source stringlengths 31 203 | text stringlengths 28 2k |
|---|---|
https://en.wikipedia.org/wiki/Performance-based%20building%20design | Performance-Based Building Design is an approach to the design of any complexity of building, from single-detached homes up to and including high-rise apartments and office buildings. A building constructed in this way is required to meet certain measurable or predictable performance requirements, such as energy effici... |
https://en.wikipedia.org/wiki/Mechanical%20filter | A mechanical filter is a signal processing filter usually used in place of an electronic filter at radio frequencies. Its purpose is the same as that of a normal electronic filter: to pass a range of signal frequencies, but to block others. The filter acts on mechanical vibrations which are the analogue of the electr... |
https://en.wikipedia.org/wiki/GMail%20Drive | GMail Drive was a free third-party Windows Shell namespace extension ("add-on") for Google's Gmail. GMail Drive was not supported by Google. It allowed a user to access a virtual drive stored in a Gmail account by causing the contents of the Gmail account to appear as a new network share on the user's workstation. In o... |
https://en.wikipedia.org/wiki/Joe-E | Joe-E is a subset of the Java programming language intended to support programming according to object-capability discipline.
The language is notable for being an early object-capability subset language. It has influenced later subset languages, such as ADsafe and Caja/Cajita, subsets of Javascript.
It is also notab... |
https://en.wikipedia.org/wiki/OPhone | OPhone, or OMS (Open Mobile System), is a mobile operating system running on the Linux kernel. It is based on technologies initially developed by Android Inc., a firm later purchased by Google, and work done by the Open Handset Alliance. The OPhone OS has appeared only on China Mobile phones, and the software was devel... |
https://en.wikipedia.org/wiki/Sony%20TV8-301 | The TV8-301 was a small black and white television made by Sony. It is notable for being the world's first non-projection type all-transistor television. It had an eight-inch screen. It was also portable, having a bay in the back for two 6 volt lead acid batteries. It was priced high as it was innovative in many ways, ... |
https://en.wikipedia.org/wiki/Tertiary%20ideal | In mathematics, a tertiary ideal is a two-sided ideal in a perhaps noncommutative ring that cannot be expressed as a nontrivial intersection of a right fractional ideal with another ideal. Tertiary ideals generalize primary ideals to the case of noncommutative rings. Although primary decompositions do not exist in gene... |
https://en.wikipedia.org/wiki/White%20blood%20cell | White blood cells, also called leukocytes or immune cells also called immunocytes, are cells of the immune system that are involved in protecting the body against both infectious disease and foreign invaders. White blood cells include three main subtypes; granulocytes, lymphocytes and monocytes.
All white blood cell... |
https://en.wikipedia.org/wiki/Hurwitz%27s%20theorem%20%28composition%20algebras%29 | In mathematics, Hurwitz's theorem is a theorem of Adolf Hurwitz (1859–1919), published posthumously in 1923, solving the Hurwitz problem for finite-dimensional unital real non-associative algebras endowed with a positive-definite quadratic form. The theorem states that if the quadratic form defines a homomorphism into ... |
https://en.wikipedia.org/wiki/Johnson%27s%20figure%20of%20merit | Johnson's figure of merit is a measure of suitability of a semiconductor material for high frequency power transistor applications and requirements. More specifically, it is the product of the charge carrier saturation velocity in the material and the electric breakdown field under same conditions, first proposed by Ed... |
https://en.wikipedia.org/wiki/SmartQ%205 | The SmartQ 5 is a budget mobile Internet device manufactured by the Chinese company Smart Devices. It was officially announced 11 February 2009.
Overview
The SmartQ 5 comes with a custom version of Ubuntu Linux installed which is adapted for use with a touchscreen. It uses the LXDE desktop environment.
Ubuntu's main ... |
https://en.wikipedia.org/wiki/Boris%20Beizer | Boris Beizer (1934-2018) was an American software engineer and author. He received his B.S. degree in physics from the City College of New York in 1956, an MS in Electrical Engineering (1963) and a PhD in computer science from the University of Pennsylvania in 1966. He wrote many books and articles on topics such as sy... |
https://en.wikipedia.org/wiki/Stochastic%20computing | Stochastic computing is a collection of techniques that represent continuous values by streams of random bits. Complex computations can then be computed by simple bit-wise operations on the streams. Stochastic computing is distinct from the study of randomized algorithms.
