6459, 1691, 5125, 1372, 5571, 6015, 578, 1435, 4966, 6092 ]
Test
1,413
4
Exit_control_lock:exit control lock exit control lock also known exit control device exit lock simply exit control prevents deters unauthorized exit exit control locks often used retail establishments deter shoplifting also used airports controlled areas people held clear customs quarantine stations exit control locks ...
[ 874 ]
Train
1,414
1
Second_normal_form:second normal form second normal form 2nf normal form used database normalization 2nf originally defined e.f. codd 1971 relation second normal form fulfills following two requirements 2 non-prime attribute functionally dependent proper subset candidate key relation non-prime attribute relation attrib...
[ 4046, 4048, 4888, 1415, 1416, 1417, 2124 ]
Test
1,415
1
Third_normal_form:third normal form third normal form 3nf normal form used normalizing database design reduce duplication data ensure referential integrity ensuring 1 entity second normal form 2 non-prime non-key attribute transitively dependent key i.e non-prime attribute depends non-prime attributes non-prime attribu...
[ 4046, 4048, 5778, 1414, 4888, 4950, 1416, 1417, 655, 2054, 7205, 2124 ]
Test
1,416
1
Fourth_normal_form:fourth normal form fourth normal form 4nf normal form used database normalization introduced ronald fagin 1977 4nf next level normalization boyce–codd normal form bcnf whereas second third boyce–codd normal forms concerned functional dependencies 4nf concerned general type dependency known multivalue...
[ 4046, 4048, 1414, 4888, 1415, 1417, 2124 ]
Test
1,417
1
First_normal_form:first normal form first normal form 1nf property relation relational database relation first normal form domain attribute contains atomic indivisible values value attribute contains single value domain first definition term 1971 conference paper edgar codd defined relation first normal form none domai...
[ 4046, 4048, 1414, 4888, 1415, 1416, 6462, 6543, 7205, 2124 ]
Test
1,418
2
Security_and_safety_features_new_to_Windows_Vista:security safety features new windows vista number security safety features new windows vista available prior microsoft windows operating system release beginning early 2002 microsoft announcement trustworthy computing initiative great deal work gone making windows vista...
[ 4022, 363, 4759, 2380, 2999, 2644, 644, 5378, 1460, 6618, 6986, 6991, 1097, 5571, 7451, 5747, 3293, 3794, 1382, 5401, 6823, 1019, 5850, 7564, 7567, 4261, 2326, 8118, 7209, 7120, 6575, 522, 2791, 432, 5607, 435, 5880, 7688, 5440, 4836, 6...
Test
1,419
2
Citrus_Project:citrus project citrus comprehensive i18n framework towards respectable unix systems project aims implement complete multilingual programming environment bsd-based operating systems goals include creation following things freebsd netbsd openbsd bsd/os dragonfly bsd aim reach level functionality solaris 7
[ 3838, 5571, 3756, 1435, 6367 ]
Validation
1,420
9
Class_variable:class variable object-oriented programming classes class variable variable declared codice_1 modifier single copy exists regardless many instances class exist note java terms field variable used interchangeably class variable instance variable special type class attribute class property field data member...
[ 1437, 1378, 5510, 1803, 6428, 4425 ]
Test
1,421
4
IEC_60870-6:iec 60870-6 iec 60870 part 6 one iec 60870 set standards define systems used telecontrol supervisory control data acquisition electrical engineering power system automation applications iec technical committee 57 working group 03 developed part 6 provide communication profile sending basic telecontrol messa...
[ 2877, 1774, 7876, 1484, 3078, 6208, 2566, 6172, 3794, 38 ]
Validation
1,422
1
Digital_Scriptorium:digital scriptorium digital scriptorium ds non-profit tax-exempt consortium american libraries collections pre-modern manuscripts manuscripts made tradition books printing ds database represents manuscript collections web-based union catalog teaching scholarly research medieval renaissance studies p...
