source
stringlengths
31
203
text
stringlengths
28
2k
https://en.wikipedia.org/wiki/Egress%20filtering
In computer networking, egress filtering is the practice of monitoring and potentially restricting the flow of information outbound from one network to another. Typically, it is information from a private TCP/IP computer network to the Internet that is controlled. TCP/IP packets that are being sent out of the internal...
https://en.wikipedia.org/wiki/Bell%20jar
A bell jar is a glass jar, similar in shape to a bell (i.e. in its best-known form it is open at the bottom, while its top and sides together are a single piece), and can be manufactured from a variety of materials (ranging from glass to different types of metals). Bell jars are often used in laboratories to form and c...
https://en.wikipedia.org/wiki/Crosstalk
In electronics, crosstalk is any phenomenon by which a signal transmitted on one circuit or channel of a transmission system creates an undesired effect in another circuit or channel. Crosstalk is usually caused by undesired capacitive, inductive, or conductive coupling from one circuit or channel to another. Crosstal...
https://en.wikipedia.org/wiki/Sony%20HDVS
Sony HDVS is a range of high-definition video equipment developed in the 1980s to support an early analog high-definition television system (used in multiple sub-Nyquist sampling encoding (MUSE) broadcasts) thought to be the broadcast television systems that would be in use today. The line included professional video ...
https://en.wikipedia.org/wiki/Zolotarev%27s%20lemma
In number theory, Zolotarev's lemma states that the Legendre symbol for an integer a modulo an odd prime number p, where p does not divide a, can be computed as the sign of a permutation: where ε denotes the signature of a permutation and πa is the permutation of the nonzero residue classes mod p induced by multiplic...
https://en.wikipedia.org/wiki/Theta%20correspondence
In mathematics, the theta correspondence or Howe correspondence is a mathematical relation between representations of two groups of a reductive dual pair. The local theta correspondence relates irreducible admissible representations over a local field, while the global theta correspondence relates irreducible automorph...
https://en.wikipedia.org/wiki/Multimedia%20Broadcast%20Multicast%20Service
Multimedia Broadcast Multicast Services (MBMS) is a point-to-multipoint interface specification for existing 3GPP cellular networks, which is designed to provide efficient delivery of broadcast and multicast services, both within a cell as well as within the core network. For broadcast transmission across multiple cell...
https://en.wikipedia.org/wiki/Interstitium
The interstitium is a contiguous fluid-filled space existing between a structural barrier, such as a cell membrane or the skin, and internal structures, such as organs, including muscles and the circulatory system. The fluid in this space is called interstitial fluid, comprises water and solutes, and drains into the ly...
https://en.wikipedia.org/wiki/Potential%20isomorphism
In mathematical logic and in particular in model theory, a potential isomorphism is a collection of finite partial isomorphisms between two models which satisfies certain closure conditions. Existence of a partial isomorphism entails elementary equivalence, however the converse is not generally true, but it holds for ω...
https://en.wikipedia.org/wiki/Cerebral%20perfusion%20pressure
Cerebral perfusion pressure, or CPP, is the net pressure gradient causing cerebral blood flow to the brain (brain perfusion). It must be maintained within narrow limits because too little pressure could cause brain tissue to become ischemic (having inadequate blood flow), and too much could raise intracranial pressure...
https://en.wikipedia.org/wiki/Hiroshi%20Ishii%20%28computer%20scientist%29
is a Japanese computer scientist. He is a professor at the Massachusetts Institute of Technology. Ishii pioneered the Tangible User Interface in the field of Human-computer interaction with the paper "Tangible Bits: Towards Seamless Interfaces between People, Bits and Atoms", co-authored with his then PhD student Brygg...
https://en.wikipedia.org/wiki/Dutch%20Waterline
The Dutch Waterline (, modern spelling: Hollandse Waterlinie) was a series of water-based defences conceived by Maurice of Nassau in the early 17th century, and realised by his half brother Frederick Henry. Combined with natural bodies of water, the Waterline could be used to transform Holland, the westernmost region o...
