text
stringlengths
16
172k
source
stringlengths
32
122
Incomputer science, an algorithm formatching wildcards(also known asglobbing) is useful in comparing text strings that may containwildcard syntax.[1]Common uses of these algorithms includecommand-line interfaces, e.g. theBourne shell[2]orMicrosoft Windowscommand-line[3]or text editor or file manager, as well as the int...
https://en.wikipedia.org/wiki/Matching_wildcards
Intheoretical computer scienceandformal language theory, aregular tree grammaris aformal grammarthat describes a set ofdirected trees, orterms.[1]Aregular word grammarcan be seen as a special kind of regular tree grammar, describing a set of single-pathtrees. A regular tree grammarGis defined by the tuple G= (N, Σ,Z,...
https://en.wikipedia.org/wiki/Regular_tree_grammar
Incomputer science,Thompson's constructionalgorithm, also called theMcNaughton–Yamada–Thompson algorithm,[1]is a method of transforming aregular expressioninto an equivalentnondeterministic finite automaton(NFA).[2]This NFA can be used tomatch stringsagainst the regular expression. This algorithm is credited toKen Tho...
https://en.wikipedia.org/wiki/Thompson%27s_construction
Inautomata theory, afinite-state machineis called adeterministic finite automaton(DFA), if Anondeterministic finite automaton(NFA), ornondeterministic finite-state machine, does not need to obey these restrictions. In particular, every DFA is also an NFA. Sometimes the termNFAis used in a narrower sense, referring to ...
https://en.wikipedia.org/wiki/Nondeterministic_finite_automaton
Collective intelligenceCollective actionSelf-organized criticalityHerd mentalityPhase transitionAgent-based modellingSynchronizationAnt colony optimizationParticle swarm optimizationSwarm behaviour Social network analysisSmall-world networksCentralityMotifsGraph theoryScalingRobustnessSystems biologyDynamic networks ...
https://en.wikipedia.org/wiki/Cybernetics
Ahorn analyzeris a test instrument dedicated to determine theresonanceandanti-resonancefrequencies ofultrasonicparts such astransducers, converters, horns/sonotrodesand acoustic stacks, which are used forultrasonic welding, cutting,cleaning, medical and industrial applications. In addition, digital horn analyzers are a...
https://en.wikipedia.org/wiki/Horn_analyzer
This is alist ofsensorssorted by sensor type. Speed sensors are machines used to detect the speed of an object, usually a transport vehicle. They include:
https://en.wikipedia.org/wiki/List_of_sensors
Atactile sensoris a device that measures information arising from physical interaction with its environment. Tactile sensors are generally modeled after the biological sense ofcutaneous touchwhich is capable of detecting stimuli resulting from mechanical stimulation, temperature, and pain (although pain sensing is not ...
https://en.wikipedia.org/wiki/Tactile_sensor
Backtrackingis a class ofalgorithmsfor finding solutions to somecomputational problems, notablyconstraint satisfaction problems, that incrementally builds candidates to the solutions, and abandons a candidate ("backtracks") as soon as it determines that the candidate cannot possibly be completed to a valid solution.[1]...
https://en.wikipedia.org/wiki/Backtracking
Incomputer science, achart parseris a type ofparsersuitable forambiguous grammars(including grammars ofnatural languages). It uses thedynamic programmingapproach—partial hypothesized results are stored in a structure called a chart and can be re-used. This eliminatesbacktrackingand prevents acombinatorial explosion. C...
https://en.wikipedia.org/wiki/Chart_parser
Incomputer science, acompiler-compilerorcompiler generatoris a programming tool that creates aparser,interpreter, orcompilerfrom some form of formal description of aprogramming languageand machine. The most common type of compiler-compiler is called aparser generator.[1]It handles onlysyntactic analysis. A formal des...
https://en.wikipedia.org/wiki/Compiler-compiler
Innatural language processing,deterministic parsingrefers toparsingalgorithmsthat do notbacktrack.LR-parsersare an example. (This meaning of the words "deterministic" and "non-deterministic" differs from that used to describenondeterministic algorithms.) The deterministic behavior is desired and expected incompilingpr...
