text
stringlengths
21
172k
source
stringlengths
32
113
Theposterior probabilityis a type ofconditional probabilitythat results fromupdatingtheprior probabilitywith information summarized by thelikelihoodvia an application ofBayes' rule.[1]From anepistemological perspective, the posterior probability contains everything there is to know about an uncertain proposition (such ...
https://en.wikipedia.org/wiki/Posterior_probability
Speaker diarisation(ordiarization) is the process of partitioning an audio stream containing human speech into homogeneous segments according to the identity of each speaker.[1]It can enhance the readability of anautomatic speech transcriptionby structuring the audio stream into speaker turns and, when used together wi...
https://en.wikipedia.org/wiki/Speaker_diarisation
Constraint satisfaction problems(CSPs) are mathematical questions defined as a set of objects whosestatemust satisfy a number ofconstraintsorlimitations. CSPs represent the entities in a problem as a homogeneous collection of finite constraints overvariables, which is solved byconstraint satisfactionmethods. CSPs are t...
https://en.wikipedia.org/wiki/Constraint_satisfaction_problem
VoxForgeis afreespeech corpusandacoustic modelrepository foropen sourcespeech recognitionengines. VoxForge was set up to collect transcribed speech to create a freeGPLspeech corpus in order to be uses with open source speech recognition engines. The speech audio files will be 'compiled' into acoustic models for use wi...
https://en.wikipedia.org/wiki/VoxForge
In mathematics, asemigroupis analgebraic structureconsisting of asettogether with anassociativeinternalbinary operationon it. The binary operation of a semigroup is most often denoted multiplicatively (just notation, not necessarily the elementary arithmeticmultiplication):x⋅y, or simplyxy, denotes the result of apply...
https://en.wikipedia.org/wiki/Semigroup_ideal
Netzwerkis theGermanword for "network". It may also refer to:
https://en.wikipedia.org/wiki/Netzwerk_(disambiguation)
Incomputing,input/output(I/O,i/o, or informallyioorIO) is the communication between an information processing system, such as acomputer, and the outside world, such as another computer system, peripherals, or a human operator.Inputsare the signals or data received by the system and outputs are the signals ordatasent fr...
https://en.wikipedia.org/wiki/Input/output
Configurators, also known as choice boards, design systems, toolkits, or co-design platforms, are responsible for guiding the user[who?]through the configuration[clarification needed]process. Different variations are represented, visualized, assessed and priced which starts a learning-by-doing process for the user. Whi...
https://en.wikipedia.org/wiki/Configurator
Inlinguistic morphologyand information retrieval,stemmingis the process of reducing inflected (or sometimes derived) words to theirword stem, base orrootform—generally a written word form. The stem need not be identical to themorphological rootof the word; it is usually sufficient that related words map to the same ste...
https://en.wikipedia.org/wiki/Stemming
Normalized compression distance(NCD) is a way of measuring thesimilaritybetween two objects, be it two documents, two letters, two emails, two music scores, two languages, two programs, two pictures, two systems, two genomes, to name a few. Such a measurement should not be application dependent or arbitrary. A reason...
https://en.wikipedia.org/wiki/Normalized_compression_distance
Account verificationis the process of verifying that a new or existing account is owned and operated by a specified real individual or organization. A number of websites, for examplesocial mediawebsites, offer account verification services. Verified accounts are often visually distinguished bycheck markicons or badges...
https://en.wikipedia.org/wiki/Account_verification
Incomputer science,automatic programming[1]is a type ofcomputer programmingin which some mechanism generates acomputer program, to allow humanprogrammersto write the code at a higher abstraction level. There has been little agreement on the precise definition of automatic programming, mostly because its meaning has ch...
https://en.wikipedia.org/wiki/Automatic_programming#Source-code_generation
Apositional game[1][2]ingame theoryis a kind of acombinatorial gamefor two players. It is described by: During the game, players alternately claim previously-unclaimed positions, until one of the players wins. If all positions inX{\displaystyle X}are taken while no player wins, the game is considered a draw. The clas...
https://en.wikipedia.org/wiki/Positional_game
Incomputer science, theCocke–Younger–Kasami algorithm(alternatively calledCYK, orCKY) is aparsingalgorithmforcontext-free grammarspublished by Itiroo Sakai in 1961.[1][2]The algorithm is named after some of its rediscoverers:John Cocke, Daniel Younger,Tadao Kasami, andJacob T. Schwartz. It employsbottom-up parsinganddy...