Motivation and a simple example
Suppose that... |
https://en.wikipedia.org/wiki/Semiconductor%20characterization%20techniques | Semiconductor characterization techniques are used to characterize a semiconductor material or device (PN junction, Schottky diode, solar cell, etc.). Some examples of semiconductor properties that could be characterized include the depletion width, carrier concentration, carrier generation and recombination rates, car... |
https://en.wikipedia.org/wiki/Genetically%20modified%20bacteria | Genetically modified bacteria were the first organisms to be modified in the laboratory, due to their simple genetics. These organisms are now used for several purposes, and are particularly important in producing large amounts of pure human proteins for use in medicine.
History
The first example of this occurred i... |
https://en.wikipedia.org/wiki/Histogram%20matching | In image processing, histogram matching or histogram specification is the transformation of an image so that its histogram matches a specified histogram. The well-known histogram equalization method is a special case in which the specified histogram is uniformly distributed.
It is possible to use histogram matching to... |
https://en.wikipedia.org/wiki/Gaussian%20q-distribution | In mathematical physics and probability and statistics, the Gaussian q-distribution is a family of probability distributions that includes, as limiting cases, the uniform distribution and the normal (Gaussian) distribution. It was introduced by Diaz and Teruel. It is a q-analog of the Gaussian or normal distribution.
... |
https://en.wikipedia.org/wiki/Real%20Time%20Race | Real Time Race Limited is a company based at Daresbury Laboratory in North West England. The company was Founded in 2003 by Christopher Leigh and Stuart Scott-Goldstone.
In 2008, Real Time Race worked with Malaysian owned Lotus Cars to test a video capture vehicle. It was fitted with a rotating drum containing 64 lase... |
https://en.wikipedia.org/wiki/Fibonacci%20retracement | In finance, Fibonacci retracement is a method of technical analysis for determining support and resistance levels. It is named after the Fibonacci sequence of numbers, whose ratios provide price levels to which markets tend to retrace a portion of a move, before a trend continues in the original direction.
A Fibonacci... |
https://en.wikipedia.org/wiki/Rauenberg%20%28Berlin%29 | Rauenberg is a triangulation station located at Tempelhof, in the German city of Berlin.
The Monument
The inscription on the East side of the monument is as follows:
Hills of Berlin
Buildings and structures in Tempelhof-Schöneberg
Geodesy |
https://en.wikipedia.org/wiki/Asher%20yatzar | Asher yatzar ( "Who has formed man") is a blessing in Judaism. It is recited after engaging in an act of excretion or urination, but is also included in many Jewish prayer books as a part of daily prayer prior to birkot hashachar.
The purpose of this blessing is to thank God for good health. It expresses thanks for ha... |
https://en.wikipedia.org/wiki/Distortion%20%28mathematics%29 | In mathematics, the distortion is a measure of the amount by which a function from the Euclidean plane to itself distorts circles to ellipses. If the distortion of a function is equal to one, then it is conformal; if the distortion is bounded and the function is a homeomorphism, then it is quasiconformal. The distort... |
https://en.wikipedia.org/wiki/Interceptor%20pattern | In the field of software development, an interceptor pattern is a software design pattern that is used when software systems or frameworks want to offer a way to change, or augment, their usual processing cycle. For example, a (simplified) typical processing sequence for a web-server is to receive a URI from the browse... |
https://en.wikipedia.org/wiki/I/O%20Acceleration%20Technology | I/O Acceleration Technology (I/OAT) is a DMA engine (an embedded DMA controller) by Intel bundled with high-end server motherboards, that offloads memory copies from the main processor by performing direct memory accesses (DMA). It is typically used for accelerating network traffic, but supports any kind of copy.
Usi... |
https://en.wikipedia.org/wiki/Reservoir%20sampling | Reservoir sampling is a family of randomized algorithms for choosing a simple random sample, without replacement, of items from a population of unknown size in a single pass over the items. The size of the population is not known to the algorithm and is typically too large for all items to fit into main memory. T... |
https://en.wikipedia.org/wiki/SMA%2A | SMA* or Simplified Memory Bounded A* is a shortest path algorithm based on the A* algorithm. The main advantage of SMA* is that it uses a bounded memory, while the A* algorithm might need exponential memory. All other characteristics of SMA* are inherited from A*.