https://en.wikipedia.org/wiki/Deterministic_parsing
TheDMS Software Reengineering Toolkitis a proprietary set ofprogram transformationtools available for automating custom source program analysis, modification, translation or generation of software systems for arbitrary mixtures of source languages for large scale software systems.[1]DMS was originally motivated by a th...
https://en.wikipedia.org/wiki/DMS_Software_Reengineering_Toolkit
Agrammar checker, incomputingterms, is aprogram, or part of a program, that attempts to verify written text forgrammatical correctness. Grammar checkers are most often implemented as a feature of a larger program, such as aword processor, but are also available as a stand-aloneapplicationthat can be activated from with...
https://en.wikipedia.org/wiki/Grammar_checker
Aninverse parser, as its name suggests, is aparserthat works in reverse. Rather than the user typing into the computer, the computer presents a list of words fitting the context, and excludes words that would be unreasonable. This ensures the user knows all of their options. The concept and an implementation were origi...
https://en.wikipedia.org/wiki/Inverse_parser
Incomputer science, anLALR parser[a](look-ahead, left-to-right, rightmost derivation parser) is part of the compiling process where human readable text is converted into a structured representation to be read by computers. An LALR parser is a software tool to process (parse) text into a very specific internal represent...
https://en.wikipedia.org/wiki/LALR_parser
Incomputer science, aleft corner parseris a type ofchart parserused for parsingcontext-free grammars. It combines the top-down and bottom-up approaches of parsing. The name derives from the use of theleft cornerof the grammar's production rules. An early description of a left corner parser is "A Syntax-Oriented Transl...
https://en.wikipedia.org/wiki/Left_corner_parser
Lexical tokenizationis conversion of a text into (semantically or syntactically) meaningfullexical tokensbelonging to categories defined by a "lexer" program. In case of a natural language, those categories include nouns, verbs, adjectives, punctuations etc. In case of a programming language, the categories includeiden...
https://en.wikipedia.org/wiki/Lexical_analysis
Incomputer science, anoperator-precedence parseris abottom-up parserthat interprets anoperator-precedence grammar. For example, mostcalculatorsuse operator-precedence parsers to convert from the human-readableinfix notationrelying onorder of operationsto a format that is optimized for evaluation such asReverse Polish n...
https://en.wikipedia.org/wiki/Pratt_parser
Aprogram transformationis any operation that takes acomputer programand generates another program. In many cases the transformed program is required to besemantically equivalentto the original, relative to a particularformal semanticsand in fewer cases the transformations result in programs that semantically differ fro...
https://en.wikipedia.org/wiki/Program_transformation
Shallow parsing(alsochunkingorlightparsing) is an analysis of asentencewhich first identifies constituent parts of sentences (nouns, verbs, adjectives, etc.) and then links them to higher order units that have discrete grammatical meanings (noungroups orphrases, verb groups, etc.). While the most elementary chunking al...
https://en.wikipedia.org/wiki/Shallow_parsing
Sentence processingtakes place whenever a reader or listener processes a language utterance, either in isolation or in thecontextof a conversation or a text. Many studies of the human language comprehension process have focused on reading of single utterances (sentences) without context. Extensive research has shown th...
https://en.wikipedia.org/wiki/Sentence_processing
Incomputer science,automatic programming[1]is a type ofcomputer programmingin which some mechanism generates acomputer program, to allow humanprogrammersto write the code at a higher abstraction level. There has been little agreement on the precise definition of automatic programming, mostly because its meaning has ch...
https://en.wikipedia.org/wiki/Source_code_generation
Amorphomeis a function in linguistics which is purelymorphologicalor has an irreducibly morphological component. The term is particularly used byMartin Maiden[1]followingMark Aronoff's identification of morphomic functions and the morphomic level—a level of linguistic structure intermediate between and independent ofp...
https://en.wikipedia.org/wiki/Morphome_(linguistics)
Morphological typologyis awayof classifying the languages of the world that groups languages according to their commonmorphologicalstructures. The field organizes languages on the basis of how those languages formwordsby combiningmorphemes.Analyticlanguages contain very littleinflection, instead relying on features lik...
