source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/SQL%20Server%20Notification%20Services | SQL Server Notification Services is a platform developed by Microsoft for the development and deployment of notification applications based on SQL Server technology and the Microsoft .NET Framework. Notification Services offers a scalable server engine on which to run notification applications, with multi-server capabi... |
https://en.wikipedia.org/wiki/Parks%E2%80%93McClellan%20filter%20design%20algorithm | The Parks–McClellan algorithm, published by James McClellan and Thomas Parks in 1972, is an iterative algorithm for finding the optimal Chebyshev finite impulse response (FIR) filter. The Parks–McClellan algorithm is utilized to design and implement efficient and optimal FIR filters. It uses an indirect method for find... |
https://en.wikipedia.org/wiki/Remez%20algorithm | The Remez algorithm or Remez exchange algorithm, published by Evgeny Yakovlevich Remez in 1934, is an iterative algorithm used to find simple approximations to functions, specifically, approximations by functions in a Chebyshev space that are the best in the uniform norm L∞ sense. It is sometimes referred to as Remes ... |
https://en.wikipedia.org/wiki/Systems%20modeling%20language | The systems modeling language (SysML) is a general-purpose modeling language for systems engineering applications. It supports the specification, analysis, design, verification and validation of a broad range of systems and systems-of-systems.
SysML was originally developed by an open source specification project, and... |
https://en.wikipedia.org/wiki/H%C3%B6lder%27s%20theorem | In mathematics, Hölder's theorem states that the gamma function does not satisfy any algebraic differential equation whose coefficients are rational functions. This result was first proved by Otto Hölder in 1887; several alternative proofs have subsequently been found.
The theorem also generalizes to the -gamma functi... |
https://en.wikipedia.org/wiki/Euglena%20gracilis | Euglena gracilis is a freshwater species of single-celled alga in the genus Euglena. It has secondary chloroplasts, and is a mixotroph able to feed by photosynthesis or phagocytosis. It has a highly flexible cell surface, allowing it to change shape from a thin cell up to 100 µm long, to a sphere of approximately 20 µm... |
https://en.wikipedia.org/wiki/AMX192 | AMX192 (often referred to simply as AMX) is an analog lighting communications protocol used to control stage lighting. It was developed by Strand Century in the late 1970s. Originally, AMX192 was only capable of controlling 192 discrete channels of lighting. Later, multiple AMX192 streams were supported by some lighti... |
https://en.wikipedia.org/wiki/Internetowa%20encyklopedia%20PWN | Internetowa encyklopedia PWN (Polish for Internet PWN Encyclopedia) is a free online Polish-language encyclopedia published by Wydawnictwo Naukowe PWN. It contains some 80,000 entries and 5,000 illustrations.
External links
Internetowa encyklopedia PWN
Online encyclopedias
Polish online encyclopedias
Polish Scienti... |
https://en.wikipedia.org/wiki/Perpetual%20access | Perpetual access is the stated continuous access of licensed electronic material after is it no longer accessible through an active paid subscription either through the library or publisher action. In many cases, the two parties involved in the license agree that it is necessary for the license to retain access to thes... |
https://en.wikipedia.org/wiki/Directory%20harvest%20attack | A directory harvest attack (DHA) is a technique used by spammers in an attempt to find valid/existent e-mail addresses at a domain by using brute force. The attack is usually carried out by way of a standard dictionary attack, where valid e-mail addresses are found by brute force guessing valid e-mail addresses at a d... |
https://en.wikipedia.org/wiki/Stain | A stain is a discoloration that can be clearly distinguished from the surface, material, or medium it is found upon. They are caused by the chemical or physical interaction of two dissimilar materials. Accidental staining may make materials appear used, degraded or permanently unclean. Intentional staining is used in b... |
https://en.wikipedia.org/wiki/Wetted%20perimeter | The wetted perimeter is the perimeter of the cross sectional area that is "wet". The length of line of the intersection of channel wetted surface with a cross sectional plane normal to the flow direction. The term wetted perimeter is common in civil engineering, environmental engineering, hydrology, geomorphology, and ... |
https://en.wikipedia.org/wiki/List%20mining | List mining can be defined as the use, for purposes of scientific research, of messages sent to Internet-based electronic mailing lists. List mining raises novel issues in Internet research ethics. These ethical issues are especially important for health related lists. Some questions that need to be considered by a Res... |