https://en.wikipedia.org/wiki/Code%20page%20932%20%28IBM%29
IBM code page 932 (abbreviated as IBM-932 or ambiguously as CP932) is one of IBM's extensions of Shift JIS. The coded character sets are JIS X 0201:1976, JIS X 0208:1983, IBM extensions and IBM extensions for IBM 1880 UDC. It is the combination of the single-byte Code page 897 and the double-byte Code page 301. Code p...
https://en.wikipedia.org/wiki/Bauer%E2%80%93Fike%20theorem
In mathematics, the Bauer–Fike theorem is a standard result in the perturbation theory of the eigenvalue of a complex-valued diagonalizable matrix. In its substance, it states an absolute upper bound for the deviation of one perturbed matrix eigenvalue from a properly chosen eigenvalue of the exact matrix. Informally s...
https://en.wikipedia.org/wiki/Logical%20Methods%20in%20Computer%20Science
Logical Methods in Computer Science (LMCS) is a peer-reviewed open access scientific journal covering theoretical computer science and applied logic. It opened to submissions on September 1, 2004. The editor-in-chief is Stefan Milius (Friedrich-Alexander Universität Erlangen-Nürnberg). History The journal was initia...
https://en.wikipedia.org/wiki/Isobutyl%20acetate
The chemical compound isobutyl acetate, also known as 2-methylpropyl ethanoate (IUPAC name) or β-methylpropyl acetate, is a common solvent. It is produced from the esterification of isobutanol with acetic acid. It is used as a solvent for lacquer and nitrocellulose. Like many esters it has a fruity or floral smell at ...
https://en.wikipedia.org/wiki/Grass%20mountain
A grass mountain () in topography is a mountain covered with low vegetation, typically in the Alps and often steep-sided. The nature of such cover, which often grows particularly well on sedimentary rock, will reflect local conditions. Distribution The following mountain ranges of the Eastern Alps in Europe are often...
https://en.wikipedia.org/wiki/Chai%20%28symbol%29
Chai or Hai ( "living" ) is a symbol that figures prominently in modern Jewish culture; the Hebrew letters of the word are often used as a visual symbol. History According to The Jewish Daily Forward, its use as an amulet originates in 18th century Eastern Europe. Chai as a symbol goes back to medieval Spain. Letters ...
https://en.wikipedia.org/wiki/ICFP%20Programming%20Contest
The ICFP Programming Contest is an international programming competition held annually around June or July since 1998, with results announced at the International Conference on Functional Programming. Teams may be of any size and any programming language(s) may be used. There is also no entry fee. Participants have 72...
https://en.wikipedia.org/wiki/Architecture%20Analysis%20%26%20Design%20Language
The Architecture Analysis & Design Language (AADL) is an architecture description language standardized by SAE. AADL was first developed in the field of avionics, and was known formerly as the Avionics Architecture Description Language. The Architecture Analysis & Design Language is derived from MetaH, an architecture...
https://en.wikipedia.org/wiki/Google%20Base
Google Base was a database provided by Google into which any user can add almost any type of content, such as text, images, and structured information in formats such as XML, PDF, Excel, RTF, or WordPerfect. As of September 2010, the product has been downgraded to Google Merchant Center. If Google found user-added ...
https://en.wikipedia.org/wiki/Propyl%20acetate
Propyl acetate, also known as propyl ethanoate, is an organic compound. Nearly 20,000 tons are produced annually for use as a solvent. This colorless liquid is known by its characteristic odor of pears. Due to this fact, it is commonly used in fragrances and as a flavor additive. It is formed by the esterification of a...
https://en.wikipedia.org/wiki/Facilitated%20variation
The theory of facilitated variation demonstrates how seemingly complex biological systems can arise through a limited number of regulatory genetic changes, through the differential re-use of pre-existing developmental components. The theory was presented in 2005 by Marc W. Kirschner (a professor and chair at the Depart...
https://en.wikipedia.org/wiki/Direct%20numerical%20control
Direct numerical control (DNC), also known as distributed numerical control (also DNC), is a common manufacturing term for networking CNC machine tools. On some CNC machine controllers, the available memory is too small to contain the machining program (for example machining complex surfaces), so in this case the progr...