https://en.wikipedia.org/wiki/Morphological_richness
Grammaticalization(also known asgrammatizationorgrammaticization) is alinguisticprocess in which words change from representing objects or actions to servinggrammaticalfunctions. Grammaticalization can involvecontent words, such asnounsandverbs, developing into newfunction wordsthat express grammatical relationships am...
https://en.wikipedia.org/wiki/Grammaticalization
Incomputing,multitaskingis theconcurrentexecution of multiple tasks (also known asprocesses) over a certain period of time. New tasks can interrupt already started ones before they finish, instead of waiting for them to end. As a result, a computer executes segments of multiple tasks in an interleaved manner, while th...
https://en.wikipedia.org/wiki/Computer_multitasking
Cooperative multitasking, also known asnon-preemptive multitasking, is acomputer multitaskingtechnique in which theoperating systemnever initiates acontext switchfrom a runningprocessto another process. Instead, in order to run multiple applications concurrently, processes voluntarilyyield controlperiodically or when i...
https://en.wikipedia.org/wiki/Cooperative_multitasking
Theactivity selection problemis acombinatorial optimizationproblem concerning the selection of non-conflictingactivitiesto perform within a giventime frame, given a set of activities each marked by a start time (si) and finish time (fi). The problem is to select the maximum number of activities that can be performed by...
https://en.wikipedia.org/wiki/Activity_selection_problem
Incomputer scienceforOperating systems,aging(US English) orageingis aschedulingtechnique used to avoidstarvation.Fixed priority schedulingis a scheduling discipline, in whichtasksqueued for utilizing a system resource are assigned a priority each. A task with a high priority is allowed to access a specific system resou...
https://en.wikipedia.org/wiki/Aging_(scheduling)
Automated planning and scheduling, sometimes denoted as simplyAI planning,[1]is a branch ofartificial intelligencethat concerns the realization ofstrategiesor action sequences, typically for execution byintelligent agents,autonomous robotsandunmanned vehicles. Unlike classicalcontrolandclassificationproblems, the solut...
https://en.wikipedia.org/wiki/Automated_planning_and_scheduling
Acyclic executive[1][2]is an alternative to areal-time operating system. It is a form ofcooperative multitasking, in which there is only onetask. The sole task is typically realized as an infinite loop inmain(), e.g. inC. The basic scheme is to cycle through a repeating sequence of activities, at a set frequency (a....
https://en.wikipedia.org/wiki/Cyclic_executive
Dynamic priority schedulingis a type ofscheduling algorithmin which the priorities are calculated during the execution of the system. The goal of dynamic priority scheduling is to adapt to dynamically changing progress and to form an optimal configuration in a self-sustained manner. It can be very hard to produce well-...
https://en.wikipedia.org/wiki/Dynamic_priority_scheduling
Foreground-backgroundis ascheduling algorithmthat is used to control an execution of multiple processes on a single processor. It is based on two waiting lists, the first one is calledforegroundbecause this is the one in which all processes initially enter, and the second one is calledbackgroundbecause all processes, a...
https://en.wikipedia.org/wiki/Foreground-background
Aninterruptible operating systemis anoperating systemwith ability to handle multipleinterruptsconcurrently, or in other words, which allow interrupts to be interrupted. Concurrent interrupt handling essentially mean concurrent execution ofkernelcode and hence induces the additional complexity of concurrency control in...
https://en.wikipedia.org/wiki/Interruptible_operating_system
Least slack time(LST)schedulingis analgorithmfordynamic priority scheduling. It assigns priorities to processes based on theirslack time. Slack time is the amount of time left after a job if the job was started now. This algorithm is also known asleast laxity first. Its most common use is inembedded systems, especially...
https://en.wikipedia.org/wiki/Least_slack_time_scheduling
Lottery schedulingis aprobabilisticscheduling algorithmforprocessesin anoperating system. Processes are each assigned some number oflottery tickets, and theschedulerdraws a random ticket to select the next process. The distribution of tickets need not be uniform; granting a process more tickets provides it a relative h...
https://en.wikipedia.org/wiki/Lottery_scheduling
Incomputer science,priority inversionis a scenario inschedulingin which a high-prioritytaskis indirectly superseded by a lower-priority task, effectively inverting the assigned priorities of the tasks. This violates the priority model that high-priority tasks can only be prevented from running by higher-priority tasks....