https://en.wikipedia.org/wiki/TestDisk | TestDisk is a free and open-source data recovery utility that helps users recover lost partitions or repair corrupted filesystems. TestDisk can collect detailed information about a corrupted drive, which can then be sent to a technician for further analysis. TestDisk supports DOS, Microsoft Windows (i.e. NT 4.0, 2000, ... |
https://en.wikipedia.org/wiki/SerDes | A Serializer/Deserializer (SerDes) is a pair of functional blocks commonly used in high speed communications to compensate for limited input/output. These blocks convert data between serial data and parallel interfaces in each direction. The term "SerDes" generically refers to interfaces used in various technologies a... |
https://en.wikipedia.org/wiki/Encyclopedia%20of%20Earth | The Encyclopedia of Earth (abbreviated EoE) is an electronic reference about the Earth, its natural environments, and their interaction with society. The Encyclopedia is described as a free, fully searchable collection of articles written by scholars, professionals, educators, and other approved experts, who collaborat... |
https://en.wikipedia.org/wiki/.NET%20Remoting | .NET Remoting is a Microsoft application programming interface (API) for interprocess communication released in 2002 with the 1.0 version of .NET Framework. It is one in a series of Microsoft technologies that began in 1990 with the first version of Object Linking and Embedding (OLE) for 16-bit Windows. Intermediate st... |
https://en.wikipedia.org/wiki/Intertubercular%20plane | A lower transverse plane midway between the upper transverse and the upper border of the pubic symphysis; this is termed the intertubercular plane (or transtubercular), since it practically corresponds to that passing through the iliac tubercles; behind, its plane cuts the body of the fifth lumbar vertebra.
Additional... |
https://en.wikipedia.org/wiki/Transpyloric%20plane | The transpyloric plane, also known as Addison's plane, is an imaginary horizontal plane, located halfway between the suprasternal notch of the manubrium and the upper border of the symphysis pubis at the level of the first lumbar vertebrae, L1. It lies roughly a hand's breadth beneath the xiphisternum or midway between... |
https://en.wikipedia.org/wiki/Henri%20Poincar%C3%A9%20Prize | The Henri Poincaré Prize is awarded every three years since 1997 for exceptional achievements in mathematical physics and foundational contributions
leading to new developments in the field. The prize is sponsored by the Daniel Iagolnitzer Foundation and is awarded to approximately three scientists at the Internationa... |
https://en.wikipedia.org/wiki/History%20of%20machine%20translation | Machine translation is a sub-field of computational linguistics that investigates the use of software to translate text or speech from one natural language to another.
In the 1950s, machine translation became a reality in research, although references to the subject can be found as early as the 17th century. The Georg... |
https://en.wikipedia.org/wiki/Jawed%20Siddiqi | Jawed Siddiqi FBCS is a Pakistani British computer scientist and software engineer. He is professor emeritus of software engineering at Sheffield Hallam University, England. He is the president of NCUP National Council of University Professors in the UK.
Education and academic career
Siddiqi received a BSc degree in... |
https://en.wikipedia.org/wiki/Ampliphase | Ampliphase is the brand name of an amplitude modulation system achieved by summing phase modulated carriers.
This modulation and amplifier technology family was originally marketed by RCA for AM broadcast transmitters. The Ampliphase system was not developed by RCA, but by McClatchy Broadcasting in the mid-1930s. McCl... |
https://en.wikipedia.org/wiki/Flash%20ADC | A flash ADC (also known as a direct-conversion ADC) is a type of analog-to-digital converter that uses a linear voltage ladder with a comparator at each "rung" of the ladder to compare the input voltage to successive reference voltages. Often these reference ladders are constructed of many resistors; however, modern im... |
https://en.wikipedia.org/wiki/Voltage%20ladder | A voltage ladder is a simple electronic circuit consisting of several resistors connected in series with a voltage placed across the entire resistor network, a generalisation of a two-resistor voltage divider. Connections to the nodes provide access to the voltages available. Voltage ladders are useful for providing a ... |
https://en.wikipedia.org/wiki/MSN%20Chat | MSN Chat was the Microsoft Network version of IRCX (Internet Relay Chat extensions by Microsoft), which replaced Microsoft Chat, a set of Exchange-based IRCX servers first available in the Microsoft Comic Chat client, although Comic Chat was not required to connect.