https://en.wikipedia.org/wiki/CYK_algorithm
Inmathematics,trigonometric integralsare afamilyofnonelementary integralsinvolvingtrigonometric functions. The differentsineintegral definitions areSi⁡(x)=∫0xsin⁡ttdt{\displaystyle \operatorname {Si} (x)=\int _{0}^{x}{\frac {\sin t}{t}}\,dt}si⁡(x)=−∫x∞sin⁡ttdt.{\displaystyle \operatorname {si} (x)=-\int _{x}^{\infty }...
https://en.wikipedia.org/wiki/Trigonometric_integral
Halstead complexity measuresaresoftware metricsintroduced byMaurice Howard Halsteadin 1977[1]as part of his treatise on establishing an empirical science of software development. Halstead made the observation that metrics of the software should reflect the implementation or expression of algorithms in different languag...
https://en.wikipedia.org/wiki/Halstead_complexity_measures
In thedesign of experiments,optimal experimental designs(oroptimum designs[2]) are a class ofexperimental designsthat areoptimalwith respect to somestatisticalcriterion. The creation of this field of statistics has been credited to Danish statisticianKirstine Smith.[3][4] In thedesign of experimentsforestimatingstatis...
https://en.wikipedia.org/wiki/Optimal_design
Ingraph theory, a branch of mathematics, theHajós constructionis anoperation on graphsnamed afterGyörgy Hajós(1961) that may be used to construct anycritical graphor any graph whosechromatic numberis at least some given threshold. LetGandHbe twoundirected graphs,vwbe an edge ofG, andxybe an edge ofH. Then the Hajós co...
https://en.wikipedia.org/wiki/Haj%C3%B3s_construction
Adependent-marking languagehas grammatical markers ofagreementandcase governmentbetween the words ofphrasesthat tend to appear more ondependentsthan onheads. The distinction betweenhead-markingand dependent-marking was first explored byJohanna Nicholsin 1986,[1]and has since become a central criterion in language typol...
https://en.wikipedia.org/wiki/Dependent-marking_language
Similitudeis a concept applicable to the testing ofengineeringmodels. A model is said to havesimilitudewith the real application if the two sharegeometricsimilarity,kinematicsimilarity anddynamicsimilarity.Similarityandsimilitudeare interchangeable in this context. The termdynamic similitudeis often used as a catch-all...
https://en.wikipedia.org/wiki/Similitude
Incomputer science,graph transformation, orgraph rewriting, concerns the technique of creating a newgraphout of an original graph algorithmically. It has numerous applications, ranging fromsoftware engineering(software constructionand alsosoftware verification) tolayout algorithmsand picture generation. Graph transfor...
https://en.wikipedia.org/wiki/Graph_transformation
Recurrent neural networks(RNNs) are a class of artificial neural networks designed for processing sequential data, such as text, speech, andtime series,[1]where the order of elements is important. Unlikefeedforward neural networks, which process inputs independently, RNNs utilize recurrent connections, where the output...
https://en.wikipedia.org/wiki/Recurrent_neural_networks
Incryptography,learning with errors(LWE) is a mathematical problem that is widely used to create secureencryption algorithms.[1]It is based on the idea of representing secret information as a set of equations with errors. In other words, LWE is a way to hide the value of a secret by introducing noise to it.[2]In more t...
https://en.wikipedia.org/wiki/Learning_with_errors
Aradiotelephone(orradiophone), abbreviatedRT,[1]is aradio communicationsystem for conducting aconversation;radiotelephonymeanstelephonyby radio. It is in contrast toradiotelegraphy, which is radio transmission oftelegrams(messages), ortelevision, transmission ofmoving picturesand sound. The term is related toradio bro...
https://en.wikipedia.org/wiki/Radiotelephone
The termsGoogle bombingandGoogle washingrefer to the practice of causing awebsiteto rank highly inweb search engineresults for irrelevant, unrelated or off-topic search terms. In contrast,search engine optimization(SEO) is the practice of improving thesearch enginelistings of web pages forrelevantsearch terms. Google-...
https://en.wikipedia.org/wiki/Google_bombing
Themobile identification number(MIN) ormobile subscription identification number(MSIN) refers to the 10-digitunique number that awireless carrieruses to identify amobile phone, which is the last part of theinternational mobile subscriber identity(IMSI). The MIN is a number that uniquely identifies a mobile phone workin...