https://en.wikipedia.org/wiki/Priority_inversion
In amultitaskingcomputersystem,processesmay occupy a variety ofstates. These distinct states may not be recognized as such by theoperating systemkernel. However, they are a useful abstraction for the understanding of processes. The following typical process states are possible on computer systems of all kinds. In mo...
https://en.wikipedia.org/wiki/Process_states
Queueing theoryis the mathematical study ofwaiting lines, orqueues.[1]A queueing model is constructed so that queue lengths and waiting time can be predicted.[1]Queueing theory is generally considered a branch ofoperations researchbecause the results are often used when making business decisions about the resources nee...
https://en.wikipedia.org/wiki/Queuing_theory
Incomputer science,rate-monotonic scheduling(RMS)[1]is a priority assignment algorithm used inreal-time operating systems(RTOS) with a static-priority scheduling class.[2]The static priorities are assigned according to the cycle duration of the job, so a shorter cycle duration results in a higher job priority. These o...
https://en.wikipedia.org/wiki/Rate-monotonic_scheduling
Schedulingis the process of arranging, controlling and optimizing work and workloads in aproductionprocess ormanufacturingprocess. Scheduling is used to allocate plant and machinery resources, planhuman resources, plan production processes andpurchasematerials. It is an important tool formanufacturingandengineering, w...
https://en.wikipedia.org/wiki/Scheduling_(production_processes)
Stochastic schedulingconcernsschedulingproblems involving random attributes, such as random processing times, random due dates, random weights, and stochastic machine breakdowns. Major applications arise in manufacturing systems, computer systems, communication systems, logistics and transportation, and machine learnin...
https://en.wikipedia.org/wiki/Stochastic_scheduling
ATime/Utility Function(TUF), néeTime/Value Function, specifies the application-specificutilitythat anaction(e.g., computational task, mechanical movement) yields depending on its completion time.[1][2]TUFs and their utility interpretations (semantics), scales, and values are derived from application domain-specific sub...
https://en.wikipedia.org/wiki/Time-utility_function
Amultiprocessor(MP)systemis defined as "a system with more than oneprocessor", and, more precisely, "a number of central processing units linked together to enable parallel processing to take place".[1][2][3] The key objective of a multiprocessor is to boost a system's execution speed. The other objectives are fault t...
https://en.wikipedia.org/wiki/Multiprocessor_system_architecture
Symmetric multiprocessingorshared-memory multiprocessing[1](SMP) involves amultiprocessorcomputer hardware and software architecture where two or more identical processors are connected to a single, sharedmain memory, have full access to all input and output devices, and are controlled by a single operating system inst...
https://en.wikipedia.org/wiki/Symmetric_multiprocessing
Anasymmetric multiprocessing(AMPorASMP) system is amultiprocessorcomputer system where not all of the multiple interconnected central processing units (CPUs) are treated equally. For example, a system might allow (either at the hardware oroperating systemlevel) only one CPU to execute operating system code or might all...
https://en.wikipedia.org/wiki/Asymmetric_multiprocessing
Amulti-core processor(MCP) is amicroprocessoron a singleintegrated circuit(IC) with two or more separatecentral processing units(CPUs), calledcoresto emphasize their multiplicity (for example,dual-coreorquad-core). Each core reads and executesprogram instructions,[1]specifically ordinaryCPU instructions(such as add, mo...
https://en.wikipedia.org/wiki/Multi-core_processor
Binary Modular Dataflow Machine(BMDFM) is a software package that enables running an application in parallel on shared memorysymmetric multiprocessing(SMP) computers using the multiple processors to speed up the execution of single applications. BMDFM automatically identifies and exploits parallelism due to the static ...
https://en.wikipedia.org/wiki/BMDFM
Inmultiprocessorcomputer systems,software lockoutis the issue of performance degradation due to the idle wait times spent by theCPUsinkernel-levelcritical sections. Software lockout is the major cause ofscalabilitydegradation in a multiprocessor system, posing a limit on the maximum useful number of processors. To miti...