History
Client Compatibility
According to the MSN ... |
https://en.wikipedia.org/wiki/Causal%20consistency | Causal consistency is one of the major memory consistency models. In concurrent programming, where concurrent processes are accessing a shared memory, a consistency model restricts which accesses are legal. This is useful for defining correct data structures in distributed shared memory or distributed transactions.
... |
https://en.wikipedia.org/wiki/Log%20analysis | In computer log management and intelligence, log analysis (or system and network log analysis) is an art and science seeking to make sense of computer-generated records (also called log or audit trail records). The process of creating such records is called data logging.
Typical reasons why people perform log analysis... |
https://en.wikipedia.org/wiki/Photoionization%20detector | A photoionization detector or PID is a type of gas detector.
Typical photoionization detectors measure volatile organic compounds and other gases in concentrations from sub parts per billion to 10 000 parts per million (ppm). The photoionization detector is an efficient and inexpensive detector for many gas and vapor ... |
https://en.wikipedia.org/wiki/Bureau%20of%20Ships | The United States Navy's Bureau of Ships (BuShips) was established by Congress on 20 June 1940, by a law which consolidated the functions of the Bureau of Construction and Repair (BuC&R) and the Bureau of Engineering (BuEng). The new bureau was to be headed by a chief and deputy-chief, one selected from the Engineerin... |
https://en.wikipedia.org/wiki/John%20Elder%20Professor%20of%20Naval%20Architecture%20and%20Ocean%20Engineering | The John Elder Professor of Naval Architecture and Ocean Engineering at the University of Glasgow, Scotland, was established in 1883 and endowed by Isabella Elder (1828-1905) in honor of her husband, John Elder. John Elder was a renowned marine engineer and shipbuilder of Randolph, Elder & Co. (1824-1869).
John Elder ... |
https://en.wikipedia.org/wiki/Segal%27s%20conjecture | Segal's Burnside ring conjecture, or, more briefly, the Segal conjecture, is a theorem in homotopy theory, a branch of mathematics. The theorem relates the Burnside ring of a finite group G to the stable cohomotopy of the classifying space BG. The conjecture was made in the mid 1970s by Graeme Segal and proved in 1984 ... |
https://en.wikipedia.org/wiki/HP%20250 | The HP 250 was a multiuser business computer by Hewlett-Packard running HP 250 BASIC language as its OS with access to HP's IMAGE database management. It was produced by the General Systems Division (GSD), but was a major repackaging of desktop workstation HP 9835 which had been sold in small business configurations. T... |
https://en.wikipedia.org/wiki/Effective%20evolutionary%20time | The hypothesis of effective evolutionary time attempts to explain gradients, in particular latitudinal gradients, in species diversity. It was originally named "time hypothesis".
Background
Low (warm) latitudes contain significantly more species than high (cold) latitudes. This has been shown for many animal and plan... |
https://en.wikipedia.org/wiki/Parametric%20oscillator | A parametric oscillator is a driven harmonic oscillator in which the oscillations are driven by varying some parameters of the system at some frequencies, typically different from the natural frequency of the oscillator. A simple example of a parametric oscillator is a child pumping a playground swing by periodically s... |
https://en.wikipedia.org/wiki/Predrag%20Cvitanovi%C4%87 | Predrag Cvitanović (; born April 1, 1946) is a theoretical physicist regarded for his work in nonlinear dynamics, particularly his contributions to periodic orbit theory.