[ 5252 ]
Test
1,423
3
Survivor_(1987_video_game):survivor 1987 video game survivor action game released 1987 spanish software house topo soft later re-released uk u.s. gold published several 8-bit formats including amstrad cpc msx zx spectrum player takes control alien bears striking resemblance race aliens alien series films aboard huge sp...
[]
Test
1,424
4
Computer_Underground_Digest:computer underground digest computer underground digest cud weekly online newsletter early internet cultural social legal issues published gordon meyer jim thomas march 1990 march 2000 meyer thomas criminal justice professors northern illinois university intended newsletter cover topical soc...
[ 3486, 84 ]
Test
1,425
4
Internet_Security_Research_Group:internet security research group internet security research group isrg californian public-benefit corporation focuses internet security let encrypt—its first major initiative—aims make transport layer security tls certificates available free automated fashion josh aas serves group execu...
[ 2789, 363, 4071, 4783, 1401 ]
Test
1,426
2
UNIX/32V:unix/32v unix/32v early version unix operating system bell laboratories released june 1979 32v direct port seventh edition unix dec vax architecture 32v unix primarily run dec pdp-11 computers bell labs group developed operating system dissatisfied dec members refused dec offer buy vax machine announced 1977 a...
[ 361, 4751, 4478, 4670, 8066, 1824, 900, 2467, 6267, 908, 5216, 2294, 5571, 2300, 2118, 6360, 578, 6367, 6470, 1493, 8117, 4447, 6577, 6583, 5348, 443, 1435 ]
Test
1,427
3
Linux_kernel_mailing_list:linux kernel mailing list linux kernel mailing list lkml main electronic mailing list linux kernel development majority announcements discussions debates flame wars kernel take place many mailing lists exist discuss different subsystems ports linux kernel lkml principal communication channel a...
[ 3256, 4295, 2182, 3613, 7528, 7532, 2559, 5744, 6443, 2942, 7555, 6117, 4341, 5762, 412, 415, 3666, 5783, 2970, 7956, 5453, 5803, 4387, 5460, 7242, 1535, 1924, 6892, 1176, 1933, 5829, 1208, 6211, 4435, 5865, 7669, 3404, 1227, 1596, 165, ...
Test
1,428
3
Compaq_Presario_2700:compaq presario 2700 presario 2700 series series laptop models released compaq computer corporation specific models series include presario 2700us 2701us 2710us presario 2700us released september 2001 featured intel pentium iii 256mb ram default upgradeable 1024mb 2700us also featured maximum scree...
[ 4736 ]
Test
1,429
9
Java_Platform_Module_System:java platform module system java platform module system specifies distribution format collections java code associated resources also specifies repository storing collections modules identifies discovered loaded checked integrity includes features namespaces aim fixing shortcomings existing ...
[ 5655 ]
Test
1,430
3
XCore_Architecture:xcore architecture xcore architecture 32-bit risc microprocessor architecture designed xmos architecture designed used multi-core processors embedded systems xcore executes eight concurrent threads thread register set architecture directly supports inter-thread inter-core communication various forms ...
[ 5893, 895, 6177, 6982, 3531, 4408, 7541, 3014, 1556, 2929, 7453, 5055, 4251, 2130, 2226, 6922, 1772, 5614, 6236, 7412, 534, 971, 2443 ]
Validation
1,431
7
Meta-scheduling:meta-scheduling meta-scheduling super scheduling computer software technique optimizing computational workloads combining organization multiple distributed resource managers single aggregated view allowing batch jobs directed best location execution meta-scheduling technique solution scheduling set depe...
[ 72, 2651, 5604, 1256 ]
Test
1,432
3
Processor_Control_Region:processor control region processor control region pcr windows kernel mode data structure contains information current processor accessed via fs segment register x86 versions gs segment register x64 versions respectively windows pcr known kpcr contains information current processor pcr contains ...
[ 1237, 4759, 1248 ]
Test
1,433
9
SystemBuilder/SB+:systembuilder/sb+ systembuilder 4gl development runtime environment originally written pick family computer databases/environments part rocket u2 software suite systembuilder environment comprises sb+ server often running rocket u2 database sbclient runs microsoft windows desktop application product r...