https://en.wikipedia.org/wiki/Software_lockout
OpenHMPP(HMPP[1]for Hybrid Multicore Parallel Programming) - programming standard forheterogeneous computing. Based on a set of compiler directives, standard is a programming model designed to handlehardware acceleratorswithout the complexity associated withGPU programming. This approach based on directives has been im...
https://en.wikipedia.org/wiki/OpenHMPP
In computer science,asynchronous I/O(alsonon-sequential I/O) is a form ofinput/outputprocessing that permits otherprocessingto continue before the I/O operation has finished. A name used for asynchronous I/O in the Windows API isoverlapped I/O. Input and output(I/O) operations on a computer can be extremely slow compa...
https://en.wikipedia.org/wiki/Asynchronous_I/O
Incomputer science,I/O boundrefers to a condition in which the time it takes to complete acomputationis determined principally by the period spent waiting forinput/outputoperations to be completed, which can be juxtaposed with beingCPU bound. This circumstance arises when the rate at whichdatais requested is slower tha...
https://en.wikipedia.org/wiki/I/O_bound
In computing, aninput deviceis a piece of equipment used to provide data and control signals to an information processing system, such as a computer or information appliance. Examples of input devices includekeyboards,computer mice,scanners, cameras,joysticks, andmicrophones. Input devices can be categorized based on:...
https://en.wikipedia.org/wiki/Input_device
Anoutput deviceis any piece ofcomputer hardwarethat converts information or data into a human-perceptible form or, historically, into a physical machine-readable form for use with other non-computerized equipment. It can be text, graphics, tactile, audio, or video. Examples includemonitors,printersandsound cards. In a...
https://en.wikipedia.org/wiki/Output_device
This is alist of university networks, showing formalized cooperations among institutions of tertiary education.
https://en.wikipedia.org/wiki/List_of_university_networks
Nettwerk Music Groupis an independent record label founded in 1984.[1][2] The Vancouver-based company was created by principalsTerry McBrideand Mark Jowett[2]as a record label to distribute recordings by the bandMoev, but the label expanded in Canada and internationally.[2]Initially specializing inelectronic musicincl...
https://en.wikipedia.org/wiki/Nettwerk
Netzwerkis theGermanword for "network". It may also refer to:
https://en.wikipedia.org/wiki/Netzwerk_(disambiguation)
The following tables compare general and technical information for a number offile systems. Note that in addition to the below table, block capabilities can be implemented below the file system layer in Linux (LVM, integritysetup,cryptsetup) or Windows (Volume Shadow Copy Service,SECURITY), etc. "Online" and "offline...
https://en.wikipedia.org/wiki/Comparison_of_file_systems
Computer data storageordigital data storageis a technology consisting ofcomputercomponents andrecording mediathat are used to retaindigital data. It is a core function and fundamental component of computers.[1]: 15–16 Thecentral processing unit(CPU) of a computer is what manipulates data by performing computations. In...
https://en.wikipedia.org/wiki/Computer_data_storage
Adisk quotais a limit set by asystem administratorthat restricts certain aspects offile systemusage on modernoperating systems. The function of using disk quotas is to allocate limited disk space in a reasonable way.[1] There are two basic types of disk quotas. The first, known as ausage quotaorblock quota, limits the...
https://en.wikipedia.org/wiki/Disk_quota
The following lists identify, characterize, and link to more thorough information onfile systems. Many olderoperating systemssupport only their one "native" file system, which does not bear any name apart from the name of the operating system itself. Disk file systems are usually block-oriented. Files in a block-orien...
https://en.wikipedia.org/wiki/List_of_file_systems
This is a list of theshellcommandsof the most recent version of the Portable Operating System Interface (POSIX) –IEEEStd 1003.1-2024 which is part of theSingle UNIX Specification(SUS). These commands are implemented in many shells on modernUnix,Unix-likeand otheroperating systems. This list does not cover commands for ...
https://en.wikipedia.org/wiki/List_of_Unix_commands
Incomputing, adirectory structureis the way anoperating systemarrangesfilesthat are accessible to the user. Files are typically displayed in ahierarchical tree structure. Afilenameis a string used to uniquely identify a file stored on this structure. Before the advent of32-bitoperating systems, file names were typical...