Process
Properties
SMA* has the following propertie... |
https://en.wikipedia.org/wiki/FIPS%20140-3 | The Federal Information Processing Standard Publication 140-3 (FIPS PUB 140-3) is a U.S. government computer security standard used to approve cryptographic modules. The title is Security Requirements for Cryptographic Modules. Initial publication was on March 22, 2019 and it supersedes FIPS 140-2.
Purpose
The Nationa... |
https://en.wikipedia.org/wiki/Adamkiewicz%20reaction | The Adamkiewicz reaction is part of a biochemical test used to detect the presence of the amino acid tryptophan in proteins. When concentrated sulfuric acid is combined with a solution of protein and glyoxylic acid, a red/purple colour is produced. It was named after its discoverer, Albert Wojciech Adamkiewicz. Pure su... |
https://en.wikipedia.org/wiki/Galois%20geometry | Galois geometry (so named after the 19th-century French mathematician Évariste Galois) is the branch of finite geometry that is concerned with algebraic and analytic geometry over a finite field (or Galois field). More narrowly, a Galois geometry may be defined as a projective space over a finite field.
Objects of stu... |
https://en.wikipedia.org/wiki/Pizza%20theorem | In elementary geometry, the pizza theorem states the equality of two areas that arise when one partitions a disk in a certain way.
The theorem is so called because it mimics a traditional pizza slicing technique. It shows that if two people share a pizza sliced into 8 pieces (or any multiple of 4 greater than 8), and ... |
https://en.wikipedia.org/wiki/Operand%20forwarding | Operand forwarding (or data forwarding) is an optimization in pipelined CPUs to limit performance deficits which occur due to pipeline stalls. A data hazard can lead to a pipeline stall when the current operation has to wait for the results of an earlier operation which has not yet finished.
Example
ADD A B C #A=B+... |
https://en.wikipedia.org/wiki/Yao%27s%20test | In cryptography and the theory of computation, Yao's test is a test defined by Andrew Chi-Chih Yao in 1982, against pseudo-random sequences. A sequence of words passes Yao's test if an attacker with reasonable computational power cannot distinguish it from a sequence generated uniformly at random.
Formal statement
Bo... |
https://en.wikipedia.org/wiki/Oscar%20Nierstrasz | Oscar Marius Nierstrasz (born ) is a professor at the Computer Science Institute (IAM) at the University of Berne, and a specialist in software engineering and programming languages. He is active in the field of
programming languages and mechanisms to support the flexible composition of high-level, component-based a... |
https://en.wikipedia.org/wiki/Information%20behavior | Information behavior is a field of information science research that seeks to understand the way people search for and use information in various contexts. It can include information seeking and information retrieval, but it also aims to understand why people seek information and how they use it. The term 'information ... |
https://en.wikipedia.org/wiki/Edge-preserving%20smoothing | Edge-preserving smoothing or edge-preserving filtering is an image processing technique that smooths away noise or textures while retaining sharp edges. Examples are the median, bilateral, guided, anisotropic diffusion, and Kuwahara filters.
