source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/ToolTalk
ToolTalk is an interapplication communications system developed by Sun Microsystems (SunSoft) in order to allow applications to communicate with each other at runtime. Applications supporting ToolTalk can construct "high-level" messages and hand them off to the system's ToolTalk server, which determines the proper re...
https://en.wikipedia.org/wiki/Jtest
Jtest is an automated Java software testing and static analysis product developed by Parasoft. The product includes technology for data-flow analysis, unit test-case generation and execution, static analysis, and more. Jtest is used by companies such as Cisco Systems and TransCore. It is also used by Lockheed Martin fo...
https://en.wikipedia.org/wiki/Object%20orgy
In computer programming, an object orgy is a situation in which objects are insufficiently encapsulated via information hiding, allowing unrestricted access to their internals. This is a common failure (or anti-pattern) in object-oriented design or object-oriented programming, and it can lead to increased maintenance n...
https://en.wikipedia.org/wiki/Microgrid
A microgrid is a local electrical grid with defined electrical boundaries, acting as a single and controllable entity. It is able to operate in grid-connected and in island mode. A 'Stand-alone microgrid' or 'isolated microgrid' only operates off-the-grid and cannot be connected to a wider electric power system. A gri...
https://en.wikipedia.org/wiki/Gerard%20J.%20Holzmann
Gerard J. Holzmann (born 1951) is a Dutch-American computer scientist and researcher at Bell Labs and NASA, best known as the developer of the SPIN model checker. Biography Holzmann was born in Amsterdam, Netherlands and received an Engineer's degree in electrical engineering from the Delft University of Technology i...
https://en.wikipedia.org/wiki/Brun%27s%20theorem
In number theory, Brun's theorem states that the sum of the reciprocals of the twin primes (pairs of prime numbers which differ by 2) converges to a finite value known as Brun's constant, usually denoted by B2 . Brun's theorem was proved by Viggo Brun in 1919, and it has historical importance in the introduction of sie...
https://en.wikipedia.org/wiki/Call%20sign
In broadcasting and radio communications, a call sign (also known as a call name or call letters—and historically as a call signal—or abbreviated as a call) is a unique identifier for a transmitter station. A call sign can be formally assigned by a government agency, informally adopted by individuals or organizations, ...
https://en.wikipedia.org/wiki/Carboxymethyl%20cellulose
Carboxymethyl cellulose (CMC) or cellulose gum is a cellulose derivative with carboxymethyl groups (-CH2-COOH) bound to some of the hydroxyl groups of the glucopyranose monomers that make up the cellulose backbone. It is often used as its sodium salt, sodium carboxymethyl cellulose. It used to be marketed under the nam...
https://en.wikipedia.org/wiki/Evolutionary%20grade
A grade is a taxon united by a level of morphological or physiological complexity. The term was coined by British biologist Julian Huxley, to contrast with clade, a strictly phylogenetic unit. Phylogenetics In order to fully understand evolutionary grades, one must first get a better understanding of phylogenetics: th...
https://en.wikipedia.org/wiki/Handle%20decompositions%20of%203-manifolds
In mathematics, a handle decomposition of a 3-manifold allows simplification of the original 3-manifold into pieces which are easier to study. Heegaard splittings An important method used to decompose into handlebodies is the Heegaard splitting, which gives us a decomposition in two handlebodies of equal genus. Exam...
https://en.wikipedia.org/wiki/Proof%20complexity
In logic and theoretical computer science, and specifically proof theory and computational complexity theory, proof complexity is the field aiming to understand and analyse the computational resources that are required to prove or refute statements. Research in proof complexity is predominantly concerned with proving p...
https://en.wikipedia.org/wiki/Sun%20outage
A Sun outage, Sun transit, or Sun fade is an interruption in or distortion of geostationary satellite signals caused by interference (background noise) of the Sun when it falls directly behind a satellite which an Earth station is trying to receive data from or transmit data to. It usually occurs briefly to such satel...
https://en.wikipedia.org/wiki/Apple%2080-Column%20Text%20Card
The Apple 80-Column Text Card is an expansion card for the Apple IIe computer to give it the option of displaying 80 columns of text instead of 40 columns. Two models were available; the cheaper 80-column card has just enough extra RAM to double the video memory capacity, and the Extended 80-Column Text Card has an ad...