Life
Cvitanović earned his B.S. from MIT in 1969 and his Ph.D. at Cornell University in 1973. Before joining the physics department at the Georgia ... |
https://en.wikipedia.org/wiki/Permeation | In physics and engineering, permeation (also called imbuing) is the penetration of a permeate (a fluid such as a liquid, gas, or vapor) through a solid. It is directly related to the concentration gradient of the permeate, a material's intrinsic permeability, and the materials' mass diffusivity. Permeation is modeled b... |
https://en.wikipedia.org/wiki/List%20of%20triangle%20inequalities | In geometry, triangle inequalities are inequalities involving the parameters of triangles, that hold for every triangle, or for every triangle meeting certain conditions. The inequalities give an ordering of two different values: they are of the form "less than", "less than or equal to", "greater than", or "greater tha... |
https://en.wikipedia.org/wiki/Thomson%20%28unit%29 | The thomson (symbol: Th) is a unit that has appeared infrequently in scientific literature relating to the field of mass spectrometry as a unit of mass-to-charge ratio. The unit was proposed by Cooks and Rockwood naming it in honour of J. J. Thomson who measured the mass-to-charge ratio of electrons and ions.
Definiti... |
https://en.wikipedia.org/wiki/Geomagnetic%20latitude | Geomagnetic latitude, or magnetic latitude (MLAT), is a parameter analogous to geographic latitude, except that, instead of being defined relative to the geographic poles, it is defined by the axis of the geomagnetic dipole, which can be accurately extracted from the International Geomagnetic Reference Field (IGRF).
S... |
https://en.wikipedia.org/wiki/Geocast | Geocast refers to the delivery of information to a subset of destinations in a wireless peer-to-peer network identified by their geographical locations. It is used by some mobile ad hoc network routing protocols, but not applicable to Internet routing.
Geographic addressing
A geographic destination address is expres... |
https://en.wikipedia.org/wiki/Unrestricted%20grammar | In automata theory, the class of unrestricted grammars (also called semi-Thue, type-0 or phrase structure grammars) is the most general class of grammars in the Chomsky hierarchy. No restrictions are made on the productions of an unrestricted grammar, other than each of their left-hand sides being non-empty. This gramm... |
https://en.wikipedia.org/wiki/Hyper-encryption | Hyper-encryption is a form of encryption invented by Michael O. Rabin which uses a high-bandwidth source of public random bits, together with a secret key that is shared by only the sender and recipient(s) of the message. It uses the assumptions of Ueli Maurer's bounded-storage model as the basis of its secrecy. Althou... |
https://en.wikipedia.org/wiki/GRASP%20%28object-oriented%20design%29 | General Responsibility Assignment Software Patterns (or Principles), abbreviated GRASP, is a set of "nine fundamental principles in object design and responsibility assignment" first published by Craig Larman in his 1997 book Applying UML and Patterns.
The different patterns and principles used in GRASP are controller... |
https://en.wikipedia.org/wiki/Truncated%20regression%20model | Truncated regression models are a class of models in which the sample has been truncated for certain ranges of the dependent variable. That means observations with values in the dependent variable below or above certain thresholds are systematically excluded from the sample. Therefore, whole observations are missing, s... |
https://en.wikipedia.org/wiki/Weyl%27s%20inequality | In linear algebra, Weyl's inequality is a theorem about the changes to eigenvalues of an Hermitian matrix that is perturbed. It can be used to estimate the eigenvalues of a perturbed Hermitian matrix.
Weyl's inequality about perturbation
Let and be n×n Hermitian matrices, with their respective eigenvalues ordered... |
https://en.wikipedia.org/wiki/Pelvic%20pain | Pelvic pain is pain in the area of the pelvis. Acute pain is more common than chronic pain. If the pain lasts for more than six months, it is deemed to be chronic pelvic pain. It can affect both the male and female pelvis.
Common causes in include: endometriosis in women, bowel adhesions, irritable bowel syndrome, and... |
https://en.wikipedia.org/wiki/Umbilic%20torus | The umbilic torus or umbilic bracelet is a single-edged 3-dimensional shape. The lone edge goes three times around the ring before returning to the starting point. The shape also has a single external face. A cross section of the surface forms a deltoid.