https://en.wikipedia.org/wiki/Psychology%2C%20philosophy%20and%20physiology
Psychology, philosophy and physiology (PPP) was a degree at the University of Oxford. It was Oxford's first psychology degree, beginning in 1947, but admitted its last students in October 2010. It has been, in part, replaced by psychology, philosophy, and linguistics (PPL, in which students usually study two of three s...
https://en.wikipedia.org/wiki/Truel
Truel and triel are neologisms for a duel between three opponents, in which players can fire at one another in an attempt to eliminate them while surviving themselves. Game theory overview A variety of forms of truels have been studied in game theory. Features that determine the nature of a truel include the probabil...
https://en.wikipedia.org/wiki/Certance
Certance, LLC, was a privately held company engaged in design and manufacture of computer tape drives. Based in Costa Mesa, California, Certance designed and manufactured drives using a variety of tape formats, including Travan, DDS, and Linear Tape-Open computer tape drives. Certance was one of the three original te...
https://en.wikipedia.org/wiki/Proportional-fair%20scheduling
Proportional-fair scheduling is a compromise-based scheduling algorithm. It is based upon maintaining a balance between two competing interests: Trying to maximize the total throughput of the network (wired or not) while at the same time allowing all users at least a minimal level of service. This is done by assigning ...
https://en.wikipedia.org/wiki/CVSNT
CVSNT is a version control system compatible with and originally based on Concurrent Versions System (CVS), but whereas that was popular in the open-source world, CVSNT included features designed for developers working on commercial software including support for Windows, Active Directory authentication, reserved branc...
https://en.wikipedia.org/wiki/Halochromism
A halochromic material or pH indicator is a material which changes colour when pH changes occur. The term ‘chromic’ is defined for materials that can change colour reversibly with the presence of an external factor. In this case, the factor is pH. The pH indicators have this property. Halochromic substances are suited...
https://en.wikipedia.org/wiki/Crash%20reporter
A crash reporter is usually a system software whose function is to identify reporting crash details and to alert when there are crashes, in production or on development / testing environments. Crash reports often include data such as stack traces, type of crash, trends and version of software. These reports help softwa...
https://en.wikipedia.org/wiki/Language%20binding
In programming and software design, binding is an application programming interface (API) that provides glue code specifically made to allow a programming language to use a foreign library or operating system service (one that is not native to that language). Characteristics Binding generally refers to a mapping of on...
https://en.wikipedia.org/wiki/Cant%20%28architecture%29
A cant in architecture is an angled (oblique-angled) line or surface that cuts off a corner. Something with a cant is canted. Canted facades are a typical of, but not exclusive to, Baroque architecture. The angle breaking the facade is less than a right angle, thus enabling a canted facade to be viewed as, and remain,...
https://en.wikipedia.org/wiki/Empirical%20modelling
Empirical modelling refers to any kind of (computer) modelling based on empirical observations rather than on mathematically describable relationships of the system modelled. Empirical Modelling Empirical Modelling as a variety of empirical modelling Empirical modelling is a generic term for activities that create m...
https://en.wikipedia.org/wiki/Methyl%20benzoate
Methyl benzoate is an organic compound. It is an ester with the chemical formula C6H5CO2CH3. It is a colorless liquid that is poorly soluble in water, but miscible with organic solvents. Methyl benzoate has a pleasant smell, strongly reminiscent of the fruit of the feijoa tree, and it is used in perfumery. It also ...
https://en.wikipedia.org/wiki/Angular%20diameter%20distance
In astronomy, angular diameter distance is a distance defined in terms of an object's physical size, , and its angular size, , as viewed from Earth: Cosmology dependence The angular diameter distance depends on the assumed cosmology of the universe. The angular diameter distance to an object at redshift, , is express...
https://en.wikipedia.org/wiki/Noether%20normalization%20lemma
In mathematics, the Noether normalization lemma is a result of commutative algebra, introduced by Emmy Noether in 1926. It states that for any field k, and any finitely generated commutative k-algebra A, there exist algebraically independent elements y1, y2, ..., yd in A such that A is a finitely generated module over ...