[ 4798, 2866, 4759, 5810 ]
Test
1,434
2
Dnotify:dnotify dnotify file system event monitor linux kernel one subfeatures fcntl call introduced 2.4 kernel series obsoleted inotify retained compatibility reasons function essentially extension filesystems notice changes filesystem report changes applications instead application checking changes filesystem applica...
[ 3256, 2182, 3613, 7528, 7532, 5744, 6443, 2942, 6117, 4341, 5762, 412, 415, 3666, 2970, 7956, 5453, 5460, 7242, 6883, 1535, 1924, 6892, 1176, 1933, 5829, 1208, 6211, 4435, 5865, 7669, 3404, 1227, 1596, 165, 7312, 1607, 5884, 1991, 890, ...
Test
1,435
9
C_(programming_language):c programming language c letter c general-purpose procedural computer programming language supporting structured programming lexical variable scope recursion static type system prevents unintended operations design c provides constructs map efficiently typical machine instructions found lasting...
[ 4291, 5, 4296, 1445, 4302, 1447, 5731, 4315, 4316, 7171, 7172, 1474, 7182, 1477, 2934, 1478, 4332, 2942, 5757, 4340, 42, 1484, 7199, 7201, 53, 1493, 5771, 5775, 4361, 7213, 4366, 5782, 74, 7218, 2969, 5784, 5786, 5787, 80, 7223, 1512, ...
Test
1,436
2
U-Prove:u-prove u-prove microsoft technology user-centric identity management underlying cryptographic protocols designed dr. stefan brands developed credentica subsequently microsoft u-prove enables application developers reconcile seemingly conflicting security privacy objectives including anonymity allows digital id...
[ 2489, 6489, 1805 ]
Test
1,437
9
Member_variable:member variable object-oriented programming member variable sometimes called member field variable associated specific object accessible methods member functions class-based languages distinguished two types one copy variable shared instances class called class variable static member variable instance c...
[ 790, 6029, 8106, 5608, 1420, 1378, 5510, 7460, 1803 ]
Test
1,438
3
Snapshot_(computer_storage):snapshot computer storage computer systems snapshot state system particular point time term coined analogy photography refer actual copy state system capability provided certain systems full backup large data set may take long time complete multi-tasking multi-user systems may writes data ba...
[ 3599, 5894, 1254, 890, 1534, 5809, 3519, 5022, 6892, 6505, 2390, 5571, 831, 1281, 578, 7738, 7743, 6117, 7379, 3134, 1680, 517, 3144, 1132, 1047, 7581, 2885, 869, 6860, 8146, 5890 ]
Test
1,439
7
Beeline_(software_company):beeline software company beeline software-as-a-service company dealing solutions sourcing managing extended workforce company ranks among largest vendor management system vms providers terms total temp/contract spend outsourced spend staffing industry analysts 2017 vms markets development sum...
[ 330 ]
Test
1,440
4
MD5CRK:md5crk cryptography md5crk distributed effort similar distributed.net launched jean-luc cooke company certainkey cryptosystems demonstrate md5 message digest algorithm insecure finding collision — two messages produce md5 hash project went live march 1 2004 project ended august 24 2004 researchers independently ...
[ 2325 ]
Test
1,441
0
Index_Translationum:index translationum index translationum unesco database book translations books translated thousands years central record fact league nations established record translations 1932 1946 united nations superseded league unesco assigned index 1979 records computerised since index counts translations ind...
[ 5008, 2054 ]
Test
1,442
2
Tim_Paterson:tim paterson tim paterson born 1956 american computer programmer best known creating 86-dos operating system intel 8086 system emulated application programming interface api cp/m created gary kildall 86-dos later formed basis ms-dos widely used personal computer operating system 1980s paterson educated sea...