https://en.wikipedia.org/wiki/Directory_structure
Incomputing, ashared resource, ornetwork share, is acomputer resourcemade available from onehostto other hosts on acomputer network.[1][2]It is a device or piece of information on a computer that can be remotely accessed from another computer transparently as if it were a resource in the local machine. Network sharing ...
https://en.wikipedia.org/wiki/Shared_resource
Aclustered file system(CFS) is afile systemwhich is shared by being simultaneouslymountedon multipleservers. There are several approaches toclustering, most of which do not employ a clustered file system (onlydirect attached storagefor each node). Clustered file systems can provide features like location-independent ...
https://en.wikipedia.org/wiki/Distributed_file_system
Distributed Data Management Architecture(DDM) isIBM's open, publishedsoftware architecturefor creating, managing and accessing data on a remote computer. DDM was initially designed to supportrecord-oriented files; it was extended to supporthierarchical directories,stream-oriented files,queues, and system command proces...
https://en.wikipedia.org/wiki/Distributed_Data_Management_Architecture
Afile managerorfile browseris acomputer programthat provides auser interfaceto managefilesandfolders.[1]The most commonoperationsperformed on files or groups of files include creating, opening (e.g.viewing, playing, editing orprinting), renaming,copying,moving,deletingand searching for files, as well as modifyingfile a...
https://en.wikipedia.org/wiki/File_manager
Incomputing,file system fragmentation, sometimes calledfile system aging, is the tendency of afile systemto lay out the contents offilesnon-continuously to allow in-place modification of their contents. It is a special case ofdata fragmentation. File system fragmentation negatively impactsseek timein spinning storage m...
https://en.wikipedia.org/wiki/File_system_fragmentation
Afilename extension,file name extensionorfile extensionis a suffix to thenameof acomputer file(for example,.txt,.mp3,.exe) that indicates a characteristic of the file contents or its intended use. A filename extension is typically delimited from the rest of the filename with afull stop(period), but in some systems[1]it...
https://en.wikipedia.org/wiki/Filename_extension
Incomputer storage, aglobal file systemis adistributed file systemthat can be accessed from multiple locations, typically across a wide-area network, and provides concurrent access to aglobal namespacefrom all locations. In order for a file system to be considered global, it must allow for files to be created, modified...
https://en.wikipedia.org/wiki/Global_file_system
Object storage(also known asobject-based storage[1]orblob storage) is acomputer data storageapproach that manages data as "blobs" or "objects", as opposed to other storage architectures likefile systems, which manage data as a file hierarchy, andblock storage, which manages data as blocks within sectors and tracks.[2]E...
https://en.wikipedia.org/wiki/Object_storage
Storage efficiencyis the ability to store and manage data that consumes the least amount of space with little to no impact on performance; resulting in a lower total operational cost. Efficiency addresses the real-world demands of managing costs, reducing complexity and limiting risk. TheStorage Networking Industry A...
https://en.wikipedia.org/wiki/Storage_efficiency
Incomputer science, asynthetic file systemor apseudo file systemis a hierarchical interface to non-file objects that appear as if they were regular files in the tree of a disk-based or long-term-storagefile system. These non-file objects may be accessed with the samesystem callsorutility programsas regular files anddir...
https://en.wikipedia.org/wiki/Synthetic_file_system
Avirtual file system(VFS) orvirtual filesystem switchis an abstract layer on top of a more concretefile system. The purpose of a VFS is to allow client applications to access different types of concrete file systems in a uniform way. A VFS can, for example, be used to accesslocaland network storage devices transparentl...
https://en.wikipedia.org/wiki/Virtual_file_system
Theinode pointer structureis a structure adopted by theinodeof a file in theVersion 6 Unixfile system,Version 7 Unixfile system, andUnix File System(UFS) to list the addresses of a file'sdata blocks. It is also adopted by many related file systems, including theext3file system, popular with Linux users. In the file sy...
https://en.wikipedia.org/wiki/Inode_pointer_structure
inotify(inodenotify) is aLinux kernelsubsystem created by John McCutchan, which monitors changes to thefilesystem, and reports those changes to applications. It can be used to automatically update directory views, reload configuration files, log changes, backup, synchronize, and upload. Theinotifywaitandinotifywatchcom...