https://en.wikipedia.org/wiki/Mobile%20daughter%20card
The mobile daughter card, also known as an MDC or CDC (communications daughter card), is a notebook version of the AMR slot on the motherboard of a desktop computer. It is designed to interface with special Ethernet (EDC), modem (MDC) or bluetooth (BDC) cards. Intel MDC specification 1.0 In 1999, Intel published a spe...
https://en.wikipedia.org/wiki/Virokine
Virokines are proteins encoded by some large DNA viruses that are secreted by the host cell and serve to evade the host's immune system. Such proteins are referred to as virokines if they resemble cytokines, growth factors, or complement regulators; the term viroceptor is sometimes used if the proteins resemble cellula...
https://en.wikipedia.org/wiki/Infinite%20regress
An infinite regress is an infinite series of entities governed by a recursive principle that determines how each entity in the series depends on or is produced by its predecessor. In the epistemic regress, for example, a belief is justified because it is based on another belief that is justified. But this other belief ...
https://en.wikipedia.org/wiki/Bell%27s%20law%20of%20computer%20classes
Bell's law of computer classes formulated by Gordon Bell in 1972 describes how types of computing systems (referred to as computer classes) form, evolve and may eventually die out. New classes of computers create new applications resulting in new markets and new industries. Description Bell considers the law to be par...
https://en.wikipedia.org/wiki/Atomic%20model%20%28mathematical%20logic%29
In model theory, a subfield of mathematical logic, an atomic model is a model such that the complete type of every tuple is axiomatized by a single formula. Such types are called principal types, and the formulas that axiomatize them are called complete formulas. Definitions Let T be a theory. A complete type p(x1, ....
https://en.wikipedia.org/wiki/Disjunctive%20sum
In the mathematics of combinatorial games, the sum or disjunctive sum of two games is a game in which the two games are played in parallel, with each player being allowed to move in just one of the games per turn. The sum game finishes when there are no moves left in either of the two parallel games, at which point (i...
https://en.wikipedia.org/wiki/Foxconn
Hon Hai Precision Industry Co., Ltd., trading as Hon Hai Technology Group in China and Taiwan and Foxconn internationally, is a Taiwanese multinational electronics contract manufacturer established in 1974 with headquarters in Tucheng, New Taipei City, Taiwan. In 2021, the company's annual revenue reached () and was r...
https://en.wikipedia.org/wiki/Arming%20plug
An arming plug is a small plug that is fitted into flight hardware to enable functions that, for instrument or personnel safety, should not be activated before flight. In the case of a missile or bomb, the (lack of the) arming plug prevents explosion before flight; in the case of a spacecraft or scientific sounding ro...
https://en.wikipedia.org/wiki/Meagher%20Electronics
Meagher Electronics was a Monterey, California, company which was founded in 1947 by Jim Meagher. It included a recording studio which recorded early demos for Joan Baez, her sister, Mimi Farina and her sister's husband, Richard Farina. The company also repaired all sorts of home entertainment equipment, focusing on p...
https://en.wikipedia.org/wiki/Adaptive%20beamformer
An adaptive beamformer is a system that performs adaptive spatial signal processing with an array of transmitters or receivers. The signals are combined in a manner which increases the signal strength to/from a chosen direction. Signals to/from other directions are combined in a benign or destructive manner, resulting ...
https://en.wikipedia.org/wiki/Information%20privacy%20law
Information privacy, data privacy or data protection laws provide a legal framework on how to obtain, use and store data of natural persons. The various laws around the world describe the rights of natural persons to control who is using its data. This includes usually the right to get details on which data is stored, ...
https://en.wikipedia.org/wiki/Map-coloring%20games
Several map-coloring games are studied in combinatorial game theory. The general idea is that we are given a map with regions drawn in but with not all the regions colored. Two players, Left and Right, take turns coloring in one uncolored region per turn, subject to various constraints, as in the map-coloring problem...
