text stringlengths 21 172k | source stringlengths 32 113 |
|---|---|
ARPA-E, orAdvanced Research Projects Agency–Energyis an agency within theUnited States Department of Energytasked with funding the research and development of advanced energy technologies.[1]The goal of the agency is to improve U.S. economic prosperity, national security, and environmental well being. ARPA-E typically ... | https://en.wikipedia.org/wiki/Advanced_Research_Projects_Agency%E2%80%93Energy |
Ananti-patterninsoftware engineering,project management, andbusiness processesis a common response to a recurring problem that is usually ineffective and risks being highly counterproductive.[1][2]The term, coined in 1995 by computer programmerAndrew Koenig, was inspired by the bookDesign Patterns(which highlights a nu... | https://en.wikipedia.org/wiki/Anti-pattern |
Incomputer networking,Energy-Efficient Ethernet(EEE) is a set of enhancements totwisted-pair,twinaxial,backplane, andoptical fiberEthernet physical-layer variantsthat reduce power consumption during periods of low data activity.[1]The intention is to reduce power consumption by at least half, while retaining full compa... | https://en.wikipedia.org/wiki/Energy-Efficient_Ethernet |
Incomputing,cache replacement policies(also known ascache replacement algorithmsorcache algorithms) areoptimizinginstructions oralgorithmswhich acomputer programor hardware-maintained structure can utilize to manage acacheof information. Caching improves performance by keeping recent or often-used data items in memory ... | https://en.wikipedia.org/wiki/Cache_replacement_policies |
TheITU-TRecommendationE.212defines mobile country codes (MCC) as well as mobile network codes (MNC).
Themobile country codeconsists of three decimal digits and the mobile network code consists of two or three decimal digits (for example: MNC of 001 is not the same as MNC of 01). The first digit of the mobile country c... | https://en.wikipedia.org/wiki/Mobile_network_code |
TheCondorwas an overnight fast freight train service operated byBritish RailwaysbetweenLondonandGlasgowfrom 1959 until 1965 with all freight carried in containers. The name was derived from 'CONtainers DOoR-to-Door'.[1]
Following the1955 Modernisation Plan,British Railwaysembarked on a series of modernisation plans in... | https://en.wikipedia.org/wiki/Condor_(express_freight) |
Hauntology(aportmanteauofhauntingandontology, alsospectral studies,spectralities, or thespectral turn) is a range of ideas referring to the return or persistence of elements from the social or cultural past, as in the manner of a ghost. The term is aneologismfirst introduced by French philosopherJacques Derridain his 1... | https://en.wikipedia.org/wiki/Hauntology |
-logyis asuffixin the English language, used with words originally adapted fromAncient Greekending in-λογία(-logía).[1]The earliest English examples were anglicizations of the French-logie, which was in turn inherited from theLatin-logia.[2]The suffix became productive in English from the 18th century, allowing the for... | https://en.wikipedia.org/wiki/-ology |
Pretty Good Privacy(PGP) is anencryption programthat providescryptographicprivacyandauthenticationfordata communication. PGP is used forsigning, encrypting, and decrypting texts,e-mails, files, directories, and whole disk partitions and to increase thesecurityof e-mail communications.Phil Zimmermanndeveloped PGP in 199... | https://en.wikipedia.org/wiki/Pretty_Good_Privacy |
Anobject databaseorobject-oriented databaseis adatabase management systemin which information is represented in the form ofobjectsas used inobject-oriented programming. Object databases are different fromrelational databaseswhich are table-oriented. A third type,object–relational databases, is a hybrid of both approach... | https://en.wikipedia.org/wiki/Object_database |
Inmathematics,racksandquandlesare sets withbinary operationssatisfying axioms analogous to theReidemeister movesused to manipulateknotdiagrams.
While mainly used to obtain invariants of knots, they can be viewed asalgebraicconstructions in their own right. In particular, the definition of a quandle axiomatizes the pr... | https://en.wikipedia.org/wiki/Racks_and_quandles |
Heterodox
Rational expectationsis an economic theory that seeks to infer themacroeconomicconsequences of individuals' decisions based on all available knowledge. It assumes that individuals' actions are based on the best available economic theory and information.