https://en.wikipedia.org/wiki/Mobile_identification_number
Anoutput deviceis any piece ofcomputer hardwarethat converts information or data into a human-perceptible form or, historically, into a physical machine-readable form for use with other non-computerized equipment. It can be text, graphics, tactile, audio, or video. Examples includemonitors,printersandsound cards. In a...
https://en.wikipedia.org/wiki/Output_device
Terminology extraction(also known astermextraction,glossaryextraction, termrecognition, or terminologymining) is a subtask ofinformation extraction. The goal of terminology extraction is to automatically extract relevant terms from a givencorpus.[1] In thesemantic webera, a growing number of communities and networked ...
https://en.wikipedia.org/wiki/Terminology_extraction
Incontractlaw, anon-compete clause(oftenNCC),restrictive covenant, orcovenant not to compete(CNC), is a clause under which one party (usually an employee) agrees not to enter into or start a similar profession or trade in competition against another party (usually the employer). In thelabor market, these agreements pre...
https://en.wikipedia.org/wiki/Non-compete_clause
Pruningis adata compressiontechnique inmachine learningandsearch algorithmsthat reduces the size ofdecision treesby removing sections of the tree that are non-critical and redundant to classify instances. Pruning reduces the complexity of the finalclassifier, and hence improves predictive accuracy by the reduction ofov...
https://en.wikipedia.org/wiki/Pruning_(algorithm)
XOR gate(sometimesEOR, orEXORand pronounced asExclusive OR) is a digitallogic gatethat gives a true (1 or HIGH) output when the number of true inputs is odd. An XOR gate implements anexclusive or(↮{\displaystyle \nleftrightarrow }) frommathematical logic; that is, a true output results if one, and only one, of the inpu...
https://en.wikipedia.org/wiki/XOR_gate
Inprintingandpublishing,proofsare the preliminary versions of publications meant for review by authors, editors, and proofreaders, often with extra-wide margins.Galley proofsmay be uncut andunbound, or in some caseselectronically transmitted. They are created forproofreadingandcopyeditingpurposes, but may also be used ...
https://en.wikipedia.org/wiki/Galley_proof
Cryptography, orcryptology(fromAncient Greek:κρυπτός,romanized:kryptós"hidden, secret"; andγράφεινgraphein, "to write", or-λογία-logia, "study", respectively[1]), is the practice and study of techniques forsecure communicationin the presence ofadversarialbehavior.[2]More generally, cryptography is about constructing an...
https://en.wikipedia.org/wiki/Cryptography#Kerckhoffs%27_principle
Ingraph theory, aflow network(also known as atransportation network) is adirected graphwhere each edge has acapacityand each edge receives a flow. The amount of flow on an edge cannot exceed the capacity of the edge. Often inoperations research, a directed graph is called anetwork, the vertices are callednodesand the e...
https://en.wikipedia.org/wiki/Random_networks
TheData Analysis and Real World Interrogation Network(DARWIN EU) is aEuropean Union(EU) initiative coordinated by theEuropean Medicines Agency(EMA) to generate and utilizereal world evidence(RWE) to support the evaluation and supervision of medicines across the EU. The project aims to enhance decision-making in regulat...
https://en.wikipedia.org/wiki/DARWIN_EU
Property Specification Language(PSL) is atemporal logicextendinglinear temporal logicwith a range of operators for both ease of expression and enhancement of expressive power. PSL makes an extensive use ofregular expressionsand syntactic sugaring. It is widely used in the hardware design and verification industry, wher...
https://en.wikipedia.org/wiki/Property_Specification_Language
Abarrel processoris aCPUthat switches betweenthreadsof execution on everycycle. ThisCPU designtechnique is also known as "interleaved" or "fine-grained"temporal multithreading. Unlikesimultaneous multithreadingin modernsuperscalararchitectures, it generally does not allow execution of multiple instructions in one cycle...
https://en.wikipedia.org/wiki/Barrel_processor
Inmathematics, thetensor-hom adjunctionis that thetensor product−⊗X{\displaystyle -\otimes X}andhom-functorHom⁡(X,−){\displaystyle \operatorname {Hom} (X,-)}form anadjoint pair: This is made more precise below. The order of terms in the phrase "tensor-hom adjunction" reflects their relationship: tensor is the left ad...