https://en.wikipedia.org/wiki/TV80
The Sinclair TV80, also known as the Flat Screen Pocket TV or FTV1, was a pocket television released by Sinclair Research in September 1983. Unlike Sinclair's earlier attempts at a portable television, the TV80 used a flat CRT with a side-mounted electron gun instead of a conventional CRT; the picture was made to appea...
https://en.wikipedia.org/wiki/Zoomed%20video%20port
In computing, a zoomed video port (often simply ZV port) is a unidirectional video bus allowing a device in a PC card slot to transfer video data directly into a VGA frame buffer, so as to allow laptops to display real-time video. The standard was created by the PCMCIA to allow devices such as TV tuners, video inputs a...
https://en.wikipedia.org/wiki/Robust%20Header%20Compression
Robust Header Compression (ROHC) is a standardized method to compress the IP, UDP, UDP-Lite, RTP, and TCP headers of Internet packets. The need for header compression In streaming applications, the overhead of IP, UDP, and RTP is 40 bytes for IPv4, or 60 bytes for IPv6. For VoIP, this corresponds to around 60% of the...
https://en.wikipedia.org/wiki/Unbalanced%20line
In telecommunications and electrical engineering in general, an unbalanced line is a pair of conductors intended to carry electrical signals, which have unequal impedances along their lengths and to ground and other circuits. Examples of unbalanced lines are coaxial cable or the historic earth return system invented fo...
https://en.wikipedia.org/wiki/Tier%202%20network
A Tier 2 network is an Internet service provider which engages in the practice of peering with other networks, but which also purchases IP transit to reach some portion of the Internet. Tier 2 providers are the most common Internet service providers, as it is much easier to purchase transit from a Tier 1 network than ...
https://en.wikipedia.org/wiki/Piophila
Piophila is a genus of small flies which includes the species known as the cheese fly. Both Piophila species feed on carrion, including human corpses. Description Piophila are small dark flies with unmarked wings. The setulae (fine hairs) on the thorax are confined to three distinct rows. Species There are two specie...
https://en.wikipedia.org/wiki/Change%20control%20board
In software development, projects and programs, a change control board (CCB) is a committee that consists of Subject Matter Experts (SME, e.g. software engineers, testing experts, etc.) and Managers (e.g. Quality Assurance managers), who decide whether to implement proposed changes to a project. The main objective of a...
https://en.wikipedia.org/wiki/Work%20at%20home%20parent
A work at home parent is someone who conducts remote work from home and integrates parenting into his or her working time and workspace. They are sometimes referred to as a WAHM (work at home mom) or a WAHD (work at home dad). People work from home for a variety of reasons, including lower business expenses, personal ...
https://en.wikipedia.org/wiki/Quaternionic%20projective%20space
In mathematics, quaternionic projective space is an extension of the ideas of real projective space and complex projective space, to the case where coordinates lie in the ring of quaternions Quaternionic projective space of dimension n is usually denoted by and is a closed manifold of (real) dimension 4n. It is a hom...
https://en.wikipedia.org/wiki/Photobleaching
In optics, photobleaching (sometimes termed fading) is the photochemical alteration of a dye or a fluorophore molecule such that it is permanently unable to fluoresce. This is caused by cleaving of covalent bonds or non-specific reactions between the fluorophore and surrounding molecules. Such irreversible modification...
https://en.wikipedia.org/wiki/Compaq%20Portable%20II
The Compaq Portable II is the fourth product in the Compaq Portable series to be brought out by Compaq Computer Corporation. Released in 1986 at a price of US$3499, the Portable II much improved upon its predecessor, the Compaq 286, which had been Compaq's version of the PC AT in the original Compaq Portable chassis; P...
https://en.wikipedia.org/wiki/Mercurial
Mercurial is a distributed revision control tool for software developers. It is supported on Microsoft Windows and Unix-like systems, such as FreeBSD, macOS, and Linux. Mercurial's major design goals include high performance and scalability, decentralization, fully distributed collaborative development, robust handlin...