The concept of rational expectations was first introdu... | https://en.wikipedia.org/wiki/Rational_expectations |
Limited-memory BFGS(L-BFGSorLM-BFGS) is anoptimizationalgorithmin the family ofquasi-Newton methodsthat approximates theBroyden–Fletcher–Goldfarb–Shanno algorithm(BFGS) using a limited amount ofcomputer memory.[1]It is a popular algorithm for parameter estimation inmachine learning.[2][3]The algorithm's target problem ... | https://en.wikipedia.org/wiki/L-BFGS |
FOAF(an acronym offriend of a friend) is amachine-readableontologydescribingpersons, their activities and their relations to other people and objects. Anyone can use FOAF to describe themselves. FOAF allows groups of people to describesocial networkswithout the need for a centralised database.
FOAF is a descriptive vo... | https://en.wikipedia.org/wiki/FOAF_(software) |
Incryptographyandcomputer science, ahash treeorMerkle treeis atreein which every "leaf"nodeis labelled with thecryptographic hashof a data block, and every node that is not a leaf (called abranch,inner node, orinode) is labelled with the cryptographic hash of the labels of its child nodes. A hash tree allows efficient ... | https://en.wikipedia.org/wiki/Merkle_tree |
Inanalytic philosophyandcomputer science,referential transparencyandreferential opacityare properties of linguistic constructions,[a]and by extension of languages. A linguistic construction is calledreferentially transparentwhen for any expression built from it,replacinga subexpression with another one thatdenotesthe s... | https://en.wikipedia.org/wiki/Referential_transparency |
Bayesian statistics(/ˈbeɪziən/BAY-zee-ənor/ˈbeɪʒən/BAY-zhən)[1]is a theory in the field ofstatisticsbased on theBayesian interpretation of probability, whereprobabilityexpresses adegree of beliefin anevent. The degree of belief may be based on prior knowledge about the event, such as the results of previous experiments... | https://en.wikipedia.org/wiki/Bayesian_statistics |
Inlinguistics, agraphemeis the smallest functional unit of awriting system.[1]The wordgraphemeis derived fromAncient Greekgráphō('write'), and the suffix-emeby analogy withphonemeand otheremic units. The study of graphemes is calledgraphemics. The concept of graphemes is abstract and similar to the notion incomputingof... | https://en.wikipedia.org/wiki/Grapheme |
Collective intelligenceCollective actionSelf-organized criticalityHerd mentalityPhase transitionAgent-based modellingSynchronizationAnt colony optimizationParticle swarm optimizationSwarm behaviour
Social network analysisSmall-world networksCentralityMotifsGraph theoryScalingRobustnessSystems biologyDynamic networks
... | https://en.wikipedia.org/wiki/Emergence |
Inmathematics,Dirichlet convolution(ordivisor convolution) is abinary operationdefined forarithmetic functions; it is important innumber theory. It was developed byPeter Gustav Lejeune Dirichlet.