https://en.wikipedia.org/wiki/Tensor-hom_adjunction
Psychologyis the scientific study ofmindandbehavior.[1][2]Its subject matter includes the behavior of humans and nonhumans, bothconsciousandunconsciousphenomena, and mental processes such asthoughts,feelings, andmotives. Psychology is an academic discipline of immense scope, crossing the boundaries between thenaturalan...
https://en.wikipedia.org/wiki/Psychology
Inprobability theory, thelaw of the iterated logarithmdescribes the magnitude of the fluctuations of arandom walk. The original statement of the law of the iterated logarithm is due toA. Ya. Khinchin(1924).[1]Another statement was given byA. N. Kolmogorovin 1929.[2] Let {Yn} be independent, identically distributedrand...
https://en.wikipedia.org/wiki/Law_of_the_iterated_logarithm
Incomputer science,shared memoryismemorythat may be simultaneously accessed by multiple programs with an intent to provide communication among them or avoid redundant copies. Shared memory is an efficient means of passing data between programs. Depending on context, programs may run on a single processor or on multiple...
https://en.wikipedia.org/wiki/Shared_memory
Theangular displacement(symbol θ, ϑ, or φ) – also calledangle of rotation,rotational displacement, orrotary displacement– of aphysical bodyis theangle(inunitsofradians,degrees,turns, etc.) through which the bodyrotates(revolves or spins) around a centre oraxis of rotation. Angular displacement may be signed, indicating...
https://en.wikipedia.org/wiki/Angle_of_rotation
Inmathematics, specificallyprojective geometry, aconfigurationin the plane consists of a finite set ofpoints, and a finitearrangement of lines, such that each point isincidentto the same number of lines and each line is incident to the same number of points.[1] Although certain specific configurations had been studied...
https://en.wikipedia.org/wiki/Projective_configuration
Inmereology, an area ofmetaphysics, the termgunkapplies to any whole whose parts all have further proper parts. That is, a gunky object is not made of indivisibleatomsorsimples. Because parthood istransitive, any part of gunk is itself gunk. The term was first used byDavid Lewisin his workParts of Classes(1991),[1]in w...
https://en.wikipedia.org/wiki/Gunk_(mereology)
Quantum machine learningis the integration ofquantum algorithmswithinmachine learningprograms.[1][2][3][4][5][6][7][8] The most common use of the term refers to machine learning algorithms for the analysis of classical data executed on aquantum computer, i.e. quantum-enhanced machine learning.[9][10][11]While machine ...
https://en.wikipedia.org/wiki/Quantum_machine_learning
TheLeiden algorithmis a community detection algorithm developed by Traaget al[1]atLeiden University. It was developed as a modification of theLouvain method. Like the Louvain method, the Leiden algorithm attempts to optimizemodularityin extracting communities from networks; however, it addresses key issues present in t...
https://en.wikipedia.org/wiki/Leiden_algorithm
Brainais avirtual assistant[1][2]and speech-to-text dictation[3]application forMicrosoft Windowsdeveloped by Brainasoft.[4]Braina usesnatural language interface,[5]speech synthesis, andspeech recognitiontechnology[6]to interact with its users and allows them to use natural language sentences to perform various tasks on...
https://en.wikipedia.org/wiki/Braina
Inmathematics, in particularfunctional analysis, thesingular valuesof acompact operatorT:X→Y{\displaystyle T:X\rightarrow Y}acting betweenHilbert spacesX{\displaystyle X}andY{\displaystyle Y}, are the square roots of the (necessarily non-negative)eigenvaluesof the self-adjoint operatorT∗T{\displaystyle T^{*}T}(whereT∗{...
https://en.wikipedia.org/wiki/Singular_value
This article presents atimelineof events in the history of 16-bitx86DOS-familydisk operating systemsfrom 1980 to present.Non-x86 operating systems named "DOS"are not part of the scope of this timeline. Also presented is a timeline of events in the history of the 8-bit8080-based and 16-bit x86-basedCP/Moperating system...
https://en.wikipedia.org/wiki/Timeline_of_DOS_operating_systems
Software verificationis a discipline ofsoftware engineering,programming languages, andtheory of computationwhose goal is to assure that software satisfies the expected requirements. A broad definition of verification makes it related tosoftware testing. In that case, there are two fundamental approaches to verificatio...