https://en.wikipedia.org/wiki/Working%20set
Working set is a concept in computer science which defines the amount of memory that a process requires in a given time interval. Definition Peter Denning (1968) defines "the working set of information of a process at time to be the collection of information referenced by the process during the process time interval...
https://en.wikipedia.org/wiki/Mathematics%20Subject%20Classification
The Mathematics Subject Classification (MSC) is an alphanumerical classification scheme that has collaboratively been produced by staff of, and based on the coverage of, the two major mathematical reviewing databases, Mathematical Reviews and Zentralblatt MATH. The MSC is used by many mathematics journals, which ask au...
https://en.wikipedia.org/wiki/Frangipane
Frangipane ( ), is a sweet almond-flavored custard, typical in French pastry, used in a variety of ways, including cakes and such pastries as the Bakewell tart, conversation tart, Jésuite and pithivier. A French spelling from a 1674 cookbook is franchipane, with the earliest modern spelling coming from a 1732 confectio...
https://en.wikipedia.org/wiki/Environmental%20change
Environmental change is a change or disturbance of the environment most often caused by human influences and natural ecological processes. Environmental changes include various factors, such as natural disasters, human interferences, or animal interaction. Environmental change encompasses not only physical changes, but...
https://en.wikipedia.org/wiki/Null%20%28mathematics%29
In mathematics, the word null (from meaning "zero", which is from meaning "none") is often associated with the concept of zero or the concept of nothing. It is used in varying context from "having zero members in a set" (e.g., null set) to "having a value of zero" (e.g., null vector). In a vector space, the null vec...
https://en.wikipedia.org/wiki/Rent%27s%20rule
Rent's rule pertains to the organization of computing logic, specifically the relationship between the number of external signal connections to a logic block (i.e., the number of "pins") with the number of logic gates in the logic block, and has been applied to circuits ranging from small digital circuits to mainframe ...
https://en.wikipedia.org/wiki/Charismatic%20megafauna
Charismatic megafauna are animal species that are large—in the relevant category that they represent—with symbolic value or widespread popular appeal, and are often used by environmental activists to gain public support for environmentalist goals. Examples include tigers, lions, jaguars, hippopotamuses, elephants, gori...
https://en.wikipedia.org/wiki/Preferential%20entailment
Preferential entailment is a non-monotonic logic based on selecting only models that are considered the most plausible. The plausibility of models is expressed by an ordering among models called a preference relation, hence the name preference entailment. Formally, given a propositional formula and an ordering over p...
https://en.wikipedia.org/wiki/Software%20token
A software token (a.k.a. soft token) is a piece of a two-factor authentication security device that may be used to authorize the use of computer services. Software tokens are stored on a general-purpose electronic device such as a desktop computer, laptop, PDA, or mobile phone and can be duplicated. (Contrast hardware ...
https://en.wikipedia.org/wiki/Combined%20sewer
A combined sewer is a type of gravity sewer with a system of pipes, tunnels, pump stations etc. to transport sewage and urban runoff together to a sewage treatment plant or disposal site. This means that during rain events, the sewage gets diluted, resulting in higher flowrates at the treatment site. Uncontaminated sto...
https://en.wikipedia.org/wiki/Delay-locked%20loop
In electronics, a delay-locked loop (DLL) is a pseudo-digital circuit similar to a phase-locked loop (PLL), with the main difference being the absence of an internal voltage-controlled oscillator, replaced by a delay line. A DLL can be used to change the phase of a clock signal (a signal with a periodic waveform), usu...
https://en.wikipedia.org/wiki/Teleradiology
Teleradiology is the transmission of radiological patient images from procedures such as x-rays photographs, Computed tomography (CT), and MRI imaging, from one location to another for the purposes of sharing studies with other radiologists and physicians. Teleradiology allows radiologists to provide services without a...
https://en.wikipedia.org/wiki/Q%20meter
A Q meter is a piece of equipment used in the testing of radio frequency circuits. It has been largely replaced in professional laboratories by other types of impedance measuring devices, though it is still in use among radio amateurs. It was developed at Boonton Radio Corporation in Boonton, New Jersey in 1934 by Will...