[ 4023, 3210, 4291, 3137, 5784, 5571, 2798, 5661, 6380, 5108, 6907, 1992 ]
Test
1,443
5
Polarization-division_multiplexing:polarization-division multiplexing polarization-division multiplexing pdm physical layer method multiplexing signals carried electromagnetic waves allowing two channels information transmitted carrier frequency using waves two orthogonal polarization states used microwave links satell...
[ 3956, 5387, 7824, 1375, 2117, 4783, 740, 7189, 320, 4970, 8108, 3724, 6468, 84, 768, 2880, 5175, 1142, 1988 ]
Test
1,444
0
Named-entity_recognition:named-entity recognition named-entity recognition ner also known entity identification entity chunking entity extraction subtask information extraction seeks locate classify named entity mentions unstructured text pre-defined categories person names organizations locations medical codes time ex...
[ 3601, 5800, 1718, 4760, 8065, 715, 2558, 205, 5122, 7539, 5388, 1555, 5304, 3292, 2215, 1751, 7372, 4337, 3651, 4349, 4089, 1314, 5778, 5429, 4903, 3058, 5528, 5612, 6495, 7138, 5885, 5008 ]
Validation
1,445
9
Common_Lisp:common lisp common lisp cl dialect lisp programming language published ansi standard document ansi incits 226-1994 r2004 formerly x3.226-1994 r1999 common lisp hyperspec hyperlinked html version derived ansi common lisp standard common lisp language developed standardized improved successor maclisp early 19...
[ 7878, 1445, 1819, 1820, 4302, 5019, 6796, 6087, 1825, 2915, 6092, 5734, 6095, 1840, 7899, 7902, 5395, 1476, 1102, 5397, 1478, 4332, 2218, 4704, 4705, 1804, 5757, 6116, 7557, 1116, 417, 54, 6471, 7573, 2600, 5077, 1885, 2249, 774, 1889, ...
Test
1,446
9
Syntax-directed_translation:syntax-directed translation syntax-directed translation refers method compiler implementation source language translation completely driven parser common method syntax-directed translation translating string sequence actions attaching one action rule grammar thus parsing string grammar produ...
[ 1361, 6275, 5326, 1951 ]
Test
1,447
3
Memory_hierarchy:memory hierarchy computer architecture memory hierarchy separates computer storage hierarchy based response time since response time complexity capacity related levels may also distinguished performance controlling technologies memory hierarchy affects performance computer architectural design algorith...
[ 5012, 5371, 3948, 7529, 5737, 5042, 740, 1854, 7552, 1481, 5055, 2226, 1867, 2248, 5784, 6148, 441, 2633, 4047, 5483, 5487, 6198, 1568, 1570, 6922, 7666, 515, 8024, 5521, 3747, 1237, 6236, 3751, 534, 7314, 5889, 1252, 1254, 4847, 4479, ...
Validation
1,448
4
Supply_chain_cyber_security:supply chain cyber security supply chain cyber security refers efforts enhance cyber security within supply chain subset supply chain security focused management cyber security requirements information technology systems software networks driven threats cyber-terrorism malware data theft adv...
[ 3486 ]
Test
1,449
1
Database_storage_structures:database storage structures database tables indexes may stored disk one number forms including ordered/unordered flat files isam heap files hash buckets b+ trees form particular advantages disadvantages commonly used forms b+ trees isam forms structures one aspect overall schema used databas...
[ 7248, 5209, 7715, 1730, 3951, 3776, 6345, 7067, 3005, 6430, 1003, 3011, 4950, 6543, 2304, 2124, 927, 4798, 6462, 1861, 5852, 6128, 2054, 7022, 5419, 7205, 684, 517, 7213, 7303, 6144, 4274, 1891, 4457, 1792, 3244, 784, 2265 ]
Validation
1,450
9
Comparison_of_functional_programming_languages:comparison functional programming languages table shows comparison functional programming languages compares various features designs different functional programming languages
[ 7032, 2740, 160, 2451, 4543, 4573, 5965, 7557, 2619, 5164, 5073 ]
Test
1,451
3
ICOMP_(index):icomp index icomp intel comparative microprocessor performance index published intel used measure relative performance microprocessors three revisions icomp index version 1.0 benchmarked 486sx 25 version 2.0 benchmarked pentium 120
[ 7403, 1458, 2522, 1331 ]
Test
1,452
3
Quantum_Effect_Devices:quantum effect devices quantum effect devices qed microprocessor design company incorporated 1991 quantum effect design based palo alto california three founders tom riordan earl killian ray kunita senior managers mips computer systems inc.. left mips time company difficult time selling entire co...