https://en.wikipedia.org/wiki/Software_verification
The termscheduling analysisinreal-time computingincludes the analysis and testing of theschedulersystem and thealgorithmsused in real-time applications. Incomputer science, real-time scheduling analysis is the evaluation, testing and verification of thescheduling systemand thealgorithmsused in real-time operations. For...
https://en.wikipedia.org/wiki/Scheduling_analysis_real-time_systems
TheData Protection Directive,officially Directive 95/46/EC, enacted in October 1995, was aEuropean Union directivewhich regulated the processing ofpersonal datawithin theEuropean Union(EU) and the free movement of such data. The Data Protection Directive was an important component of EUprivacyandhuman rights law. The ...
https://en.wikipedia.org/wiki/Data_Protection_Directive
Test-driven development(TDD) is a way of writingcodethat involves writing anautomatedunit-leveltest casethat fails, then writing just enough code to make the test pass, thenrefactoringboth the test code and the production code, then repeating with another new test case. Alternative approaches to writing automated test...
https://en.wikipedia.org/wiki/Test-driven_development
Insociolinguistics,hypercorrectionis thenonstandarduse of languagethat results from the overapplication of a perceived rule oflanguage-usage prescription. A speaker or writer who produces a hypercorrection generally believes through a misunderstanding of such rules that the form or phrase they use is more "correct",sta...
https://en.wikipedia.org/wiki/Hypercorrection
TheLinux kernelprovides multiple interfaces touser-space and kernel-modecode. The interfaces can be classified as eitherapplication programming interface(API) orapplication binary interface(ABI), and they can be classified as either kernel–user space or kernel-internal. The Linux API includes the kernel–user space API...
https://en.wikipedia.org/wiki/Linux_kernel_interfaces
Inmodular arithmetic,Thue's lemmaroughly states that every modular integer may be represented by a "modular fraction" such that the numerator and the denominator haveabsolute valuesnot greater than thesquare rootof the modulus. More precisely, for every pair ofintegers(a,m)withm> 1, given two positive integersXandYsuc...
https://en.wikipedia.org/wiki/Thue%27s_lemma
Inpredictive analytics,data science,machine learningand related fields,concept driftordriftis an evolution of data that invalidates thedata model. It happens when the statistical properties of the target variable, which the model is trying to predict, change over time in unforeseen ways. This causes problems because th...
https://en.wikipedia.org/wiki/Concept_drift
Hyperrealityis a concept inpost-structuralismthat refers to the process of the evolution of notions of reality, leading to a cultural state of confusion betweensignsand symbols invented to stand in for reality, and direct perceptions ofconsensus reality.[1]Hyperreality is seen as a condition in which, because of the co...
https://en.wikipedia.org/wiki/Hyperreality
Condorcet methods Positional voting Cardinal voting Quota-remainder methods Approval-based committees Fractional social choice Semi-proportional representation By ballot type Pathological response Strategic voting Paradoxes ofmajority rule Positive results Proxy votingis a form ofvotingwhereby a member of a...
https://en.wikipedia.org/wiki/Proxy_voting#Delegated_voting
Cyborg anthropologyis a discipline that studies the interaction between humanity and technology from ananthropologicalperspective. The discipline offers novel insights on new technological advances and their effect on culture and society. Donna Haraway’s 1984"A Cyborg Manifesto"was the first widely-read academic text ...
https://en.wikipedia.org/wiki/Cyborg_anthropology
In mathematics and computer science, thepinwheel schedulingproblem is a problem inreal-time schedulingwith repeating tasks of unit length and hard constraints on the time between repetitions. When a pinwheel scheduling problem has a solution, it has one in which the schedule repeats periodically. This repeating patte...
https://en.wikipedia.org/wiki/Pinwheel_scheduling
Oracle Solarisis aproprietaryUnixoperating systemoffered byOracleforSPARCandx86-64basedworkstationsandservers. Originally developed bySun Microsystemsas Solaris, it superseded the company's earlierSunOSin 1993 and became known for itsscalability, especially on SPARC systems, and for originating many innovative features...
https://en.wikipedia.org/wiki/Solaris_(operating_system)
Dijkstra's algorithm(/ˈdaɪkstrəz/DYKE-strəz) is analgorithmfor finding theshortest pathsbetweennodesin a weightedgraph, which may represent, for example, aroad network. It was conceived bycomputer scientistEdsger W. Dijkstrain 1956 and published three years later.[4][5][6] Dijkstra's algorithm finds the shortest path ...