https://en.wikipedia.org/wiki/Big%20Numbers%20%28comics%29
Big Numbers is an unfinished graphic novel by writer Alan Moore and artist Bill Sienkiewicz. In 1990 Moore's short-lived imprint Mad Love published two of the planned twelve issues. The series was picked up by Kevin Eastman's Tundra Publishing, but the completed third issue did not print, and the remaining issues, whos...
https://en.wikipedia.org/wiki/Folk%20theorem%20%28game%20theory%29
In game theory, folk theorems are a class of theorems describing an abundance of Nash equilibrium payoff profiles in repeated games . The original Folk Theorem concerned the payoffs of all the Nash equilibria of an infinitely repeated game. This result was called the Folk Theorem because it was widely known among game ...
https://en.wikipedia.org/wiki/Helge%20Tverberg
Helge Arnulf Tverberg (March 6, 1935December 28, 2020) was a Norwegian mathematician. He was a professor in the Mathematics Department at the University of Bergen, his speciality being combinatorics; he retired at the mandatory age of seventy. He was born in Bergen. He took the cand.real. degree at the University of B...
https://en.wikipedia.org/wiki/4C%20Entity
The 4C Entity is a digital rights management (DRM) consortium formed by IBM, Intel, Panasonic and Toshiba that has established and licensed interoperable cryptographic protection mechanisms for removable media technologies. 4C Entity was founded in 1999 when Warner Music approached the companies to develop stronger DRM...
https://en.wikipedia.org/wiki/Zeta%20function%20regularization
In mathematics and theoretical physics, zeta function regularization is a type of regularization or summability method that assigns finite values to divergent sums or products, and in particular can be used to define determinants and traces of some self-adjoint operators. The technique is now commonly applied to proble...
https://en.wikipedia.org/wiki/Motion%20detector
A motion detector is an electrical device that utilizes a sensor to detect nearby motion. Such a device is often integrated as a component of a system that automatically performs a task or alerts a user of motion in an area. They form a vital component of security, automated lighting control, home control, energy effic...
https://en.wikipedia.org/wiki/Glass%20break%20detector
A glass break detector is a sensor that detects if a pane of glass has been shattered or broken. These sensors are commonly used near glass doors or glass storefront windows. They are widely used in electronic burglar-alarm systems. The detection process begins with a microphone that picks up noises and vibrations ...
https://en.wikipedia.org/wiki/Minification%20%28programming%29
Minification (also minimisation or minimization) is the process of removing all unnecessary characters from the source code of interpreted programming languages or markup languages without changing its functionality. These unnecessary characters usually include white space characters, new line characters, comments, and...
https://en.wikipedia.org/wiki/Tribometer
A tribometer is an instrument that measures tribological quantities, such as coefficient of friction, friction force, and wear volume, between two surfaces in contact. It was invented by the 18th century Dutch scientist Musschenbroek A tribotester is the general name given to a machine or device used to perform tests ...
https://en.wikipedia.org/wiki/Newton%E2%80%93Euler%20equations
In classical mechanics, the Newton–Euler equations describe the combined translational and rotational dynamics of a rigid body. Traditionally the Newton–Euler equations is the grouping together of Euler's two laws of motion for a rigid body into a single equation with 6 components, using column vectors and matrices. T...
https://en.wikipedia.org/wiki/Business%20Process%20Model%20and%20Notation
Business Process Model and Notation (BPMN) is a graphical representation for specifying business processes in a business process model. Originally developed by the Business Process Management Initiative (BPMI), BPMN has been maintained by the Object Management Group (OMG) since the two organizations merged in 2005. Ve...
https://en.wikipedia.org/wiki/Maximum%20entropy%20thermodynamics
In physics, maximum entropy thermodynamics (colloquially, MaxEnt thermodynamics) views equilibrium thermodynamics and statistical mechanics as inference processes. More specifically, MaxEnt applies inference techniques rooted in Shannon information theory, Bayesian probability, and the principle of maximum entropy. The...