Iff,g:N→C{\displaystyle f,g:\mathbb {N} \to \mathbb {C} }are twoarithmetic functions, their Dirichlet convolutionf∗g{\displ... | https://en.wikipedia.org/wiki/Dirichlet_convolution |
Design optimizationis an engineering design methodology using a mathematical formulation of a design problem to support selection of the optimal design among many alternatives. Design optimization involves the following stages:[1][2]
The formal mathematical (standard form) statement of the design optimization problem ... | https://en.wikipedia.org/wiki/Design_Optimization |
Inlinear algebra, aneigenvector(/ˈaɪɡən-/EYE-gən-) orcharacteristic vectoris avectorthat has itsdirectionunchanged (or reversed) by a givenlinear transformation. More precisely, an eigenvectorv{\displaystyle \mathbf {v} }of a linear transformationT{\displaystyle T}isscaled by a constant factorλ{\displaystyle \lambda }w... | https://en.wikipedia.org/wiki/Eigenvalues_and_eigenvectors |
Data Integrity Field(DIF) is an approach to protectdata integrityincomputer data storagefromdata corruption. It was proposed in 2003 by theT10 subcommitteeof theInternational Committee for Information Technology Standards.[1]A similar approach for data integrity was added in 2016 to the NVMe 1.2.1 specification.[2]
P... | https://en.wikipedia.org/wiki/Data_Integrity_Field |
Quantum networksform an important element ofquantum computingandquantum communicationsystems. Quantum networks facilitate the transmission of information in the form of quantum bits, also calledqubits, between physically separated quantum processors. A quantum processor is a machine able to performquantum circuitson a ... | https://en.wikipedia.org/wiki/Quantum_network |
Subitizingis the rapid, accurate, and effortless ability to perceive small quantities of items in aset, typically when there are four or fewer items, without relying on linguistic or arithmetic processes. The term refers to the sensation of instantly knowing how many objects are in the visual scene when their number fa... | https://en.wikipedia.org/wiki/Subitizing_and_counting |
In mathematics, adyadic rationalorbinary rationalis a number that can be expressed as afractionwhosedenominatoris apower of two. For example, 1/2, 3/2, and 3/8 are dyadic rationals, but 1/3 is not. These numbers are important incomputer sciencebecause they are the only ones with finitebinary representations. Dyadic rat... | https://en.wikipedia.org/wiki/Dyadic_rational |
Top-Down Parsing Language(TDPL) is a type ofanalyticformal grammardeveloped byAlexander Birmanin the early 1970s[1][2][3]in order to study formally the behavior of a common class of practicaltop-down parsersthat support a limited form ofbacktracking. Birman originally named his formalismthe TMG Schema(TS), afterTMG, a... | https://en.wikipedia.org/wiki/Top-down_parsing_language |
2AS5,2A07
93986
114142
ENSG00000128573
ENSMUSG00000029563
O15409Q75MZ5Q0PRL4Q8N6B6
P58463
NM_148900
NM_053242NM_212435NM_001286607
NP_683698NP_001166237.1NP_683697.2
NP_001273536NP_444472NP_997600
Forkhead box protein P2(FOXP2) is aproteinthat, in humans, is encoded by theFOXP2gene. FOXP2 is a member of thef... | https://en.wikipedia.org/wiki/FOXP2 |
Inmathematics, adualitytranslates concepts,theoremsormathematical structuresinto other concepts, theorems or structures in aone-to-onefashion, often (but not always) by means of aninvolutionoperation: if the dual ofAisB, then the dual ofBisA. In other cases the dual of the dual – the double dual or bidual – is not nece... | https://en.wikipedia.org/wiki/Duality_(mathematics) |
Ingame theory, ann-player gameis a game which is well defined for any number of players. This is usually used in contrast to standard2-player gamesthat are only specified for two players. In definingn-player games,game theoristsusually provide a definition that allow for any (finite) number of players.[1]The limiting c... | https://en.wikipedia.org/wiki/Maxn_algorithm |
In the jargon ofcomputer programming, asource upgradeis a modification of acomputer program'ssource code, which adds new features and options to it, improves performance and stability, or fixesbugsand errors from the previousversion. There are two popular types of source upgrades, which are listed here:
Thiscomputer-p... | https://en.wikipedia.org/wiki/Source_upgrade |
Inmathematics,complex geometryis the study ofgeometricstructures and constructions arising out of, or described by, thecomplex numbers. In particular, complex geometry is concerned with the study ofspacessuch ascomplex manifoldsandcomplex algebraic varieties, functions ofseveral complex variables, and holomorphic const... | https://en.wikipedia.org/wiki/Complex_geometry |