https://en.wikipedia.org/wiki/Dijkstra%27s_algorithm
Inmathematicsandgroup theory, the termmultiplicative grouprefers to one of the following concepts: Thegroup scheme ofn-throots of unityis by definition the kernel of then-power map on the multiplicative group GL(1), considered as agroup scheme. That is, for any integern> 1 we can consider the morphism on the multiplic...
https://en.wikipedia.org/wiki/Group_scheme_of_roots_of_unity
Pitch circularityis a fixed series oftonesthat are perceived to ascend or descend endlessly inpitch. It's an example of anauditory illusion. Pitch is often defined as extending along a one-dimensionalcontinuumfrom high to low, as can be experienced by sweeping one’s hand up or down a piano keyboard. This continuum is ...
https://en.wikipedia.org/wiki/Pitch_circularity
Cantor's diagonal argument(among various similar names[note 1]) is amathematical proofthat there areinfinite setswhich cannot be put intoone-to-one correspondencewith the infinite set ofnatural numbers– informally, that there aresetswhich in some sense contain more elements than there are positive integers. Such sets ...
https://en.wikipedia.org/wiki/Cantor%27s_diagonal_argument
Translation studiesis an academicinterdisciplinedealing with the systematic study of the theory, description and application oftranslation,interpreting, andlocalization. As an interdiscipline, translation studies borrows much from the various fields of study that support translation. These includecomparative literature...
https://en.wikipedia.org/wiki/Translation_studies
Partial-matchingis a technique that can be used with aMITM attack. Partial-matching is where the intermediate values of the MITM attack,i{\displaystyle i}andj{\displaystyle j}, computed from the plaintext and ciphertext, are matched on only a few select bits, instead of on the complete state. A limitation with MITM at...
https://en.wikipedia.org/wiki/Partial-matching_meet-in-the-middle_attack
MobileStar Networkwas awireless Internet service providerwhich first gained notability in deploying Wi-Fi Internet access points inStarbuckscoffee shops,American AirlinesAdmiral Club locations across theUnited Statesand at Hilton Hotels. Founded by Mark Goode and Greg Jackson in 1998, MobileStar was the first wireless...
https://en.wikipedia.org/wiki/MobileStar
Semiotics(/ˌsɛmiˈɒtɪks/SEM-ee-OT-iks) is the systematic study ofsign processesand the communication ofmeaning. In semiotics, asignis defined as anything that communicates intentional and unintentional meaning or feelings to the sign's interpreter. Semiosis is any activity, conduct, or process that involves signs. Sign...
https://en.wikipedia.org/wiki/Semiotics
Theabsolute differenceof tworeal numbersx{\displaystyle x}andy{\displaystyle y}is given by|x−y|{\displaystyle |x-y|}, theabsolute valueof theirdifference. It describes the distance on thereal linebetween the points corresponding tox{\displaystyle x}andy{\displaystyle y}, and is a special case of theLpdistancefor all1≤p...
https://en.wikipedia.org/wiki/Absolute_difference
Proactive cyber defensemeans acting in anticipation to oppose an attack through cyber and cognitive domains.[1]Proactive cyber defense can be understood as options between offensive and defensive measures. It includes interdicting, disrupting or deterring an attack or a threat's preparation to attack, either pre-emptiv...
https://en.wikipedia.org/wiki/Proactive_Cyber_Defence
Incomputing, ashared resource, ornetwork share, is acomputer resourcemade available from onehostto other hosts on acomputer network.[1][2]It is a device or piece of information on a computer that can be remotely accessed from another computer transparently as if it were a resource in the local machine. Network sharing ...
https://en.wikipedia.org/wiki/Disk_sharing
Alingua franca(/ˌlɪŋɡwəˈfræŋkə/;lit.'Frankish tongue'; for plurals see§ Usage notes), also known as abridge language,common language,trade language,auxiliary language,link languageorlanguage of wider communication(LWC), is alanguagesystematically used to make communication possible between groups of people who do not s...
https://en.wikipedia.org/wiki/Lingua_franca
Thehistory of technologyis the history of the invention of tools and techniques by humans. Technology includes methods ranging from simplestone toolsto the complexgenetic engineeringand information technology that has emerged since the 1980s. The termtechnologycomes from the Greek wordtechne, meaning art and craft, and...