https://en.wikipedia.org/wiki/ISO/IEC%2010967
ISO/IEC 10967, Language independent arithmetic (LIA), is a series of standards on computer arithmetic. It is compatible with ISO/IEC/IEEE 60559:2011, more known as IEEE 754-2008, and much of the specifications are for IEEE 754 special values (though such values are not required by LIA itself, unless the parameter iec55...
https://en.wikipedia.org/wiki/ICL%202900%20Series
The ICL 2900 Series was a range of mainframe computer systems announced by the British manufacturer ICL on 9 October 1974. The company had started development under the name "New Range" immediately on its formation in 1968. The range was not designed to be compatible with any previous machines produced by the company, ...
https://en.wikipedia.org/wiki/L-notation
L-notation is an asymptotic notation analogous to big-O notation, denoted as for a bound variable tending to infinity. Like big-O notation, it is usually used to roughly convey the rate of growth of a function, such as the computational complexity of a particular algorithm. Definition It is defined as where c is a ...
https://en.wikipedia.org/wiki/Base36
Base36 is a binary-to-text encoding scheme that represents binary data in an ASCII string format by translating it into a radix-36 representation. The choice of 36 is convenient in that the digits can be represented using the Arabic numerals 0–9 and the Latin letters A–Z (the ISO basic Latin alphabet). Each base36 dig...
https://en.wikipedia.org/wiki/Sofrito
(Spanish, ), (Catalan, ), (Italian, ), or (Portuguese, ) is a basic preparation in Mediterranean, Latin American, Spanish, Italian and Portuguese cooking. It typically consists of aromatic ingredients cut into small pieces and sautéed or braised in cooking oil for a long period of time over a low heat. In modern S...
https://en.wikipedia.org/wiki/Pair%20of%20pants%20%28mathematics%29
In mathematics, a pair of pants is a surface which is homeomorphic to the three-holed sphere. The name comes from considering one of the removed disks as the waist and the two others as the cuffs of a pair of pants. Pairs of pants are used as building blocks for compact surfaces in various theories. Two important appl...
https://en.wikipedia.org/wiki/Mid-range
In statistics, the mid-range or mid-extreme is a measure of central tendency of a sample defined as the arithmetic mean of the maximum and minimum values of the data set: The mid-range is closely related to the range, a measure of statistical dispersion defined as the difference between maximum and minimum values. Th...
https://en.wikipedia.org/wiki/Programming%20complexity
Programming complexity (or software complexity) is a term that includes software properties that affect internal interactions. Several commentators distinguish between the terms "complex" and "complicated". Complicated implies being difficult to understand, but ultimately knowable. Complex, by contrast, describes the i...
https://en.wikipedia.org/wiki/Heat%20gun
A heat gun is a device used to emit a stream of hot air, usually at temperatures between , with some hotter models running around , which can be held by hand. Heat guns usually have the form of an elongated body pointing at what is to be heated, with a handle fixed to it at right angles and a pistol grip trigger in the...
https://en.wikipedia.org/wiki/Computational%20model
A computational model uses computer programs to simulate and study complex systems using an algorithmic or mechanistic approach and is widely used in a diverse range of fields spanning from physics, engineering, chemistry and biology to economics, psychology, cognitive science and computer science. The system under s...
https://en.wikipedia.org/wiki/Windows%20Firewall
Windows Firewall (officially called Microsoft Defender Firewall in Windows 10 version 2004 and later) is a firewall component of Microsoft Windows. It was first included in Windows XP SP2 and Windows Server 2003 SP1. Before the release of Windows XP Service Pack 2, it was known as the "Internet Connection Firewall." O...
https://en.wikipedia.org/wiki/Algebra%20i%20Logika
Algebra i Logika (English: Algebra and Logic) is a peer-reviewed Russian mathematical journal founded in 1962 by Anatoly Ivanovich Malcev, published by the Siberian Fund for Algebra and Logic at Novosibirsk State University. An English translation of the journal is published by Springer-Verlag as Algebra and Logic sinc...
https://en.wikipedia.org/wiki/Component-based%20software%20engineering
Component-based software engineering (CBSE), also called component-based development (CBD), is a style of software engineering that aims to build software out of loosely-coupled, modular components. It emphasizes the separation of concerns among different parts of a software system. Definition and characteristics of c...