Introduction
In many applications, e.g., medical or satellite imaging, the e... |
https://en.wikipedia.org/wiki/ZumoDrive | ZumoDrive is a defunct cloud-based file hosting service operated by Zecter, Inc. On December 22, 2010, Zecter announced its acquisition by Motorola Mobility. The service enabled users to store and sync files online, and also between computers using their HybridCloud storage solution; the latter functionality stopped wo... |
https://en.wikipedia.org/wiki/Registry%20of%20Standard%20Biological%20Parts | The Registry of Standard Biological Parts is a collection of genetic parts that are used in the assembly of systems and devices in synthetic biology. The registry was founded in 2003 at the Massachusetts Institute of Technology. The registry, as of 2018, contains over 20,000 parts. Recipients of the genetic parts inclu... |
https://en.wikipedia.org/wiki/Instrumentation%20in%20petrochemical%20industries | Instrumentation is used to monitor and control the process plant in the oil, gas and petrochemical industries. Instrumentation ensures that the plant operates within defined parameters to produce materials of consistent quality and within the required specifications. It also ensures that the plant is operated safely an... |
https://en.wikipedia.org/wiki/Knockout%20moss | A knockout moss is one kind of genetically modified moss, which are GM plants. One or more of the moss's specific genes are deleted or inactivated ("knocked out"), for example by gene targeting or other methods. After the deletion of a gene, the knockout moss has lost the trait encoded by this gene. Thus, the function ... |
https://en.wikipedia.org/wiki/Free%20Knowledge%20Institute | The Free Knowledge Institute (FKI) is a non-profit organisation founded in 2006 in the Netherlands. Inspired by the free software movement, the FKI fosters the free exchange of knowledge in all areas of society by promoting freedom of use, modification, copying, and distribution of knowledge pertaining to education, te... |
https://en.wikipedia.org/wiki/%C3%89cole%20Nationale%20des%20Sciences%20Appliqu%C3%A9es%20d%27Oujda | The École nationale des sciences appliquées d'Oujda or ENSA d'Oujda is a Moroccan Grande École d'Ingénieurs, part of the network of ENSA.
History
ENSAO was founded in 1999 to train highly qualified engineers. It is located in Oujda.
Academics
The training lasts 5 years. ENSAO and is divided into two cycles:
Preparat... |
https://en.wikipedia.org/wiki/Mbed%20TLS | Mbed TLS (previously PolarSSL) is an implementation of the TLS and SSL protocols and the respective cryptographic algorithms and support code required. It is distributed under the Apache License version 2.0. Stated on the website is that Mbed TLS aims to be "easy to understand, use, integrate and expand".
History
The ... |
https://en.wikipedia.org/wiki/Unspecified%20behavior | Unspecified behavior is behavior that may vary on different implementations of a programming language. A program can be said to contain unspecified behavior when its source code may produce an executable that exhibits different behavior when compiled on a different compiler, or on the same compiler with different setti... |
https://en.wikipedia.org/wiki/Archetype%20pattern | The Archetype pattern separates the logic from implementation; the separation is accomplished by there being two abstract classes, a decorator (for logic) and a delegate (for implementation). The Factory handles the mapping of decorator and delegate classes and returns the pair associated with a parameter or parameter... |
https://en.wikipedia.org/wiki/Khan%20Academy | Khan Academy is an American non-profit educational organization created in 2006 by Sal Khan. Its goal is creating a set of online tools that help educate students. The organization produces short lessons in the form of videos. Its website also includes supplementary practice exercises and materials for educators. It ha... |
https://en.wikipedia.org/wiki/Routing%20bridge | A routing bridge or RBridge, also known as a TRILL switch, is a network device that implements the TRILL protocol, as specified by the IETF and should not be confused with BRouters (Bridging Routers). RBridges are compatible with previous IEEE 802.1 customer bridges as well as IPv4 and IPv6 routers and end nodes. They... |
https://en.wikipedia.org/wiki/Saturation%20velocity | Saturation velocity is the maximum velocity a charge carrier in a semiconductor, generally an electron, attains in the presence of very high electric fields. When this happens, the semiconductor is said to be in a state of velocity saturation. Charge carriers normally move at an average drift speed proportional to th... |
https://en.wikipedia.org/wiki/Grindr | Grindr () is a location-based social networking and online dating application targeted towards gay, bisexual and transgender people.
It was one of the first geosocial apps for gay men when it launched in March 2009, and has since become the largest and most popular gay mobile app in the world. It is available on iOS a... |
https://en.wikipedia.org/wiki/Near-infrared%20window%20in%20biological%20tissue | The near-infrared (NIR) window (also known as optical window or therapeutic window) defines the range of wavelengths from 650 to 1350 nanometre (nm) where light has its maximum depth of penetration in tissue. Within the NIR window, scattering is the most dominant light-tissue interaction, and therefore the propagating ... |
https://en.wikipedia.org/wiki/Evolution%20of%20cells | Evolution of cells refers to the evolutionary origin and subsequent evolutionary development of cells. Cells first emerged at least 3.8 billion years ago approximately 750 million years after Earth was formed.