https://en.wikipedia.org/wiki/Inotify
Carry-less Multiplication(CLMUL) is an extension to thex86instruction set used bymicroprocessorsfromIntelandAMDwhich was proposed by Intel in March 2008[1]and made available in theIntel Westmere processorsannounced in early 2010. Mathematically, the instruction implements multiplication of polynomials over thefinite fi...
https://en.wikipedia.org/wiki/CLMUL_instruction_set
RDRAND(for "read random") is aninstructionfor returning random numbers from anIntelon-chiphardware random number generatorwhich has been seeded by an on-chip entropy source.[1]It is also known asIntel Secure Key Technology,[2]codenamedBull Mountain.[3]Intel introduced the feature around 2012, and AMD added support for ...
https://en.wikipedia.org/wiki/RDRAND
Advanced Vector Extensions(AVX, also known asGesher New Instructionsand thenSandy Bridge New Instructions) areSIMDextensions to thex86instruction set architectureformicroprocessorsfromIntelandAdvanced Micro Devices(AMD). They were proposed by Intel in March 2008 and first supported by Intel with theSandy Bridge[1]micr...
https://en.wikipedia.org/wiki/Advanced_Vector_Extensions_2
AVX-512are 512-bit extensions to the 256-bitAdvanced Vector ExtensionsSIMDinstructions forx86instruction set architecture(ISA) proposed byIntelin July 2013, and first implemented in the 2016 IntelXeon Phi x200(Knights Landing),[1]and then later in a number ofAMDand other Intel CPUs (see list below). AVX-512 consists of...
https://en.wikipedia.org/wiki/AVX-512
Bit manipulation instructions sets(BMI sets) are extensions to thex86instruction set architectureformicroprocessorsfromIntelandAMD. The purpose of these instruction sets is to improve the speed ofbit manipulation. All the instructions in these sets are non-SIMDand operate only on general-purposeregisters. There are t...
https://en.wikipedia.org/wiki/X86_Bit_manipulation_instruction_set
In thex86architecture, theCPUIDinstruction (identified by aCPUIDopcode) is aprocessor supplementary instruction(its name derived from "CPUIdentification") allowing software to discover details of the processor. It was introduced byIntelin 1993 with the launch of thePentiumandSL-enhanced 486processors.[1] A program can...
https://en.wikipedia.org/wiki/CPUID
Instructions that have at some point been present as documented instructions in one or morex86processors, but where the processor series containing the instructions are discontinued or superseded, with no known plans to reintroduce the instructions. The following instructions were introduced in the Intel 80386, but la...
https://en.wikipedia.org/wiki/List_of_discontinued_x86_instructions
Incomputing, aBloom filteris a space-efficientprobabilisticdata structure, conceived byBurton Howard Bloomin 1970, that is used to test whether anelementis a member of aset.False positivematches are possible, butfalse negativesare not – in other words, a query returns either "possibly in set" or "definitely not in set"...
https://en.wikipedia.org/wiki/Bloom_filter
Incomputer science,consistent hashing[1][2]is a special kind ofhashingtechnique such that when ahash tableis resized, onlyn/m{\displaystyle n/m}keys need to be remapped on average wheren{\displaystyle n}is the number of keys andm{\displaystyle m}is the number of slots. In contrast, in most traditional hash tables, a ch...
https://en.wikipedia.org/wiki/Consistent_hashing
Extendible hashingis a type ofhashsystem which treats a hash as a bit string and uses atriefor bucket lookup.[1]Because of the hierarchical nature of the system, re-hashing is an incremental operation (done one bucket at a time, as needed). This means that time-sensitive applications are less affected by table growth ...
https://en.wikipedia.org/wiki/Extendible_hashing
Ahash array mapped trie[1](HAMT) is an implementation of anassociative arraythat combines the characteristics of ahash tableand anarray mapped trie.[1]It is a refined version of the more general notion of ahash tree. A HAMT is an array mapped trie where the keys are first hashed to ensure an even distribution of keys ...