https://en.wikipedia.org/wiki/Compression%20theorem
In computational complexity theory, the compression theorem is an important theorem about the complexity of computable functions. The theorem states that there exists no largest complexity class, with computable boundary, which contains all computable functions. Compression theorem Given a Gödel numbering of the co...
https://en.wikipedia.org/wiki/G.%20Mike%20Reed
George Michael ("Mike") Reed is an American computer scientist. He has contributed to theoretical computer science in general and CSP in particular. Mike Reed has a doctorate in pure mathematics from Auburn University, United States, and a doctorate in computation from Oxford University, England. He has an interest in...
https://en.wikipedia.org/wiki/Marcel-Paul%20Sch%C3%BCtzenberger
Marcel-Paul "Marco" Schützenberger (24 October 1920 – 29 July 1996) was a French mathematician and Doctor of Medicine. He worked in the fields of formal language, combinatorics, and information theory. In addition to his formal results in mathematics, he was "deeply involved in [a] struggle against the votaries of [ne...
https://en.wikipedia.org/wiki/John%20Fitzgerald%20%28computer%20scientist%29
John S. Fitzgerald FBCS (born 1965) is a British computer scientist. He is a professor at Newcastle University. He was the head of the School of Computing before taking on the role of Dean of Strategic Projects in the university’s Faculty of Science, Agriculture and Engineering. His research interests are in the area ...
https://en.wikipedia.org/wiki/Marconi%20Prize
The Marconi Prize is an annual award recognizing achievements and advancements made in field of communications (radio, mobile, wireless, telecommunications, data communications, networks, and Internet). The prize is awarded by the Marconi Society, and it includes a $100,000 honorarium and a work of sculpture. Recipient...
https://en.wikipedia.org/wiki/Early%20completion
Early completion is a property of some classes of asynchronous circuit. It means that the output of a circuit may be available as soon as sufficient inputs have arrived to allow it to be determined. For example, if all of the inputs to a mux have arrived, and all are the same, but the select line has not yet arrived, t...
https://en.wikipedia.org/wiki/Clock%20gating
In computer architecture, clock gating is a popular power management technique used in many synchronous circuits for reducing dynamic power dissipation, by removing the clock signal when the circuit is not in use or ignores clock signal. Clock gating saves power by pruning the clock tree, at the cost of adding more log...
https://en.wikipedia.org/wiki/Quasi-delay-insensitive%20circuit
In digital logic design, an asynchronous circuit is quasi delay-insensitive (QDI) when it operates correctly, independent of gate and wire delay with the weakest exception necessary to be turing-complete. Overview Pros Robust to process variation, temperature fluctuation, circuit redesign, and FPGA remapping. Natur...
https://en.wikipedia.org/wiki/Larmor%20formula
In electrodynamics, the Larmor formula is used to calculate the total power radiated by a nonrelativistic point charge as it accelerates. It was first derived by J. J. Larmor in 1897, in the context of the wave theory of light. When any charged particle (such as an electron, a proton, or an ion) accelerates, energy is...
https://en.wikipedia.org/wiki/Don%20Sannella
Donald T. Sannella FRSE is professor of computer science in the Laboratory for Foundations of Computer Science, at the School of Informatics, University of Edinburgh, Scotland. Sannella graduated from Yale University, University of California, Berkeley and University of Edinburgh with degrees in computer science. His ...
https://en.wikipedia.org/wiki/%CE%98%20%28set%20theory%29
In set theory, Θ (pronounced like the letter theta) is the least nonzero ordinal α such that there is no surjection from the reals onto α. If the axiom of choice (AC) holds (or even if the reals can be wellordered), then Θ is simply , the cardinal successor of the cardinality of the continuum. However, Θ is often stu...
https://en.wikipedia.org/wiki/AD%2B
In set theory, AD+ is an extension, proposed by W. Hugh Woodin, to the axiom of determinacy. The axiom, which is to be understood in the context of ZF plus DC (the axiom of dependent choice for real numbers), states two things: Every set of reals is ∞-Borel. For any ordinal λ less than Θ, any subset A of ωω, and any ...