The first cells
The initial development of the cell marked the passage from prebiotic chemistry to partition... |
https://en.wikipedia.org/wiki/Bacteriophage%20experimental%20evolution | Experimental evolution studies are a means of testing evolutionary theory under carefully designed, reproducible experiments. Given enough time, space, and money, any organism could be used for experimental evolution studies. However, those with rapid generation times, high mutation rates, large population sizes, and ... |
https://en.wikipedia.org/wiki/Multiplex%20polymerase%20chain%20reaction | Multiplex polymerase chain reaction (Multiplex PCR) refers to the use of polymerase chain reaction to amplify several different DNA sequences simultaneously (as if performing many separate PCR reactions all together in one reaction). This process amplifies DNA in samples using multiple primers and a temperature-media... |
https://en.wikipedia.org/wiki/Native%20cloud%20application | A native cloud application (NCA) is a type of computer software that natively utilizes services and infrastructure from cloud computing providers such as Amazon EC2, Force.com, or Microsoft Azure. NCAs exhibit a combined usage of the three fundamental technologies:
Computational grid - loosely, e.g. MapReduce
Data gr... |
https://en.wikipedia.org/wiki/Fibonorial | In mathematics, the Fibonorial , also called the Fibonacci factorial, where is a nonnegative integer, is defined as the product of the first positive Fibonacci numbers, i.e.
where is the th Fibonacci number, and gives the empty product (defined as the multiplicative identity, i.e. 1).
The Fibonorial is define... |
https://en.wikipedia.org/wiki/Mineralized%20tissues | Mineralized tissues are biological tissues that incorporate minerals into soft matrices. Typically these tissues form a protective shield or structural support. Bone, mollusc shells, deep sea sponge Euplectella species, radiolarians, diatoms, antler bone, tendon, cartilage, tooth enamel and dentin are some examples of ... |
https://en.wikipedia.org/wiki/List%20of%20freeware | Freeware is software that is available for use at no monetary cost or for an optional fee, but usually (although not necessarily) closed source with one or more restricted usage rights. Freeware is in contrast to commercial software, which is typically sold for profit, but might be distributed for a business or commerc... |
https://en.wikipedia.org/wiki/LED%20tattoo | A light-emitting diode tattoo is a type of body modification similar to a tattoo, but specifically involves implantation of technologically based materials versus traditional ink injection into the layers of the skin. LED tattoos are accomplished by a combination of silicon-silk technology and a miniature lighting devi... |
https://en.wikipedia.org/wiki/SHR%20%28operating%20system%29 | SHR (formerly Stable Hybrid Release) was a community-driven Linux distribution for smartphones which was based on OpenEmbedded, Xorg, and the freesmartphone.org (FSO) framework. Several different graphical toolkits were made available, such as GTK+ and Qt.
Supported devices
The unstable and testing releases were rele... |
https://en.wikipedia.org/wiki/Furnace%20roller | A furnace roller or furnace roll is a heat resistant roller used in roller hearth furnaces and other industrial equipment. They are used to allow products to easily move into, through, and out of furnaces, kilns and ovens.
Construction
Furnace rollers consist of a cylinder (solid or hollow) or disks mounted via bearin... |
https://en.wikipedia.org/wiki/Comparison%20of%20cognitive%20architectures | The following table compares cognitive architectures.
See also
List of artificial intelligence projects
Comparison of deep-learning software
External links
A Survey of Cognitive and Agent Architectures by the Artificial Intelligence Lab, University of Michigan
A Framework for Comparing Agent Architectures by Aar... |
https://en.wikipedia.org/wiki/Systancia | Systancia is a European cybersecurity software vendor.
History
Systancia's earliest developments date back to 1998 with a product for application and desktop virtualization.
External growth enables Systancia to offer solutions for securing external access (by employees or service providers) to the information system,... |
https://en.wikipedia.org/wiki/Depolarizing%20prepulse | A depolarizing prepulse (DPP) is an electrical stimulus that causes the potential difference measured across a neuronal membrane to become more positive or less negative, and precedes another electrical stimulus. DPPs may be of either the voltage or current stimulus variety and have been used to inhibit neural activit... |
https://en.wikipedia.org/wiki/Exceptional%20isomorphism | In mathematics, an exceptional isomorphism, also called an accidental isomorphism, is an isomorphism between members ai and bj of two families, usually infinite, of mathematical objects, which is incidental, in that it is not an instance of a general pattern of such isomorphisms. These coincidences are at times conside... |
https://en.wikipedia.org/wiki/CUBRID | CUBRID ( "cube-rid") is an open-source SQL-based relational database management system (RDBMS) with object extensions developed by CUBRID Corp. for OLTP. The name CUBRID is a combination of the two words cube and bridge, cube standing for a space for data and bridge standing for data bridge.