The umbilic torus occurs in the mathematical subject of singular... |
https://en.wikipedia.org/wiki/Baudline | The baudline time-frequency browser is a signal analysis tool designed for scientific visualization. It runs on several Unix-like operating systems under the X Window System. Baudline is useful for real-time spectral monitoring, collected signals analysis, generating test signals, making distortion measurements, and pl... |
https://en.wikipedia.org/wiki/Genghis%20Khan%20%28video%20game%29 | Genghis Khan, original full title , is a 1987 turn-based strategy game developed by Koei, originally released for the NEC PC-9801, MSX and Sharp X68000 in 1988, the DOS and NES in 1990, and the Amiga in 1990. It is actually the second game in the series, after a 1985 Aoki Ōkami to Shiroki Mejika, also for PC-88, PC-98,... |
https://en.wikipedia.org/wiki/Selcall | Selcall (selective calling) is a type of squelch protocol used in radio communications systems, in which transmissions include a brief burst of sequential audio tones. Receivers that are set to respond to the transmitted tone sequence will open their squelch, while others will remain muted.
Selcall is a radio signalli... |
https://en.wikipedia.org/wiki/Arrow%20%28symbol%29 | An arrow is a graphical symbol, such as ← or →, or a pictogram, used to point or indicate direction. In its simplest form, an arrow is a triangle, chevron, or concave kite, usually
affixed to a line segment or rectangle, and in more complex forms a representation of an actual arrow (e.g. ➵ U+27B5). The direction indica... |
https://en.wikipedia.org/wiki/Institut%20national%20de%20l%27audiovisuel | The (abbrev. INA), () is a repository of all French radio and television audiovisual archives. Additionally it provides free access to archives of countries such as Afghanistan and Cambodia. It has its headquarters in Bry-sur-Marne.
Since 2006, it has allowed free online consultation on a website called ina.fr with a... |
https://en.wikipedia.org/wiki/Windows%20Live%20Mesh | Windows Live Mesh (formerly known as Windows Live FolderShare, Live Mesh, and Windows Live Sync) is a discontinued free-to-use Internet-based file synchronization application by Microsoft designed to allow files and folders between two or more computers to be in sync with each other on Windows (Vista and later) and Mac... |
https://en.wikipedia.org/wiki/Sulfur%20assimilation | Sulfur assimilation is the process by which living organisms incorporate sulfur into their biological molecules. In plants, sulfate is absorbed by the roots and then be transported to the chloroplasts by the transipration stream where the sulfur are reduced to sulfide with the help of a series of enzymatic reactions. F... |
https://en.wikipedia.org/wiki/Random%20permutation%20statistics | The statistics of random permutations, such as the cycle structure of a random permutation are of fundamental importance in the analysis of algorithms, especially of sorting algorithms, which operate on random permutations. Suppose, for example, that we are using quickselect (a cousin of quicksort) to select a random e... |
https://en.wikipedia.org/wiki/Midy%27s%20theorem | In mathematics, Midy's theorem, named after French mathematician E. Midy, is a statement about the decimal expansion of fractions a/p where p is a prime and a/p has a repeating decimal expansion with an even period . If the period of the decimal representation of a/p is 2n, so that
then the digits in the second half o... |
https://en.wikipedia.org/wiki/Mechanical%20biological%20treatment | A mechanical biological treatment (MBT) system is a type of waste processing facility that combines a sorting facility with a form of biological treatment such as composting or anaerobic digestion. MBT plants are designed to process mixed household waste as well as commercial and industrial wastes.
Process
The terms ... |
https://en.wikipedia.org/wiki/Database%20machine | A database machines or back end processor is a computer or special hardware that stores and retrieves data from a database. It is specially designed for database access and is tightly coupled to the main (front-end) computer(s) by a high-speed channel, whereas a database server is a general-purpose computer that holds ... |
https://en.wikipedia.org/wiki/Pizzino | Pizzino (; plural as pizzini) is an Italian language word derived from the Sicilian language equivalent pizzinu meaning "small piece of paper". The word has been widely used to refer to small slips of paper that the Sicilian Mafia uses for high-level communications.
Sicilian Mafia boss Bernardo Provenzano is among tho... |
https://en.wikipedia.org/wiki/CCKM | Cisco Centralized Key Management (CCKM) is a form of Fast Roaming and a subset of the Cisco Compatible EXtensions (CCX) specification.