https://en.wikipedia.org/wiki/History_of_technology
The following is alist of UK government data losses. It lists reported instances of the loss of personal data by UK central and local government, agencies, non-departmental public bodies, etc., whether directly or indirectly because of the actions of private-sector contractors. Such losses tend to receive widespread me...
https://en.wikipedia.org/wiki/List_of_UK_government_data_losses
Algorithm selection(sometimes also calledper-instance algorithm selectionoroffline algorithm selection) is a meta-algorithmic techniqueto choose an algorithm from a portfolio on an instance-by-instance basis. It is motivated by the observation that on many practical problems, different algorithms have different perform...
https://en.wikipedia.org/wiki/Algorithm_selection
Athlonis a family of CPUs designed byAMD, targeted mostly at the desktop market. The name "Athlon" has been largely unused as just "Athlon" since 2001 when AMD started naming its processorsAthlon XP, but in 2008 began referring to single core 64-bit processors from theAMD Athlon X2andAMD Phenomproduct lines. Later the ...
https://en.wikipedia.org/wiki/List_of_AMD_Athlon_processors
Acellular networkormobile networkis atelecommunications networkwhere the link to and from end nodes iswirelessand the network is distributed over land areas calledcells, each served by at least one fixed-locationtransceiver(such as abase station). These base stations provide the cell with the network coverage which can...
https://en.wikipedia.org/wiki/Cellular_network
In apositional numeral system, theradix(pl.:radices) orbaseis the number of uniquedigits, including the digit zero, used to represent numbers. For example, for thedecimal system(the most common system in use today) the radix is ten, because it uses the ten digits from 0 through 9. In any standard positional numeral sy...
https://en.wikipedia.org/wiki/Number_base
National security, ornational defence(national defenseinAmerican English), is thesecurityanddefenceof asovereign state, including itscitizens,economy, andinstitutions, which is regarded as a duty ofgovernment. Originally conceived as protection againstmilitary attack, national security is widely understood to include a...
https://en.wikipedia.org/wiki/National_security
Instatistical analysis,Freedman's paradox,[1][2]named afterDavid Freedman, is a problem inmodel selectionwherebypredictor variableswith no relationship to the dependent variable can pass tests of significance – both individually via a t-test, and jointly via an F-test for the significance of the regression. Freedman de...
https://en.wikipedia.org/wiki/Freedman%27s_paradox
Cluster analysisorclusteringis the data analyzing technique in which task of grouping a set of objects in such a way that objects in the same group (called acluster) are moresimilar(in some specific sense defined by the analyst) to each other than to those in other groups (clusters). It is a main task ofexploratory dat...
https://en.wikipedia.org/wiki/Clustering_(statistics)
Insoftware engineering,double-checked locking(also known as "double-checked locking optimization"[1]) is asoftware design patternused to reduce the overhead of acquiring alockby testing the locking criterion (the "lock hint") before acquiring the lock. Locking occurs only if the locking criterion check indicates that ...
https://en.wikipedia.org/wiki/Double-checked_locking
chmodis ashellcommandfor changingaccess permissionsand special mode flags offiles(includingspecial filessuch asdirectories). The name is short forchangemodewheremoderefers to the permissions and flags collectively.[1][2] The command originated inAT&T Unixversion 1 and was exclusive toUnixandUnix-likeoperating systemsu...
https://en.wikipedia.org/wiki/Chmod
Inlinguistics,agreementorconcord(abbreviatedagr) occurs when awordchanges form depending on the other words to which it relates.[1]It is an instance ofinflection, and usually involves making the value of somegrammatical category(such asgenderorperson) "agree" between varied words or parts of thesentence. For example, ...
https://en.wikipedia.org/wiki/Agreement_(linguistics)
Inlinguistics,case governmentis a type ofgovernmentwherein a verb oradpositionimposesgrammatical caserequirements on its noun phrase complement. For example, inGermanthe prepositionfür'for' governs theaccusative case:für mich'for me-accusative'.[1]Case government may modify the meaning of the verb substantially, even t...
https://en.wikipedia.org/wiki/Case_government
XOR DDoSis a Linux Trojan malware with rootkit capabilities that was used to launch large-scale DDoS attacks. Its name stems from the heavy usage of XOR encryption in both malware and network communication to the C&Cs. It is built for multiple Linux architectures like ARM, x86 and x64. Noteworthy about XOR DDoS is the ...