License policy
CUBRID has... |
https://en.wikipedia.org/wiki/Slow-growing%20hierarchy | In computability theory, computational complexity theory and proof theory, the slow-growing hierarchy is an ordinal-indexed family of slowly increasing functions gα: N → N (where N is the set of natural numbers, {0, 1, ...}). It contrasts with the fast-growing hierarchy.
Definition
Let μ be a large countable ordinal ... |
https://en.wikipedia.org/wiki/Hardy%20hierarchy | In computability theory, computational complexity theory and proof theory, the Hardy hierarchy, named after G. H. Hardy, is a hierarchy of sets of numerical functions generated from an ordinal-indexed family of functions hα: N → N (where N is the set of natural numbers, {0, 1, ...}) called Hardy functions. It is relate... |
https://en.wikipedia.org/wiki/Raz-Lee | Raz-Lee Security, Inc. is an international organization that provides data security solutions for IBM's Power i servers.
The company's clients include Fiat, Agfa, Teva Pharmaceuticals, Avnet, AIG, Dun & Bradstreet and the Israel branch of American insurance company American International Group, among others.
History ... |
https://en.wikipedia.org/wiki/Voges%E2%80%93Proskauer%20test | Voges–Proskauer or VP is a test used to detect acetoin in a bacterial broth culture. The test is performed by adding alpha-naphthol and potassium hydroxide to the Voges-Proskauer broth, which is a glucose-phosphate broth that has been inoculated with bacteria. A cherry red color indicates a positive result, while a ye... |
https://en.wikipedia.org/wiki/Web%20tracking | Web tracking is the practice by which operators of websites and third parties collect, store and share information about visitors’ activities on the World Wide Web. Analysis of a user's behaviour may be used to provide content that enables the operator to infer their preferences and may be of interest to various partie... |
https://en.wikipedia.org/wiki/Monomial%20conjecture | In commutative algebra, a field of mathematics, the monomial conjecture of Melvin Hochster says the following:
Let A be a Noetherian local ring of Krull dimension d and let x1, ..., xd be a system of parameters for A (so that A/(x1, ..., xd) is an Artinian ring). Then for all positive integers t, we have
The state... |
https://en.wikipedia.org/wiki/Coordinate%20singularity | A coordinate singularity occurs when an apparent singularity or discontinuity occurs in one coordinate frame that can be removed by choosing a different frame.
An example is the apparent (longitudinal) singularity at the 90 degree latitude in spherical coordinates. An object moving due north (for example, along the l... |
https://en.wikipedia.org/wiki/Ribosomal%20intergenic%20spacer%20analysis | Ribosomal RNA (rRNA) intergenic spacer analysis (RISA) is a method of microbial community analysis that provides a means of comparing differing environments or treatment impacts without the bias imposed by culture- dependent approaches. RISA involves PCR amplification of a region of the rRNA gene operon between the sma... |
https://en.wikipedia.org/wiki/Integrity%20engineering | Technical Integrity Engineering, also known as Asset Integrity, involves various engineering disciplines that focus on making sure a product, process, or system meets its intended requirements when it's used. By applying these principles to reduce costs, maintain schedules, manage technical risks, and handle legal conc... |
https://en.wikipedia.org/wiki/Solovay%20model | In the mathematical field of set theory, the Solovay model is a model constructed by in which all of the axioms of Zermelo–Fraenkel set theory (ZF) hold, exclusive of the axiom of choice, but in which all sets of real numbers are Lebesgue measurable. The construction relies on the existence of an inaccessible cardina... |
https://en.wikipedia.org/wiki/Ashoverite | Ashoverite is one of three polymorphs of zinc hydroxide, Zn(OH)2. It is a rare mineral first found in a limestone quarry near Ashover, Derbyshire, England, in 1988. It has also been found in the Harz mountain range in Germany, and in Namibia.