When a wireless LAN is configured for fast reconnection, a Lightweight Extensible Authentication Protocol (LEAP) enabled client device can roam from one wireless access point to anoth... |
https://en.wikipedia.org/wiki/Smithy%20code | The Smithy code is a series of letters embedded, as a private amusement, within the April 2006 approved judgement of Mr Justice Peter Smith on The Da Vinci Code copyright case. It was first broken, in the same month, by Dan Tench, a lawyer who writes on media issues for The Guardian, after he received a series of email... |
https://en.wikipedia.org/wiki/Binomial%20regression | In statistics, binomial regression is a regression analysis technique in which the response (often referred to as Y) has a binomial distribution: it is the number of successes in a series of independent Bernoulli trials, where each trial has probability of success . In binomial regression, the probability of a success... |
https://en.wikipedia.org/wiki/Co-occurrence%20matrix | A co-occurrence matrix or co-occurrence distribution (also referred to as : gray-level co-occurrence matrices GLCMs) is a matrix that is defined over an image to be the distribution of co-occurring pixel values (grayscale values, or colors) at a given offset. It is used as an approach to texture analysis with various a... |
https://en.wikipedia.org/wiki/Wright%20%28ADL%29 | In software architecture, Wright is an architecture description language developed at Carnegie Mellon University. Wright formalizes a software architecture in terms of concepts such as components, connectors, roles, and ports. The dynamic behavior of different ports of an individual component is described using the Com... |
https://en.wikipedia.org/wiki/Truth-bearer | A truth-bearer is an entity that is said to be either true or false and nothing else. The thesis that some things are true while others are false has led to different theories about the nature of these entities. Since there is divergence of opinion on the matter, the term truth-bearer is used to be neutral among the v... |
https://en.wikipedia.org/wiki/Patlak%20plot | A Patlak plot (sometimes called Gjedde–Patlak plot, Patlak–Rutland plot, or Patlak analysis) is a graphical analysis technique based on the compartment model that uses linear regression to identify and analyze pharmacokinetics of tracers involving irreversible uptake, such as in the case of deoxyglucose. It is used for... |
https://en.wikipedia.org/wiki/John%20Guttag | John Vogel Guttag (born March 6, 1949) is an American computer scientist, professor, and former head of the department of electrical engineering and computer science at MIT.
Education and career
John Guttag was raised in Larchmont, New York, the son of Irwin Guttag (1916–2005) and Marjorie Vogel Guttag.
John Vogel G... |
https://en.wikipedia.org/wiki/Star-free%20language | A regular language is said to be star-free if it can be described by a regular expression constructed from the letters of the alphabet, the empty set symbol, all boolean operators – including complementation – and concatenation but no Kleene star. The condition is equivalent to having generalized star height zero.
For... |
https://en.wikipedia.org/wiki/Terraforming%20of%20Venus | The terraforming of Venus or the terraformation of Venus is the hypothetical process of engineering the global environment of the planet Venus in order to make it suitable for human habitation. Adjustments to the existing environment of Venus to support human life would require at least three major changes to the plane... |
https://en.wikipedia.org/wiki/Squared%20triangular%20number | In number theory, the sum of the first cubes is the square of the th triangular number. That is,
The same equation may be written more compactly using the mathematical notation for summation:
This identity is sometimes called Nicomachus's theorem, after Nicomachus of Gerasa (c. 60 – c. 120 CE).
History
Nicomachus, ... |
https://en.wikipedia.org/wiki/FCO-IM | Fully Communication Oriented Information Modeling (FCO-IM) is a method for building conceptual information models. Such models can then be automatically transformed into entity-relationship models (ERM), Unified Modeling Language (UML), relational or dimensional models with the FCO-IM Bridge toolset, and it is possible... |
https://en.wikipedia.org/wiki/Matbro | Matbro was a brand of lifting equipment, popular with farmers. Matbro produced a wide range of all terrain forklifts and telescopic handlers in their distinctive yellow livery, using engines derived from Ford and Perkins. Matbro began operating at a loss in the late 1990s and in the end went under in 2003 after account... |
https://en.wikipedia.org/wiki/Software%20management%20review | A Software management review is a management study into a project's status and allocation of resources. It is different from both a software engineering peer review, which evaluates the technical quality of software products, and a software audit, which is an externally conducted audit into a project's compliance to sp... |
https://en.wikipedia.org/wiki/Software%20peer%20review | In software development, peer review is a type of software review in which a work product (document, code, or other) is examined by author's colleagues, in order to evaluate the work product's technical content and quality.