[ 6074, 3764, 6256, 1727, 5822, 5737, 5483, 4783, 5055, 7010, 4799, 5947, 4370, 7499, 3674, 7697 ]
Test
1,453
2
Nokia_E60:nokia e60 nokia e60 traditional candybar style smartphone eseries business phone range s60 3rd edition symbian device introduced 12 october 2005 along nokia e61 nokia e70
[ 1066, 5979, 2271, 6517, 372, 1724, 7521, 3615, 4935, 5909, 3694, 3524, 3952, 472, 8072, 7170, 2922, 4407, 118, 23, 2564, 3703, 7261, 7545, 5044, 5493, 740, 1202, 5315, 3029, 5499, 7012, 139, 6465, 5062, 3039, 3653, 1582, 4894, 5068, 597...
Validation
1,454
3
Motorola_68010:motorola 68010 motorola mc68010 processor 16/32-bit microprocessor motorola released 1982 successor motorola 68000 fixes several small flaws 68000 adds features 68010 pin-compatible 68000 100 software compatible differences additionally 68010 loop mode accelerates loops consisting two instructions move d...
[ 5097, 7327, 1254, 5100, 1075, 4845, 4479, 3688, 5374, 1638, 5652, 3708, 7905, 7990, 6111, 4244, 4702, 1386, 4336, 7654, 7010, 2133, 2868, 234, 2501, 2781, 3735, 2785, 4631, 7581, 6577, 5079, 4454, 1237, 2257, 5614, 3674, 7133, 2617, 2353,...
Test
1,455
4
Unicity_distance:unicity distance cryptography unicity distance length original ciphertext needed break cipher reducing number possible spurious keys zero brute force attack trying every possible key one decipherment makes sense i.e expected amount ciphertext needed determine key completely assuming underlying message ...
[ 907, 7862, 1353, 5262 ]
Validation
1,456
4
Torrent_poisoning:torrent poisoning torrent poisoning intentionally sharing corrupt data data misleading file names using bittorrent protocol practice uploading fake torrents sometimes carried anti-infringement organisations attempt prevent peer-to-peer p2p sharing copyrighted content gather ip addresses downloaders de...
[ 2810, 5848, 2430, 2696, 6511, 2026, 1376, 330, 4508, 2850, 2354, 7480 ]
Test
1,457
2
Amstrad_CP/M_Plus_character_set:amstrad cp/m plus character set amstrad cp/m plus character set alternatively known pcw character set zx spectrum +3 character set refers group 8-bit character sets introduced amstrad/locomotive software use conjunction adaptation digital research cp/m plus various amstrad cpc schneider ...
[ 3764, 2521, 7798, 2438 ]
Test
1,458
6
Bonnie++:bonnie++ bonnie++ free software file system benchmarking tool unix-like operating systems developed russell coker bonnie++ benchmark suite aimed performing number simple tests hard drive file system performance bonnie++ allows benchmark file systems perform respect data read write speed number seeks performed ...
[ 7442, 3326, 2451, 1183, 2743, 7403, 578, 2522, 5571, 3156, 352, 1451, 1331 ]
Test
1,459
4
Safe@Office:safe office safe office line firewall vpn appliances developed sofaware technologies check point company check point safe office product line targeted small medium business segment includes 500 500w wi-fi series internet security appliance old s-box safe home 100 series 200 series 400w series discontinued a...