The mineral was discovered after samples of the polymorph sweetite were sent... |
https://en.wikipedia.org/wiki/ACROSS%20Project | ACROSS is a Singular Strategic R&D Project led by Treelogic funded by the Spanish Ministry of Industry, Tourism and Trade activities in the field of Robotics and Cognitive Computing over an execution time-frame from 2009 to 2011. ACROSS project involves a number higher than 100 researchers from 13 Spanish entities.
AC... |
https://en.wikipedia.org/wiki/Aevum | In scholastic philosophy, the aevum (also called aeviternity) is the temporal mode of existence experienced by angels and by the saints in heaven. In some ways, it is a state that logically lies between the eternity (timelessness) of God and the temporal experience of material beings. It is sometimes referred to as "im... |
https://en.wikipedia.org/wiki/European%20Association%20for%20Structural%20Dynamics | The European Association for Structural Dynamics (EASD) is a professional body founded in 1990 to bring together members of structural dynamics community from all over Europe.
Activities
EASD oversees the organization of the European Conferences on Structural Dynamics (EURODYN) that will be held at three (or four) yea... |
https://en.wikipedia.org/wiki/Transition-edge%20sensor | A transition-edge sensor (TES) is a type of cryogenic energy sensor or cryogenic particle detector that exploits the strongly temperature-dependent resistance of the superconducting phase transition.
History
The first demonstrations of the superconducting transition's measurement potential appeared in the 1940s, 30 ye... |
https://en.wikipedia.org/wiki/Arcserve | Arcserve is a provider of data protection, replication and recovery solutions for enterprise and mid-market businesses. Arcserve was founded in 1983 as Cheyenne Software. Software vendor CA Technologies, which was then known as Computer Associates, acquired Cheyenne in 1996 and continued to develop and market the Arcse... |
https://en.wikipedia.org/wiki/K-distribution | In probability and statistics, the generalized K-distribution is a three-parameter family of continuous probability distributions.
The distribution arises by compounding two gamma distributions. In each case, a re-parametrization of the usual form of the family of gamma distributions is used, such that the parameters ... |
https://en.wikipedia.org/wiki/List%20of%20Java%20bytecode%20instructions | This is a list of the instructions that make up the Java bytecode, an abstract machine language that is ultimately executed by the Java virtual machine. The Java bytecode is generated from languages running on the Java Platform, most notably the Java programming language.
Note that any referenced "value" refers to a 3... |
https://en.wikipedia.org/wiki/Workspace%20virtualization | Workspace virtualization is a way of distributing applications to client computers using application virtualization; however, it also bundles several applications together into one complete workspace.
Overview
Workspace virtualization is an approach that encapsulates and isolates an entire computing workspace. At a mi... |
https://en.wikipedia.org/wiki/Hessenberg%20variety | In geometry, Hessenberg varieties, first studied by Filippo De Mari, Claudio Procesi, and Mark A. Shayman, are a family of subvarieties of the full flag variety which are defined by a Hessenberg function h and a linear transformation X. The study of Hessenberg varieties was first motivated by questions in numerical an... |
https://en.wikipedia.org/wiki/University%20of%20Sydney%20School%20of%20Mathematics%20and%20Statistics | The School of Mathematics and Statistics is a constituent body of the Faculty of Science at the University of Sydney, Australia. It was established in its present form in 1991.
As of 29 August 2022, the Head of School is Professor Dingxuan Zhou, and the Deputy Head of School is Professor Mary Myerscough.
The Magma co... |
https://en.wikipedia.org/wiki/Integer%20points%20in%20convex%20polyhedra | The study of integer points in convex polyhedra is motivated by questions such as "how many nonnegative integer-valued solutions does a system of linear equations with nonnegative coefficients have" or "how many solutions does an integer linear program have". Counting integer points in polyhedra or other questions abou... |
https://en.wikipedia.org/wiki/Secureworks | Secureworks Inc. is an American cybersecurity company. The company has approximately 4,000 customers in more than 50 countries, ranging from Fortune 100 companies to mid-sized businesses in a variety of industries.