https://en.wikipedia.org/wiki/List%20of%20recombinant%20proteins
The following is a list of notable proteins that are produced from recombinant DNA, using biomolecular engineering. In many cases, recombinant human proteins have replaced the original animal-derived version used in medicine. The prefix "rh" for "recombinant human" appears less and less in the literature. A much larger...
https://en.wikipedia.org/wiki/Projective%20object
In category theory, the notion of a projective object generalizes the notion of a projective module. Projective objects in abelian categories are used in homological algebra. The dual notion of a projective object is that of an injective object. Definition An object in a category is projective if for any epimorphis...
https://en.wikipedia.org/wiki/De%20Rham%E2%80%93Weil%20theorem
In algebraic topology, the De Rham–Weil theorem allows computation of sheaf cohomology using an acyclic resolution of the sheaf in question. Let be a sheaf on a topological space and a resolution of by acyclic sheaves. Then where denotes the -th sheaf cohomology group of with coefficients in The De R...
https://en.wikipedia.org/wiki/Hi%20no%20Tori%20Hououhen%20%28MSX%29
is a 1987 video game for the MSX2 developed by Konami, produced alongside a similarly named game for the Famicom. Both games are based on the series and story arc with the same names. It is in essence a Knightmare-like vertical scrolling shooter with the player viewing his character on the back and enemies and obstacl...
https://en.wikipedia.org/wiki/Formal%20moduli
In mathematics, formal moduli are an aspect of the theory of moduli spaces (of algebraic varieties or vector bundles, for example), closely linked to deformation theory and formal geometry. Roughly speaking, deformation theory can provide the Taylor polynomial level of information about deformations, while formal modul...
https://en.wikipedia.org/wiki/Goal%20programming
Goal programming is a branch of multiobjective optimization, which in turn is a branch of multi-criteria decision analysis (MCDA). It can be thought of as an extension or generalisation of linear programming to handle multiple, normally conflicting objective measures. Each of these measures is given a goal or target va...
https://en.wikipedia.org/wiki/Asian%20Pacific%20Mathematics%20Olympiad
The Asian Pacific Mathematics Olympiad (APMO) starting from 1989 is a regional mathematics competition which involves countries from the Asian Pacific region. The United States also takes part in the APMO. Every year, APMO is held in the afternoon of the second Monday of March for participating countries in the North ...
https://en.wikipedia.org/wiki/Ingress%20filtering
In computer networking, ingress filtering is a technique used to ensure that incoming packets are actually from the networks from which they claim to originate. This can be used as a countermeasure against various spoofing attacks where the attacker's packets contain fake IP addresses. Spoofing is often used in denial-...
https://en.wikipedia.org/wiki/Length%20function
In the mathematical field of geometric group theory, a length function is a function that assigns a number to each element of a group. Definition A length function L : G → R+ on a group G is a function satisfying: Compare with the axioms for a metric and a filtered algebra. Word metric An important example of a len...
https://en.wikipedia.org/wiki/Primary%20ideal
In mathematics, specifically commutative algebra, a proper ideal Q of a commutative ring A is said to be primary if whenever xy is an element of Q then x or yn is also an element of Q, for some n > 0. For example, in the ring of integers Z, (pn) is a primary ideal if p is a prime number. The notion of primary ideals i...
https://en.wikipedia.org/wiki/Icemaker
An icemaker, ice generator, or ice machine may refer to either a consumer device for making ice, found inside a home freezer; a stand-alone appliance for making ice, or an industrial machine for making ice on a large scale. The term "ice machine" usually refers to the stand-alone appliance. The ice generator is the pa...
https://en.wikipedia.org/wiki/MOO
A MOO ("MUD, object-oriented") is a text-based online virtual reality system to which multiple users (players) are connected at the same time. The term MOO is used in two distinct, but related, senses. One is to refer to those programs descended from the original MOO server, and the other is to refer to any MUD that u...