Purpose
The purpose of a peer review is to provide "a disciplined engineering practice for det... |
https://en.wikipedia.org/wiki/Null%20move | In game theory, a null move or pass is a decision by a player to not make a move when it is that player's turn to move. Even though null moves are against the rules of many games, they are often useful to consider when analyzing these games. Examples of this include the analysis of zugzwang (a situation in chess or oth... |
https://en.wikipedia.org/wiki/Colony%20%28video%20game%29 | Colony is an action-adventure game written by Ste Cork and released in 1987 for the Amstrad CPC, Atari 8-bit family, Commodore 64, MSX, and ZX Spectrum by Mastertronic on their Bulldog label.
Plot
Overpopulation has caused humanity to grow food in colonies on other planets. Unfortunately, the mushroom-growing planet ... |
https://en.wikipedia.org/wiki/Perron%27s%20formula | In mathematics, and more particularly in analytic number theory, Perron's formula is a formula due to Oskar Perron to calculate the sum of an arithmetic function, by means of an inverse Mellin transform.
Statement
Let be an arithmetic function, and let
be the corresponding Dirichlet series. Presume the Dirichlet s... |
https://en.wikipedia.org/wiki/DomainKeys%20Identified%20Mail | DomainKeys Identified Mail (DKIM) is an email authentication method designed to detect forged sender addresses in email (email spoofing), a technique often used in phishing and email spam.
DKIM allows the receiver to check that an email that claimed to have come from a specific domain was indeed authorized by the owne... |
https://en.wikipedia.org/wiki/Cryptographic%20primitive | Cryptographic primitives are well-established, low-level cryptographic algorithms that are frequently used to build cryptographic protocols for computer security systems. These routines include, but are not limited to, one-way hash functions and encryption functions.
Rationale
When creating cryptographic systems, de... |
https://en.wikipedia.org/wiki/Jesus%20%28video%20game%29 | is a graphic adventure game developed and published by Enix. It was first released in 1987 on the PC-8801, FM-77AV, X1, and the MSX2 and was later ported to the Famicom in 1989 as (Jesus: Terror of Bio Monster). A sequel, Jesus II, was released on the PC-8801, PC-9801, and X68000 in 1991.
The game's name refers to a ... |
https://en.wikipedia.org/wiki/Smallest%20grammar%20problem | In data compression and the theory of formal languages, the smallest grammar problem is the problem of finding the smallest context-free grammar that generates a given string of characters (but no other string). The size of a grammar is defined by some authors as the number of symbols on the right side of the productio... |
https://en.wikipedia.org/wiki/Purification%20theorem | In game theory, the purification theorem was contributed by Nobel laureate John Harsanyi in 1973. The theorem aims to justify a puzzling aspect of mixed strategy Nash equilibria: that each player is wholly indifferent amongst each of the actions he puts non-zero weight on, yet he mixes them so as to make every other pl... |
https://en.wikipedia.org/wiki/Radial%20spoke | The radial spoke is a multi-unit protein structure found in the axonemes of eukaryotic cilia and flagella. Although experiments have determined the importance of the radial spoke in the proper function of these organelles, its structure and mode of action remain poorly understood.
Cellular location and structure
Rad... |
https://en.wikipedia.org/wiki/Granuloma%20annulare | Granuloma annulare (GA) is a common, sometimes chronic skin condition which presents as reddish bumps on the skin arranged in a circle or ring. It can initially occur at any age, though two-thirds of patients are under 30 years old, and it is seen most often in children and young adults. Females are two times as likely... |
https://en.wikipedia.org/wiki/Semantic%20web%20service | A semantic web service, like conventional web services, is the server end of a client–server system for machine-to-machine interaction via the World Wide Web. Semantic services are a component of the semantic web because they use markup which makes data machine-readable in a detailed and sophisticated way (as compared ... |
https://en.wikipedia.org/wiki/Software%20review | A software review is "a process or meeting during which a software product is examined by a project personnel, managers, users, customers, user representatives, or other interested parties for comment or approval".