[ 3223, 6043, 4014, 1805 ]
Validation
1,460
2
Security_Support_Provider_Interface:security support provider interface security support provider interface sspi win32 api used microsoft windows systems perform variety security-related operations authentication sspi functions common interface several security support providers ssps security support provider dynamic-l...
[ 7149, 363, 3, 6795, 6420, 714, 720, 1464, 2928, 7907, 5747, 3293, 5399, 6458, 2587, 7567, 7925, 2953, 6840, 422, 5773, 7214, 4014, 1513, 4017, 2620, 6504, 448, 4022, 794, 4026, 1526, 7607, 3350, 3687, 5808, 2993, 1168, 1173, 2283, 2644,...
Validation
1,461
4
Vulnerability_scanner:vulnerability scanner vulnerability scanner computer program designed assess computers networks applications known weaknesses plain words scanners used discover weaknesses given system utilized identification detection vulnerabilities arising mis-configurations flawed programming within network-ba...
[ 3932, 6515, 4583, 3088, 2829, 3681, 3448, 294, 2105, 4492, 3189, 566, 651, 2566, 6725, 5485, 1376, 5577, 5135, 3794, 2577, 5401, 6363, 2310, 6823, 1708, 2491, 5149, 6376, 7106, 848, 330, 6756, 3486, 2789, 74, 7865, 4645, 1899, 4914, 713...
Train
1,462
5
Border_Gateway_Protocol:border gateway protocol border gateway protocol bgp standardized exterior gateway protocol designed exchange routing reachability information among autonomous systems internet protocol classified path vector protocol border gateway protocol makes routing decisions based paths network policies ru...
[ 7148, 709, 4676, 4677, 4311, 7170, 5733, 4683, 6432, 1462, 5039, 6446, 2219, 3640, 4706, 4709, 3312, 7214, 7217, 2612, 3337, 1900, 456, 6879, 2281, 6521, 106, 1543, 2644, 6178, 6531, 2650, 121, 7637, 4414, 4783, 6908, 3379, 5492, 3383, ...
Train
1,463
9
L-attributed_grammar:l-attributed grammar l-attributed grammars special type attribute grammars allow attributes evaluated one depth-first left-to-right traversal abstract syntax tree result attribute evaluation l-attributed grammars incorporated conveniently top-down parsing syntax-directed definition l-attributed inh...
[ 1361, 5326, 1498, 1580 ]
Train
1,464
5
Password_Authentication_Protocol:password authentication protocol password authentication protocol pap password-based authentication protocol used point point protocol ppp validate users almost network operating system remote servers support pap pap specified pap considered weak authentication scheme weak schemes simpl...
[ 3, 2993, 1460, 6717, 3293, 3794, 4261, 6045, 1593, 5880, 699 ]
Test
1,465
3
SSE4:sse4 sse4 streaming simd extensions 4 simd cpu instruction set used intel core microarchitecture amd k10 k8l announced september 27 2006 fall 2006 intel developer forum vague details white paper precise details 47 instructions became available spring 2007 intel developer forum beijing presentation sse4 fully compa...
[ 6502, 2449, 2000, 1252, 2814, 3173, 2989, 4845, 6698, 3942, 3443, 4224, 6344, 811, 5559, 6523, 6616, 4108, 2744, 5670, 5665, 5934, 742, 3717, 5669, 584, 3803, 4611, 2226, 5055, 6647, 1961, 1770, 3565, 4077, 6563, 3248, 6133, 1881, 766, ...
Test
1,466
1
IBM_Query_Management_Facility:ibm query management facility ibm db2 query management facility qmf z/os business analytics software solution developed ibm originally created reporting interface ibm db2 z/os database used many customers generate reports key business decisions inception qmf ’ reports green-screen reports ...
[ 4798, 7213, 3268, 3005 ]
Train
1,467
4
Threat_Intelligence_Platform:threat intelligence platform threat intelligence platform emerging technology discipline helps organizations aggregate correlate analyze threat data multiple sources real time support defensive actions tips evolved address growing amount data generated variety internal external resources sy...