In thephilosophy of mathematics, thepre-intuitionistsis the name given byL. E. J. Brouwerto several influential mathematicians who shared similar opinions on the nature of mathematics. The term was introduced by Brouwer in his 1951 lectures atCambridgewhere he described the differences between his philosophy ofintuitio... | https://en.wikipedia.org/wiki/Preintuitionism |
Asoftware design description(a.k.a.software design documentorSDD; justdesign document; alsoSoftware Design Specification) is a representation of a software design that is to be used for recording design information, addressing various design concerns, and communicating that information to the design’s stakeholders.[1]A... | https://en.wikipedia.org/wiki/Design_document |
Theblocking of YouTube videos in Germanywas part of a former dispute between the video sharing platformYouTubeand theGesellschaft für musikalische Aufführungs- und mechanische Vervielfältigungsrechte(GEMA, or "Society for Musical Performance and Mechanical Reproduction Rights" in English), a performance rights organiza... | https://en.wikipedia.org/wiki/Blocking_of_YouTube_videos_in_Germany |
Inmathematical modeling,overfittingis "the production of an analysis that corresponds too closely or exactly to a particular set of data, and may therefore fail to fit to additional data or predict future observations reliably".[1]Anoverfitted modelis amathematical modelthat contains moreparametersthan can be justified... | https://en.wikipedia.org/wiki/Overfitting |
Instatisticsand in particularstatistical theory,unbiased estimation of a standard deviationis the calculation from astatistical sampleof an estimated value of thestandard deviation(a measure ofstatistical dispersion) of apopulationof values, in such a way that theexpected valueof the calculation equals the true value. ... | https://en.wikipedia.org/wiki/Unbiased_estimation_of_standard_deviation |
Alpha–beta pruningis asearch algorithmthat seeks to decrease the number of nodes that are evaluated by theminimax algorithmin itssearch tree. It is an adversarial search algorithm used commonly for machine playing of two-playercombinatorial games(Tic-tac-toe,Chess,Connect 4, etc.). It stops evaluating a move when at le... | https://en.wikipedia.org/wiki/Alpha%E2%80%93beta_pruning |
Neural coding(orneural representation) is aneurosciencefield concerned with characterising the hypothetical relationship between thestimulusand the neuronal responses, and the relationship among theelectrical activitiesof the neurons in theensemble.[1][2]Based on the theory that
sensory and other information is represe... | https://en.wikipedia.org/wiki/Neural_coding |
TheSignal Protocol(formerly known as theTextSecure Protocol) is a non-federatedcryptographic protocolthat providesend-to-end encryptionfor voice andinstant messagingconversations.[2]The protocol was developed byOpen Whisper Systemsin 2013[2]and was introduced in theopen-sourceTextSecureapp, which later becameSignal. Se... | https://en.wikipedia.org/wiki/Signal_Protocol |
Demographic gravitationis a concept of "social physics",[1]introduced byPrinceton UniversityastrophysicistJohn Quincy Stewart[2]in 1947.[3]It is an attempt to use equations and notions ofclassical physics, such asgravity, to seek simplified insights and even laws ofdemographicbehaviour for large numbers of human beings... | https://en.wikipedia.org/wiki/Demographic_gravitation |
Incomputing, awordis anyprocessordesign's natural unit of data. A word is a fixed-sizeddatumhandled as a unit by theinstruction setor the hardware of the processor. The number ofbitsor digits[a]in a word (theword size,word width, orword length) is an important characteristic of any specific processor design orcomputer ... | https://en.wikipedia.org/wiki/Word_(computer_architecture) |
Incomputer science,resource starvationis a problem encountered inconcurrent computingwhere aprocessis perpetually denied necessaryresourcesto process its work.[1]Starvation may be caused by errors in a scheduling ormutual exclusionalgorithm, but can also be caused byresource leaks, and can be intentionally caused via a... | https://en.wikipedia.org/wiki/Starvation_(computer_science) |
Adictionary coder, also sometimes known as asubstitution coder, is a class oflossless data compressionalgorithms which operate by searching for matches between the text to be compressed and a set ofstringscontained in adata structure(called the 'dictionary') maintained by the encoder. When the encoder finds such a matc... | https://en.wikipedia.org/wiki/Dictionary_coder |
Antiquity
Medieval
Early modern
Modern
Iran
India
East-Asia