In this context, the term "software product" means "any technical document or partial document, produced... |
https://en.wikipedia.org/wiki/TiVo%20digital%20video%20recorders | TiVo digital video recorders encompass a number of digital video recorder (DVR) models that TiVo Corporation designed. Features may vary, but a common feature is that all of the units listed here require TiVo service and use its operating system.
TiVo units have been manufactured by various OEMs, including Philips, S... |
https://en.wikipedia.org/wiki/Software%20walkthrough | In software engineering, a walkthrough or walk-through is a form of software peer review "in which a designer or programmer leads members of the development team and other interested parties through a software product, and the participants ask questions and make comments about possible errors, violation of development ... |
https://en.wikipedia.org/wiki/Software%20technical%20review | A software technical review is a form of peer review in which "a team of qualified personnel ... examines the suitability of the software product for its intended use and identifies discrepancies from specifications and standards. Technical reviews may also provide recommendations of alternatives and examination of var... |
https://en.wikipedia.org/wiki/Mobile%20dating | Mobile dating services, also known as cell dating, cellular dating, or cell phone dating, allow individuals to chat, flirt, meet, and possibly become romantically involved by means of text messaging, mobile chatting, and the mobile web.
These services allow their users to provide information about themselves in a shor... |
https://en.wikipedia.org/wiki/Characterization%20%28materials%20science%29 | Characterization, when used in materials science, refers to the broad and general process by which a material's structure and properties are probed and measured. It is a fundamental process in the field of materials science, without which no scientific understanding of engineering materials could be ascertained. The sc... |
https://en.wikipedia.org/wiki/Burnside%20ring | In mathematics, the Burnside ring of a finite group is an algebraic construction that encodes the different ways the group can act on finite sets. The ideas were introduced by William Burnside at the end of the nineteenth century. The algebraic ring structure is a more recent development, due to Solomon (1967).
Formal... |
https://en.wikipedia.org/wiki/Pre-shared%20key | In cryptography, a pre-shared key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used.
Key
To build a key from shared secret, the key derivation function is typically used. Such systems almost always use symmetric key cryptographic algorithm... |
https://en.wikipedia.org/wiki/Software%20audit%20review | A software audit review, or software audit, is a type of software review in which one or more auditors who are not members of the software development organization conduct "An independent examination of a software product, software process, or set of software processes to assess compliance with specifications, standard... |
https://en.wikipedia.org/wiki/Sunset%20Sound%20Recorders | Sunset Sound Recorders is a recording studio in Hollywood, California, United States located at 6650 Sunset Boulevard.
Background
The Sunset Sound Recorders complex was created by Walt Disney's Director of Recording, Tutti Camarata, from a collection of old commercial and residential buildings. At the encouragement of... |
https://en.wikipedia.org/wiki/Tombs%20%26%20Treasure | Tombs & Treasure, known in Japan as , is an adventure game originally developed by Falcom in 1986 for the PC-8801, PC-9801, FM-7, MSX 2 and X1 Japanese computer systems. A Famicom/NES version, released in 1988, was altered to be more story-based, and features new music and role-playing elements; an English-language NES... |
https://en.wikipedia.org/wiki/Talairach%20coordinates | Talairach coordinates, also known as Talairach space, is a 3-dimensional coordinate system (known as an 'atlas') of the human brain, which is used to map the location of brain structures independent from individual differences in the size and overall shape of the brain. It is still common to use Talairach coordinates i... |
https://en.wikipedia.org/wiki/Comparison%20of%20free%20and%20open-source%20software%20licenses | This comparison only covers software licenses which have a linked Wikipedia article for details and which are approved by at least one of the following expert groups: the Free Software Foundation, the Open Source Initiative, the Debian Project and the Fedora Project. For a list of licenses not specifically intended for... |
https://en.wikipedia.org/wiki/Genetic%20divergence | Genetic divergence is the process in which two or more populations of an ancestral species accumulate independent genetic changes (mutations) through time, often leading to reproductive isolation and continued mutation even after the populations have become reproductively isolated for some period of time, as there isn’... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.