https://en.wikipedia.org/wiki/Xor_DDoS
Instatistics,correlationordependenceis any statistical relationship, whethercausalor not, between tworandom variablesorbivariate data. Although in the broadest sense, "correlation" may indicate any type of association, in statistics it usually refers to the degree to which a pair of variables arelinearlyrelated. Fami...
https://en.wikipedia.org/wiki/Correlation
Incomputer security, "dancing pigs" is a term or problem that explains computer users' attitudes towards computer security. It states that users will continue to pick an amusing graphic even if they receive a warning from security software that it is potentially dangerous.[1]In other words, users choose their primary d...
https://en.wikipedia.org/wiki/Dancing_pigs
In mathematics, acomplex numberis an element of anumber systemthat extends thereal numberswith a specific element denotedi, called theimaginary unitand satisfying the equationi2=−1{\displaystyle i^{2}=-1}; every complex number can be expressed in the forma+bi{\displaystyle a+bi}, whereaandbare real numbers. Because no ...
https://en.wikipedia.org/wiki/Complex_number
In probability theory and statistics, aMarkov chainorMarkov processis astochastic processdescribing asequenceof possible events in which theprobabilityof each event depends only on the state attained in the previous event. Informally, this may be thought of as, "What happens next depends only on the state of affairsnow...
https://en.wikipedia.org/wiki/Markov_chain
Inprobability theoryandstatistics, thebinomial distributionwith parametersnandpis thediscrete probability distributionof the number of successes in a sequence ofnindependentexperiments, each asking ayes–no question, and each with its ownBoolean-valuedoutcome:success(with probabilityp) orfailure(with probabilityq= 1 −p)...
https://en.wikipedia.org/wiki/Binomial_distribution
In the mathematical field ofgraph theory, theErdős–Rényi modelrefers to one of two closely related models for generatingrandom graphsor theevolution of a random network. These models are named afterHungarianmathematiciansPaul ErdősandAlfréd Rényi, who introduced one of the models in 1959.[1][2]Edgar Gilbertintroduced t...
https://en.wikipedia.org/wiki/Erd%C5%91s%E2%80%93R%C3%A9nyi_model
Greenwashing(acompound wordmodeled on "whitewash"), also calledgreen sheen,[1][2]is a form ofadvertisingormarketing spinthat deceptively usesgreen PRandgreen marketingto persuade the public that an organization's products, goals, orpoliciesareenvironmentally friendly.[3][4][5]Companies that intentionally adopt greenwas...
https://en.wikipedia.org/wiki/Greenwashing
Instatisticsandeconometrics, theADF-GLS test(orDF-GLS test) is a test for aunit rootin an economictime seriessample. It was developed by Elliott, Rothenberg and Stock (ERS) in 1992 as a modification of theaugmented Dickey–Fuller test(ADF).[1] A unit root test determines whether a time series variable is non-stationary...
https://en.wikipedia.org/wiki/ADF-GLS_test
Time-triggered architecture(abbreviated asTTA), also known as atime-triggered system, is a computer system that executes one or more sets of tasks according to a predetermined and set task schedule.[1]Implementation of a TT system will typically involve use of a single interrupt that is linked to the periodic overflow ...
https://en.wikipedia.org/wiki/Time-triggered_system
Avulnerability database(VDB) is a platform aimed at collecting, maintaining, and disseminating information about discoveredcomputer security vulnerabilities. Thedatabasewill customarily describe the identified vulnerability, assess the potential impact on affected systems, and any workarounds or updates to mitigate the...
https://en.wikipedia.org/wiki/Vulnerability_database
Aflight computeris a form ofslide ruleused inaviationand one of a very fewanalog computersin widespread use in the 21st century. Sometimes it is called by the make or model name likeE6B, CR, CRP-5 or in German, as theDreieckrechner.[1] They are mostly used inflight training, but many professional pilots still carry an...
https://en.wikipedia.org/wiki/Flight_computer
Logologyis the study of all things related toscienceand itspractitioners—philosophical, biological,psychological,societal,historical,political,institutional,financial. The term "logology" isback-formedfrom the suffix "-logy", as in "geology", "anthropology", etc., in the sense of the "study of science".[1][2] The word...
https://en.wikipedia.org/wiki/Logology_(science_of_science)#Multiple_discovery