Karma(/ˈkɑːrmə/, fromSanskrit:कर्म,IPA:[ˈkɐɾmɐ]ⓘ;Pali:kamma) is an ancient Indian concept that refers to an action, work, or deed, and its effect or consequences.[1]InIndian religions, the term more specifically refers to a principle ofcause and effect,... | https://en.wikipedia.org/wiki/Karma |
Phishingis a form ofsocial engineeringand ascamwhere attackers deceive people into revealingsensitive information[1]or installingmalwaresuch asviruses,worms,adware, orransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to obse... | https://en.wikipedia.org/wiki/Phishing |
Metadata(ormetainformation) is "datathat provides information about other data",[1]but not the content of the data itself, such as the text of a message or the image itself.[2]There are many distinct types of metadata, including:
Metadata is not strictly bound to one of these categories, as it can describe a piece of ... | https://en.wikipedia.org/wiki/Metadata |
Areal-time operating system(RTOS) is anoperating system(OS) forreal-time computingapplications that processes data and events that have critically defined time constraints. A RTOS is distinct from atime-sharingoperating system, such asUnix, which manages the sharing of system resources with a scheduler, data buffers, o... | https://en.wikipedia.org/wiki/Real-time_operating_system |
Inprobabilityandstatistics, anexponential familyis aparametricset ofprobability distributionsof a certain form, specified below. This special form is chosen for mathematical convenience, including the enabling of the user to calculate expectations, covariances using differentiation based on some useful algebraic proper... | https://en.wikipedia.org/wiki/Exponential_family |
In the computer industry,vaporware(orvapourware) is a product, typically computerhardwareorsoftware, that is announced to the general public but is late, never actually manufactured, or officially canceled. Use of the word has broadened to include products such as automobiles.
Vaporware is often announced months or ye... | https://en.wikipedia.org/wiki/Vaporware |
SemEval(SemanticEvaluation) is an ongoing series of evaluations ofcomputational semantic analysissystems; it evolved from theSensevalword senseevaluation series. The evaluations are intended to explore the nature ofmeaningin language. While meaning is intuitive to humans, transferring those intuitions to computational ... | https://en.wikipedia.org/wiki/SemEval |
Instatistics,projection pursuit regression (PPR)is astatistical modeldeveloped byJerome H. FriedmanandWerner Stuetzlethat extendsadditive models. This model adapts the additive models in that it first projects thedata matrixofexplanatory variablesin the optimal direction before applying smoothing functions to these exp... | https://en.wikipedia.org/wiki/Projection_pursuit_regression |
Classified informationis confidential material that a government deems to besensitive informationwhich must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted bylawor regulation to particular groups of individuals with the necessarysecurity clearanc... | https://en.wikipedia.org/wiki/Classified_information#Canada |
LightGBM, short forLight Gradient-Boosting Machine, is afree and open-sourcedistributedgradient-boostingframework formachine learning, originally developed byMicrosoft.[4][5]It is based ondecision treealgorithms and used forranking,classificationand other machine learning tasks. The development focus is on performance ... | https://en.wikipedia.org/wiki/LightGBM |
Cyc(pronounced/ˈsaɪk/SYKE) is a long-termartificial intelligence(AI) project that aims to assemble a comprehensiveontologyandknowledge basethat spans the basic concepts and rules about how the world works. Hoping to capturecommon sense knowledge, Cyc focuses onimplicit knowledge. The project began in July 1984 atMCCand... | https://en.wikipedia.org/wiki/Cyc |
The Medical Priority Dispatch System(MPDS), sometimes referred to as theAdvanced Medical Priority Dispatch System(AMPDS) is a unified system used to dispatch appropriate aid to medical emergencies including systematized caller interrogation and pre-arrival instructions. Priority Dispatch Corporation is licensed to desi... | https://en.wikipedia.org/wiki/Advanced_Medical_Priority_Dispatch_System |
Solving chessconsists of finding an optimal strategy for the game ofchess; that is, one by which one of the players (White or Black) can always force either a victory or a draw (seesolved game). It is also related to more generally solvingchess-likegames (i.e.combinatorial gamesofperfect information) such asCapablanca ... | https://en.wikipedia.org/wiki/Solving_chess |
This is a glossary ofSudokuterms and jargon. Sudoku with a 9×9 grid is assumed, unless otherwise noted.