https://en.wikipedia.org/wiki/Squirrel%20%28programming%20language%29
Squirrel is a high level imperative, object-oriented programming language, designed to be a lightweight scripting language that fits in the size, memory bandwidth, and real-time requirements of applications like video games. MirthKit, a simple toolkit for making and distributing open source, cross-platform 2D games, u...
https://en.wikipedia.org/wiki/IEEE%20802.1D
IEEE 802.1D is the Ethernet MAC bridges standard which includes bridging, Spanning Tree Protocol and others. It is standardized by the IEEE 802.1 working group. It includes details specific to linking many of the other 802 projects including the widely deployed 802.3 (Ethernet), 802.11 (Wireless LAN) and 802.16 (WiMax...
https://en.wikipedia.org/wiki/Dreambox
Dreambox is a series of Linux-powered DVB satellite, terrestrial and cable digital television receivers (set-top boxes), produced by German multimedia vendor Dream Multimedia. History and description The Linux-based production software originally used by Dreambox was originally developed for DBox2, by the Tuxbox proj...
https://en.wikipedia.org/wiki/Electrocoagulation
Electrocoagulation (EC) is a technique used for wastewater treatment, wash water treatment, industrially processed water, and medical treatment. Electrocoagulation has become a rapidly growing area of wastewater treatment due to its ability to remove contaminants that are generally more difficult to remove by filtrati...
https://en.wikipedia.org/wiki/Jim%20Woodcock
James Charles Paul Woodcock is a British computer scientist. Woodcock gained his PhD from the University of Liverpool. Until 2001 he was Professor of Software Engineering at the Oxford University Computing Laboratory, where he was also a Fellow of Kellogg College. He then joined the University of Kent and is now base...
https://en.wikipedia.org/wiki/Marching%20tetrahedra
Marching tetrahedra is an algorithm in the field of computer graphics to render implicit surfaces. It clarifies a minor ambiguity problem of the marching cubes algorithm with some cube configurations. It was originally introduced in 1991. While the original marching cubes algorithm was protected by a software patent, ...
https://en.wikipedia.org/wiki/Servomotor
A servomotor (or servo motor or simply servo (to be differentiated from servomechanism, which may also be called a servo)) is a rotary actuator or linear actuator that allows for precise control of angular or linear position, velocity, and acceleration in a mechanical system. It consists of a suitable motor coupled to ...
https://en.wikipedia.org/wiki/Electrochemical%20gradient
An electrochemical gradient is a gradient of electrochemical potential, usually for an ion that can move across a membrane. The gradient consists of two parts: The chemical gradient, or difference in solute concentration across a membrane. The electrical gradient, or difference in charge across a membrane. When th...
https://en.wikipedia.org/wiki/Infineon%20TriCore
TriCore is a 32-bit microcontroller architecture from Infineon. It unites the elements of a RISC processor core, a microcontroller and a DSP in one chip package. History and background In 1999, Infineon launched the first generation of AUDO (Automotive unified processor) which is based on what the company describes as...
https://en.wikipedia.org/wiki/QWK%20%28file%20format%29
QWK is a file-based offline mail reader format that was popular among bulletin board system (BBS) users, especially users of FidoNet and other networks that generated large volumes of mail. QWK was originally developed by Mark "Sparky" Herring in 1987 for systems running the popular PCBoard bulletin board system, but i...
https://en.wikipedia.org/wiki/HNN%20extension
In mathematics, the HNN extension is an important construction of combinatorial group theory. Introduced in a 1949 paper Embedding Theorems for Groups by Graham Higman, Bernhard Neumann, and Hanna Neumann, it embeds a given group G into another group G' , in such a way that two given isomorphic subgroups of G are conj...
https://en.wikipedia.org/wiki/Lacida
The Lacida, also called LCD, was a Polish rotor cipher machine. It was designed and produced before World War II by Poland's Cipher Bureau for prospective wartime use by Polish military higher commands. History The machine's name derived from the surname initials of Gwido Langer, Maksymilian Ciężki and Ludomir Danile...