[ 2961, 429, 7125, 3433, 7158, 124, 6795, 8123, 7111, 3875 ]
Test
1,468
8
Direct_Internet_Message_Encapsulation:direct internet message encapsulation direct internet message encapsulation dime microsoft-proposed internet standard early 2000s streaming binary encapsulated data internet according ietf web site standard withdrawn never made rfc status however microsoft one time recommend dime t...
[ 1986, 5492, 4682 ]
Test
1,469
4
Sherwood_Applied_Business_Security_Architecture:sherwood applied business security architecture sabsa sherwood applied business security architecture framework methodology enterprise security architecture service management developed independently zachman framework similar structure sabsa model methodology developing r...
[ 3433 ]
Test
1,470
5
Realm-Specific_IP:realm-specific ip realm-specific ip experimental ietf framework protocol intended alternative network address translation nat end-to-end integrity packets maintained rsip lets host borrow one ip addresses udp/tcp port one rsip gateways leasing usually public ip addresses ports rsip hosts located usual...
[ 2111, 5039, 2681, 3777 ]
Test
1,471
6
Archive_file:archive file archive file file composed one computer files along metadata archive files used collect multiple data files together single file easier portability storage simply compress files use less storage space archive files often store directory structures error detection correction information arbitra...
[ 1710, 7789, 1352, 2390, 2391, 2566, 658, 3548, 7555, 1955, 7746, 2589, 3559, 7662, 2324, 3219, 510, 1675, 4438, 598, 7023, 7584, 3152, 6232, 169, 3413 ]
Test
1,472
3
Metal_Gear_(video_game):metal gear video game metal gear overhead military action-adventure stealth video game originally released 1987 konami msx2 computer japan parts europe considered progenitor stealth game genre first video game designed hideo kojima would go direct sequels reworked port game released famicom mont...
[ 4023, 6380, 6151, 3049 ]
Test
1,473
3
ARM_Cortex-A77:arm cortex-a77 arm cortex-a77 microarchitecture implementing armv8.2-a 64-bit instruction set designed arm holdings austin design centre cortex-a77 4-wide decode out-of-order superscalar design new 1.5k macro-op mops cache instruction fetch 6-wide 4-wide backend 12 execution ports pipeline depth 13 stage...
[ 451, 278, 6165, 550, 4847, 6421, 987, 5472, 469, 4041, 7890, 722, 3008, 7442, 3365, 4947, 6720, 3786, 2926, 5740, 5576, 6910, 5750, 4879, 5752, 5405, 7376, 5406, 5585, 7654, 1864, 6378, 5323, 677, 6753, 6389, 4537, 950, 67, 1977, 2339, ...
Validation
1,474
8
HAProxy:haproxy haproxy free open source software provides high availability load balancer proxy server tcp http-based applications spreads requests across multiple servers written c reputation fast efficient terms processor memory usage haproxy used number high-profile websites including godaddy github bitbucket stack...
[ 3637, 2291, 5824, 3383, 3368, 4072, 7637, 5571, 5064, 3613, 3338, 7848, 578, 515, 1435 ]
Train
1,475
2
Mail_(Windows):mail windows mail email newsgroup client developed microsoft included windows 8 8.1 10 operating systems main function mail sending receiving email successor outlook express either included released windows 9x family older versions windows nt family windows mail announced microsoft successor outlook expr...
[ 7879, 3937, 3263, 7887, 378, 2198, 6096, 6102, 735, 7553, 7195, 5410, 7564, 2953, 4352, 5070, 422, 6844, 2245, 5781, 435, 5442, 4377, 5090, 3340, 7602, 1152, 6164, 4759, 1534, 6885, 7619, 2999, 7975, 5475, 6528, 2290, 4774, 1181, 3711, ...