https://en.wikipedia.org/wiki/Credential%20service%20provider
A credential service provider (CSP) is a trusted entity that issues security tokens or electronic credentials to subscribers. A CSP forms part of an authentication system, most typically identified as a separate entity in a Federated authentication system. A CSP may be an independent third party, or may issue credentia...
https://en.wikipedia.org/wiki/Evidence%20Eliminator
Evidence Eliminator is a computer software program that runs on Microsoft Windows operating systems at least through Windows 7. The program deletes hidden information from the user's hard drive that normal procedures may fail to delete. Such "cleaner" or "eraser" programs typically overwrite previously allocated disk s...
https://en.wikipedia.org/wiki/Zemmix
Zemmix was a trade mark and brand name of the South Korean electronics company Daewoo Electronics Co., Ltd. It was an MSX-based video game console brand whose name is no longer in use. Under the name Zemmix, Daewoo released a series of gaming consoles compatible with the MSX home computer standards. The consoles were ...
https://en.wikipedia.org/wiki/Hierarchical%20task%20network
In artificial intelligence, hierarchical task network (HTN) planning is an approach to automated planning in which the dependency among actions can be given in the form of hierarchically structured networks. Planning problems are specified in the hierarchical task network approach by providing a set of tasks, which ca...
https://en.wikipedia.org/wiki/Glossy%20display
A glossy display is an electronic display with a glossy surface. In certain light environments, glossy displays provide better color intensity and contrast ratios than matte displays. The primary disadvantage of these displays is their tendency to reflect any external light, often resulting in an undesirable glare. T...
https://en.wikipedia.org/wiki/FrostWire
FrostWire is a free and open-source BitTorrent client first released in September 2004, as a fork of LimeWire. It was initially very similar to LimeWire in appearance and functionality, but over time developers added more features, including support for the BitTorrent protocol. In version 5, support for the Gnutella ne...
https://en.wikipedia.org/wiki/Brewer%20and%20Nash%20model
The Brewer and Nash model was constructed to provide information security access controls that can change dynamically. This security model, also known as the Chinese wall model, was designed to provide controls that mitigate conflict of interest in commercial organizations and is built upon an information flow model. ...
https://en.wikipedia.org/wiki/Graham%E2%80%93Denning%20model
The Graham–Denning model is a computer security model that shows how subjects and objects should be securely created and deleted. It also addresses how to assign specific access rights. It is mainly used in access control mechanisms for distributed systems. There are three main parts to the model: A set of subjects, a ...
https://en.wikipedia.org/wiki/Security%20modes
Generally, security modes refer to information systems security modes of operations used in mandatory access control (MAC) systems. Often, these systems contain information at various levels of security classification. The mode of operation is determined by: The type of users who will be directly or indirectly acce...
https://en.wikipedia.org/wiki/Mohammad%20Fahim%20Dashty
Mohammad Fahim Dashty ( 1973 – 4 or 5 September 2021) was an Afghan journalist, politician and military official. In 2021, he served as spokesman of the National Resistance Front of Afghanistan during the Republican insurgency in Afghanistan. Biography Born around 1973, Dashty was the nephew of Afghan politician, Abdu...
https://en.wikipedia.org/wiki/Computer%20security%20model
A computer security model is a scheme for specifying and enforcing security policies. A security model may be founded upon a formal model of access rights, a model of computation, a model of distributed computing, or no particular theoretical grounding at all. A computer security model is implemented through a computer...
https://en.wikipedia.org/wiki/Operations%20security
Operations security (OPSEC) or operational security is a process that identifies critical information to determine whether friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that elimina...
https://en.wikipedia.org/wiki/Ternary%20computer
A ternary computer, also called trinary computer, is one that uses ternary logic (i.e., base 3) instead of the more common binary system (i.e., base 2) in its calculations. This means it uses trits (instead of bits, as most computers do). Types of states Ternary computing deals with three discrete states, but the ter...
https://en.wikipedia.org/wiki/Web%20content%20development
Web content development is the process of researching, writing, gathering, organizing, and editing information for publication on websites. Website content may consist of prose, graphics, pictures, recordings, movies, or other digital assets that could be distributed by a hypertext transfer protocol server, and viewed ...