https://en.wikipedia.org/wiki/Simulated%20pregnancy
A simulated pregnancy is a deliberate attempt to create the impression of pregnancy. It should not be confused with false pregnancy, where a person mistakenly believes that they are pregnant. Techniques People who wish to look pregnant, generally for social, sexual, psychological or entertainment purposes, have the ...
https://en.wikipedia.org/wiki/Tonicity
In chemical biology, tonicity is a measure of the effective osmotic pressure gradient; the water potential of two solutions separated by a partially-permeable cell membrane. Tonicity depends on the relative concentration of selective membrane-impermeable solutes across a cell membrane which determine the direction and ...
https://en.wikipedia.org/wiki/Interrupt%20vector%20table
An interrupt vector table (IVT) is a data structure that associates a list of interrupt handlers with a list of interrupt requests in a table of interrupt vectors. Each entry of the interrupt vector table, called an interrupt vector, is the address of an interrupt handler(also known as ISR). While the concept is common...
https://en.wikipedia.org/wiki/In-system%20programming
In-system programming (ISP), or also called in-circuit serial programming (ICSP), is the ability of some programmable logic devices, microcontrollers, chipsets and other embedded devices to be programmed while installed in a complete system, rather than requiring the chip to be programmed prior to installing it into th...
https://en.wikipedia.org/wiki/Open%20Content%20Alliance
The Open Content Alliance (OCA) was a consortium of organizations contributing to a permanent, publicly accessible archive of digitized texts. Its creation was announced in October 2005 by Yahoo!, the Internet Archive, the University of California, the University of Toronto and others. Scanning for the Open Content All...
https://en.wikipedia.org/wiki/FOSS.IN
FOSS.IN, previously known as Linux Bangalore, was an annual free and open source software (FOSS) conference, held in Bangalore, India from 2001 to 2012. From 2001 to 2004, it was known as Linux Bangalore, before it took on a new name and wider focus. During its lifetime, it was one of the largest FOSS events in Asia, w...
https://en.wikipedia.org/wiki/Openfiler
Openfiler is an operating system that provides file-based network-attached storage and block-based storage area network. It was created by Xinit Systems, and is based on the CentOS Linux distribution. It is free software licensed under the GNU GPLv2 History The Openfiler codebase was started at Xinit Systems in 2001...
https://en.wikipedia.org/wiki/Bit%20banging
In computer engineering and electrical engineering, bit banging is a "term of art" for any method of data transmission that employs software as a substitute for dedicated hardware to generate transmitted signals or process received signals. Software directly sets and samples the states of GPIOs (e.g., pins on a microco...
https://en.wikipedia.org/wiki/Low-force%20helix
A low-force helix (LFH-60) is a 60-pin electrical connector (four rows of 15 pins) with signals for two digital and analog connectors. Each of the pins is twisted approximately 45 degrees between the tip and the plastic frame which holds the pins in place. Hence "helix" in the name. The DMS-59 is a derivative of the...
https://en.wikipedia.org/wiki/Delta%20method
In statistics, the delta method is a result concerning the approximate probability distribution for a function of an asymptotically normal statistical estimator from knowledge of the limiting variance of that estimator. History The delta method was derived from propagation of error, and the idea behind was known in t...
https://en.wikipedia.org/wiki/Dynamic%20Logical%20Partitioning
Dynamic Logical Partitioning (DLPAR), is the capability of a logical partition (LPAR) to be reconfigured dynamically, without having to shut down the operating system that runs in the LPAR. DLPAR enables memory, CPU capacity, and I/O interfaces to be moved nondisruptively between LPARs within the same server. DLPAR ha...
https://en.wikipedia.org/wiki/RNA%20editing
RNA editing (also RNA modification) is a molecular process through which some cells can make discrete changes to specific nucleotide sequences within an RNA molecule after it has been generated by RNA polymerase. It occurs in all living organisms and is one of the most evolutionarily conserved properties of RNAs. RNA e...
https://en.wikipedia.org/wiki/Slim%20Devices
Slim Devices, Inc. was a consumer electronics company based in Mountain View, California, United States. Their main product was the Squeezebox network music player which connects to a home ethernet or Wi-Fi network, and allows the owner to stream digital audio over the network to a stereo. The company, founded in 2000...