Test
1,476
9
Defun:defun defun short define function macro lisp family programming languages defines function global environment uses form defining function codice_1 adds two numbers defining function codice_2 squares number defining function returns codice_3 codice_4
[ 790, 7032, 4543, 1445, 7394, 2600 ]
Test
1,477
0
LOLITA:lolita lolita natural language processing system developed durham university 1986 2000 name acronym large-scale object-based linguistic interactor translator analyzer lolita developed roberto garigliano colleagues 1986 2000 designed general-purpose tool processing unrestricted text could basis wide variety appli...
[ 1314, 2740, 205, 5429, 4573, 5008, 1435 ]
Validation
1,478
9
Chicken_(Scheme_implementation):chicken scheme implementation chicken stylized chicken programming language specifically compiler interpreter implement dialect programming language scheme compiles scheme source code standard c. mostly r5rs compliant offers many extensions standard newer r7rs standard supported extensio...
[ 7878, 1445, 5019, 1820, 6796, 6087, 2915, 5734, 2218, 4704, 5055, 5757, 6116, 1116, 6471, 7573, 2600, 5077, 1885, 6489, 1889, 6497, 6507, 795, 6876, 4759, 6888, 3368, 1557, 5494, 5501, 6210, 144, 4074, 6922, 4085, 7298, 5515, 8025, 3749, ...
Test
1,479
8
Java_API_for_RESTful_Web_Services:java api restful web services jax-rs java api restful web services jax-rs java programming language api spec provides support creating web services according representational state transfer rest architectural pattern jax-rs uses annotations introduced java se 5 simplify development dep...
[ 2371, 718, 7347, 5646, 6986, 5299, 5571, 7370, 3383, 2126, 2322, 7390, 3488, 2517, 773, 2519, 5874, 3915, 2799, 2807 ]
Test
1,480
4
Rubber-hose_cryptanalysis:rubber-hose cryptanalysis cryptography rubber-hose cryptanalysis euphemism extraction cryptographic secrets e.g password encrypted file person coercion torture—such beating person rubber hose hence name—in contrast mathematical technical cryptanalytic attack according amnesty international un ...
[ 1811, 4930, 464, 807, 1353, 2379, 907, 3100, 119, 212, 2303, 7548, 6637, 6647, 7200, 4805, 5765, 6657, 1587, 5333, 5773, 4536, 6763, 6049, 433, 1320, 613, 4741, 1146, 4917 ]
Test
1,481
3
Memory-level_parallelism:memory-level parallelism memory-level parallelism mlp term computer architecture referring ability pending multiple memory operations particular cache misses translation lookaside buffer tlb misses time single processor mlp may considered form instruction-level parallelism ilp however ilp often...
[ 5012, 1447, 5371, 3948, 7527, 7529, 5737, 4318, 2567, 4694, 5042, 5055, 2226, 1867, 2961, 2248, 3667, 2969, 6148, 441, 4742, 5447, 2266, 4047, 1546, 4049, 5483, 1556, 5487, 6198, 1568, 1570, 6922, 3041, 7666, 1586, 515, 8024, 5521, 3747, ...
Test
1,482
4
Dridex:dridex dridex also known bugat cridex form malware specializes stealing bank credentials via system utilizes macros microsoft word targets malware windows users open email attachment word excel causing macros activate download dridex infecting computer opening victim banking theft primary objective software stea...
[ 2733, 1340, 2021, 1766, 4759, 7186, 1383 ]
Test
1,483
7
Softkinetic:softkinetic softkinetic belgian company develops gesture recognition hardware software real-time range imaging 3d cameras time-of-flight cameras founded july 2007 softkinetic provides gesture recognition solutions based technology interactive digital entertainment consumer electronics health fitness serious...
[ 5666 ]
Validation
1,484
7
Thread_(network_protocol):thread network protocol thread ipv6-based low-power mesh networking technology iot products intended secure future-proof thread protocol specification available cost however requires agreement continued adherence eula states membership thread group necessary implement practice ship thread tech...
[ 7876, 3078, 6461, 6489, 6874, 6987, 1421, 5571, 7950, 1435, 38 ]
Test