It became part of Dell Technologies in February 2011 and was later the subject of an IPO to again become... |
https://en.wikipedia.org/wiki/Salt%20pork | Salt pork is salt-cured pork. It is usually prepared from pork belly, or, more rarely, fatback. Salt pork typically resembles uncut side bacon, but is fattier, being made from the lowest part of the belly, and saltier, as the cure is stronger and performed for longer, and never smoked. The fat on the meat is necessary ... |
https://en.wikipedia.org/wiki/SoftBook | SoftBook was one of the first commercial handheld e-readers produced for reading e-books that released in 1998 by SoftBook Press, Inc. of Menlo Park, California.
Overview
The SoftBook, designed by IDEO and Lunar Design, featured a brown leather cover which flipped back to give the device a more book-like feel, and was... |
https://en.wikipedia.org/wiki/Standard%20translation | In modal logic, standard translation is a logic translation that transforms formulas of modal logic into formulas of first-order logic which capture the meaning of the modal formulas. Standard translation is defined inductively on the structure of the formula. In short, atomic formulas are mapped onto unary predicates ... |
https://en.wikipedia.org/wiki/Certified%20broadcast%20radio%20engineer | Certified Broadcast Radio Engineer (CBRE) is a title granted to an individual in the United States who successfully meets the experience and test requirements of the certification, regulated by the Society of Broadcast Engineers (SBE). The CBRE title is protected by copyright laws. Individuals who use this title withou... |
https://en.wikipedia.org/wiki/Modal%20depth | In modal logic, the modal depth of a formula is the deepest nesting of modal operators (commonly and ). Modal formulas without modal operators have a modal depth of zero.
Definition
Modal depth can be defined as follows. Let be a function that computes the modal depth for a modal formula :
, where is an atomic f... |
https://en.wikipedia.org/wiki/Certified%20broadcast%20technologist | Certified Broadcast Technologist (CBT) is a title granted to an individual that successfully meets the experience or examination requirements of the certification. The certification is regulated by the Society of Broadcast Engineers (SBE). The CBT title is protected by copyright laws. Individuals who use the title with... |
https://en.wikipedia.org/wiki/Certified%20broadcast%20networking%20technologist | Certified Broadcast Networking Technologist (CBNT) is a title granted to an individual that passes the exam requirements of the certification. The certification is regulated by the Society of Broadcast Engineers (SBE) and shows competence in computer network equipment and their specialized applications. The CBNT title ... |
https://en.wikipedia.org/wiki/Certified%20broadcast%20television%20engineer | Certified Broadcast Television Engineer (CBTE) is a title granted to an individual who successfully meets the experience and examination requirements of the certification. The certification is regulated by the Society of Broadcast Engineers (SBE). The CBTE title is protected by copyright laws. Individuals who use the t... |
https://en.wikipedia.org/wiki/Certified%20senior%20broadcast%20radio%20engineer | Certified Senior Broadcast Radio Engineer (CSRE) is a title granted to an individual in the United States who successfully meets the experience and examination requirements of the certification. The certification is regulated by the Society of Broadcast Engineers (SBE). The CSRE title is protected by copyright laws. In... |
https://en.wikipedia.org/wiki/Certified%20senior%20broadcast%20television%20engineer | Certified Senior Broadcast Television Engineer (CSTE) is a title granted to an individual that successfully meets the experience and examination requirements of the certification. The certification is regulated by the Society of Broadcast Engineers (SBE). The CSTE title is protected by copyright laws. Individuals who u... |
https://en.wikipedia.org/wiki/Certified%20professional%20broadcast%20engineer | Certified Professional Broadcast Engineer (CPBE) is a title granted to an individual who already holds an SBE Senior Broadcast Engineer certification or registered as a professional electrical engineer and also successfully meets the experience and reference requirements of the certification. The certification is regul... |
https://en.wikipedia.org/wiki/Certified%20AM%20directional%20specialist | Certified AM Directional Specialist (AMD) is a specialist title granted to an individual that successfully meets the prerequisite certification and examination requirements. The certification is regulated by the Society of Broadcast Engineers (SBE), and demonstrates competence in the design and maintenance of AM Direct... |
https://en.wikipedia.org/wiki/Certified%208-VSB%20specialist | Certified 8-VSB Specialist (8-VSB) is a specialist title granted to an individual that successfully meets the prerequisite certification and examination requirements in the United States. The certification is regulated by the Society of Broadcast Engineers (SBE), and demonstrates competence in the various aspects of 8-... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.