https://en.wikipedia.org/wiki/DataTAC
DataTAC is a wireless data network technology originally developed by Mobile Data International which was later acquired by Motorola, who jointly developed it with IBM and deployed in the United States as ARDIS (Advanced Radio Data Information Services). DataTAC was also marketed in the mid-1990s as MobileData by Tele...
https://en.wikipedia.org/wiki/GEOnet%20Names%20Server
The GEOnet Names Server (GNS), sometimes also referred to in official documentation as Geographic Names Data or geonames in domain and email addresses, is a service that provides access to the United States National Geospatial-Intelligence Agency's (NGA) and the US Board on Geographic Names's (BGN) database of geograph...
https://en.wikipedia.org/wiki/Arbiter%20%28electronics%29
Arbiters are electronic devices that allocate access to shared resources. Bus arbiter There are multiple ways to perform a computer bus arbitration, with the most popular varieties being: dynamic centralized parallel where one central arbiter is used for all masters as discussed in this article; centralized serial ...
https://en.wikipedia.org/wiki/Immerman%E2%80%93Szelepcs%C3%A9nyi%20theorem
In computational complexity theory, the Immerman–Szelepcsényi theorem states that nondeterministic space complexity classes are closed under complementation. It was proven independently by Neil Immerman and Róbert Szelepcsényi in 1987, for which they shared the 1995 Gödel Prize. In its general form the theorem states t...
https://en.wikipedia.org/wiki/EDN%20%28magazine%29
EDN is an electronics industry website and formerly a magazine owned by AspenCore Media, an Arrow Electronics company. The editor-in-chief is Majeed Ahmad. EDN was published monthly until, in April 2013, EDN announced that the print edition would cease publication after the June 2013 issue. History The first issue of ...
https://en.wikipedia.org/wiki/Generation%E2%80%93recombination%20noise
Generation–recombination noise, or g–r noise, is a type of electrical signal noise caused statistically by the fluctuation of the generation and recombination of electrons in semiconductor-based photon detectors. References See also Noise Noise (audio) – residual low level "hiss or hum" Noise (electronic) – rela...
https://en.wikipedia.org/wiki/Exact%20cover
In the mathematical field of combinatorics, given a collection of subsets of a set , an exact cover is a subcollection of such that each element in is contained in exactly one subset in . One says that each element in is covered by exactly one subset in . An exact cover is a kind of cover. In other words, is a p...
https://en.wikipedia.org/wiki/Channel%20length%20modulation
Channel length modulation (CLM) is an effect in field effect transistors, a shortening of the length of the inverted channel region with increase in drain bias for large drain biases. The result of CLM is an increase in current with drain bias and a reduction of output resistance. It is one of several short-channel eff...
https://en.wikipedia.org/wiki/Class-T%20amplifier
Class T was a registered trademark for a switching (class-D) audio amplifier, used for Tripath's amplifier technologies (patent filed on Jun 20, 1996). Similar designs have now been widely adopted by different manufacturers. Amplifier The covered products use a class-D amplifier combined with proprietary techniques to...
https://en.wikipedia.org/wiki/Algorithmic%20information%20theory
Algorithmic information theory (AIT) is a branch of theoretical computer science that concerns itself with the relationship between computation and information of computably generated objects (as opposed to stochastically generated), such as strings or any other data structure. In other words, it is shown within algori...
https://en.wikipedia.org/wiki/Knightmare%20%281986%20video%20game%29
Knightmare is a 1986 vertically scrolling shooter video game developed and published by Konami for the MSX home computer. It was included in compilations for the MSX, PlayStation and Sega Saturn, followed by a port for mobile phones, and digital re-releases for the Virtual Console and Microsoft Windows. It is the first...
https://en.wikipedia.org/wiki/Philip%20Wadler
Philip Lee Wadler (born April 8, 1956) is a UK-based American computer scientist known for his contributions to programming language design and type theory. He is the chair of theoretical computer science at the Laboratory for Foundations of Computer Science at the School of Informatics, University of Edinburgh. He ha...