https://en.wikipedia.org/wiki/Hash_array_mapped_trie
Incomputer science,lazy deletionrefers to a method of deleting elements from ahash tablethat usesopen addressing. In this method, deletions are done by marking an element as deleted, rather than erasing it entirely. Deleted locations are treated as empty when inserting and as occupied during a search. The deleted locat...
https://en.wikipedia.org/wiki/Lazy_deletion
Pearson hashingis anon-cryptographic hash functiondesigned for fast execution on processors with 8-bitregisters. Given an input consisting of any number of bytes, it produces as output a single byte that is strongly dependent on every byte of the input. Its implementation requires only a few instructions, plus a 256-by...
https://en.wikipedia.org/wiki/Pearson_hashing
PhotoDNAis aproprietaryimage-identification andcontent filteringtechnology[1]widely used byonline service providers.[2][3] PhotoDNA was developed byMicrosoft ResearchandHany Farid, professor atDartmouth College, beginning in 2009. From a database of known images and video files, it creates uniquehashesto represent eac...
https://en.wikipedia.org/wiki/PhotoDNA
Incomputer science, theRabin–Karp algorithmorKarp–Rabin algorithmis astring-searching algorithmcreated byRichard M. KarpandMichael O. Rabin(1987) that useshashingto find an exact match of a pattern string in a text. It uses arolling hashto quickly filter out positions of the text that cannot match the pattern, and then...
https://en.wikipedia.org/wiki/Rabin%E2%80%93Karp_string_search_algorithm
Incomputer science, asearch data structure[citation needed]is anydata structurethat allows the efficientretrievalof specific items from asetof items, such as a specificrecordfrom adatabase. The simplest, most general, and least efficient search structure is merely an unordered sequentiallistof all the items. Locating ...
https://en.wikipedia.org/wiki/Search_data_structure
Incomputer science,consistent hashing[1][2]is a special kind ofhashingtechnique such that when ahash tableis resized, onlyn/m{\displaystyle n/m}keys need to be remapped on average wheren{\displaystyle n}is the number of keys andm{\displaystyle m}is the number of slots. In contrast, in most traditional hash tables, a ch...
https://en.wikipedia.org/wiki/Stable_hashing
Incomputer science, asuccinct data structureis adata structurewhich uses an amount of space that is "close" to theinformation-theoreticlower bound, but (unlike other compressed representations) still allows for efficient query operations. The concept was originally introduced by Jacobson[1]to encodebit vectors, (unlab...
https://en.wikipedia.org/wiki/Succinct_hash_table
This article describes thecalling conventionsused when programmingx86architecturemicroprocessors. Calling conventions describe the interface of called code: This is intimately related with the assignment of sizes and formats to programming-language types. Another closely related topic isname mangling, which determine...
https://en.wikipedia.org/wiki/X86_calling_conventions
Thex86instruction setrefers to the set of instructions thatx86-compatiblemicroprocessorssupport. The instructions are usually part of anexecutableprogram, often stored as acomputer fileand executed on the processor. The x86 instruction set has been extended several times, introducing widerregistersand datatypes as wel...
https://en.wikipedia.org/wiki/X86_instruction_listings
TheMotorola 68000 series(also known as680x0,m68000,m68k, or68k) is a family of32-bitcomplex instruction set computer(CISC)microprocessors. During the 1980s and early 1990s, they were popular inpersonal computersandworkstationsand were the primary competitors ofIntel'sx86microprocessors. They were best known as the proc...
https://en.wikipedia.org/wiki/680x0
PowerPC(with thebackronymPerformance Optimization With Enhanced RISC – Performance Computing, sometimes abbreviated asPPC) is areduced instruction set computer(RISC)instruction set architecture(ISA) created by the 1991Apple–IBM–Motorolaalliance, known asAIM. PowerPC, as an evolving instruction set, has been namedPower ...
https://en.wikipedia.org/wiki/PowerPC
This article gives a list ofAMDmicroprocessors, sorted by generation and release year. If applicable and openly known, the designation(s) of each processor's core (versions) is (are) listed in parentheses. For an overview over concrete product, you then need to consult further articles, like e.g.list of AMD accelerated...
https://en.wikipedia.org/wiki/List_of_AMD_processors