https://en.wikipedia.org/wiki/List%20of%20PDF%20software
This is a list of links to articles on software used to manage Portable Document Format (PDF) documents. The distinction between the various functions is not entirely clear-cut; for example, some viewers allow adding of annotations, signatures, etc. Some software allows redaction, removing content irreversibly for secu...
https://en.wikipedia.org/wiki/The%20Goonies%20%28MSX%20video%20game%29
The Goonies is a 1986 platform game by Konami for the MSX based on the film of the same name. The music is a simple rendition of the song "The Goonies 'R' Good Enough", by Cyndi Lauper. Gameplay The Goonies is a platform and puzzle game, featuring five 'scenes'. After each successfully completed scene, a key word is g...
https://en.wikipedia.org/wiki/JSP%20model%201%20architecture
In the design of Java Web applications, there are two commonly used design models, referred to as Model 1 and Model 2. In Model 1, a request is made to a JSP or servlet and then that JSP or servlet handles all responsibilities for the request, including processing the request, validating data, handling the business lo...
https://en.wikipedia.org/wiki/King%27s%20Valley%20II
King's Valley II: The Seal of El Giza is a game for MSX1 and MSX2 computers by Konami. It is a sequel to King's Valley from 1985. The MSX2 version only saw a release in Japan. The same goes for a very rare "contest" version. The contest was about making levels with the games' built-in level editor, held by four Japane...
https://en.wikipedia.org/wiki/Compunet
Compunet was a United Kingdom-based interactive service provider, catering primarily for the Commodore 64 but later for the Amiga and Atari ST. It was also known by its users as CNet. It ran from 1984 to May 1993. Overview Compunet hosted a wide range of content, and users were permitted to create their own sections ...
https://en.wikipedia.org/wiki/Transport%20triggered%20architecture
In computer architecture, a transport triggered architecture (TTA) is a kind of processor design in which programs directly control the internal transport buses of a processor. Computation happens as a side effect of data transports: writing data into a triggering port of a functional unit triggers the functional unit ...
https://en.wikipedia.org/wiki/CISPR
The Comité International Spécial des Perturbations Radioélectriques (CISPR; ) was founded in 1934 to set standards for controlling electromagnetic interference in electrical and electronic devices and is a part of the International Electrotechnical Commission (IEC). Organization CISPR is composed of six technical an...
https://en.wikipedia.org/wiki/Traffic%20flow
In mathematics and transportation engineering, traffic flow is the study of interactions between travellers (including pedestrians, cyclists, drivers, and their vehicles) and infrastructure (including highways, signage, and traffic control devices), with the aim of understanding and developing an optimal transport netw...
https://en.wikipedia.org/wiki/Router%20on%20a%20stick
A router on a stick, also known as a one-armed router, is a router that has a single physical or logical connection to a network. It is a method of inter-VLAN routing where one router is connected to a switch via a single cable. The router has physical connections to the broadcast domains where one or more VLANs requi...
https://en.wikipedia.org/wiki/Helium%20mass%20spectrometer
A helium mass spectrometer is an instrument commonly used to detect and locate small leaks. It was initially developed in the Manhattan Project during World War II to find extremely small leaks in the gas diffusion process of uranium enrichment plants. It typically uses a vacuum chamber in which a sealed container fill...
https://en.wikipedia.org/wiki/Vendor%20Independent%20Messaging
VIM (Vendor Independent Messaging) was a standard API for applications to integrate with e-mail on Windows 3.x, proposed by Lotus, Borland, IBM & Novell in the early 1990s. Its main competitor was Microsoft's MAPI, which was the eventual winner of the MAPI v. VIM war. Ultimately, the choice of VIM or MAPI did not make ...
https://en.wikipedia.org/wiki/Bit%20manipulation
Bit manipulation is the act of algorithmically manipulating bits or other pieces of data shorter than a word. Computer programming tasks that require bit manipulation include low-level device control, error detection and correction algorithms, data compression, encryption algorithms, and optimization. For most other ta...
https://en.wikipedia.org/wiki/Municipal%20wireless%20network
A municipal wireless network is a citywide wireless network. This usually works by providing municipal broadband via Wi-Fi to large parts or all of a municipal area by deploying a wireless mesh network. The typical deployment design uses hundreds of wireless access points deployed outdoors, often on poles. The operator...