ASudoku(i.e. thepuzzle) is a partially completedgrid. A grid has 9rows, 9columnsand 9boxes, each having 9cells(81 total). Boxes can also be calledblocksorregions.[1]Three horizontally adjacent blocks are aband, and ... | https://en.wikipedia.org/wiki/Glossary_of_Sudoku |
TheACMConference on Information and Knowledge Management(CIKM, pronounced/ˈsikəm/) is an annualcomputer scienceresearch conferencededicated toinformation management(IM) andknowledge management(KM). Since the first event in 1992, the conference has evolved into one of the major forums for research ondatabase management,... | https://en.wikipedia.org/wiki/Conference_on_Information_and_Knowledge_Management |
Incomputer programming, asemipredicate problemoccurs when asubroutineintended to return a useful value can fail, but the signalling of failure uses an otherwise validreturn value.[1]The problem is that the caller of the subroutine cannot tell what the result means in this case.
Thedivisionoperation yields areal number... | https://en.wikipedia.org/wiki/Semipredicate_problem |
NXLog[1]is a multi-platform log collection and centralization tool that offers log processing features, including log enrichment (parsing, filtering, and conversion) and log forwarding.[2]In concept NXLog is similar tosyslog-ngorRsyslogbut it is not limited toUNIXandsyslogonly. It supports all majoroperating systemssuc... | https://en.wikipedia.org/wiki/NXLog |
Aversioning file systemis any computerfile systemwhich allows acomputer fileto exist in several versions at the same time. Thus it is a form ofrevision control. Most common versioning file systems keep a number of old copies of the file. Some limit the number of changes per minute or per hour to avoid storing large ... | https://en.wikipedia.org/wiki/Versioning_file_system |
WAP Binary XML(WBXML) is a binary representation ofXML. It was developed by theWAP Forumand since 2002 is maintained by theOpen Mobile Allianceas a standard to allow XML documents to be transmitted in a compact manner over mobile networks and proposed as an addition to theWorld Wide Web Consortium'sWireless Application... | https://en.wikipedia.org/wiki/WBXML |
Incomputing, anatural user interface(NUI) ornatural interfaceis auser interfacethat is effectively invisible, and remains invisible as the user continuously learns increasingly complex interactions. The word "natural" is used because most computer interfaces use artificial control devices whose operation has to be lear... | https://en.wikipedia.org/wiki/Natural_user_interface |
Inmathematics, thedistributive propertyofbinary operationsis a generalization of thedistributive law, which asserts that the equalityx⋅(y+z)=x⋅y+x⋅z{\displaystyle x\cdot (y+z)=x\cdot y+x\cdot z}is always true inelementary algebra.
For example, inelementary arithmetic, one has2⋅(1+3)=(2⋅1)+(2⋅3).{\displaystyle 2\cdot (1... | https://en.wikipedia.org/wiki/Distributivity |
Typographical syntax, also known asorthotypography, is the aspect oftypographythat defines the meaning and rightful usage oftypographic signs, notablypunctuation marks, and elements oflayoutsuch asflush marginsandindentation.[1][2]
Orthotypographic rules vary broadly fromlanguageto language, from country to country, a... | https://en.wikipedia.org/wiki/Typographical_syntax |
Innumerical analysis, theNewton–Raphson method, also known simply asNewton's method, named afterIsaac NewtonandJoseph Raphson, is aroot-finding algorithmwhich produces successively betterapproximationsto theroots(or zeroes) of areal-valuedfunction. The most basic version starts with areal-valued functionf, itsderivativ... | https://en.wikipedia.org/wiki/Newton%27s_method |
One-key MAC(OMAC) is a family ofmessage authentication codesconstructed from ablock ciphermuch like theCBC-MACalgorithm. It may be used to provide assurance of the authenticity and, hence, the integrity of data. Two versions are defined:
OMAC is free for all uses: it is not covered by any patents.[4]
The core of the ... | https://en.wikipedia.org/wiki/One-key_MAC |
Acar, or anautomobile, is amotor vehiclewithwheels. Most definitions of cars state that they run primarily onroads,seatone to eight people, have four wheels, and mainly transportpeoplerather thancargo.[1][2]There are around one billion cars in use worldwide.[citation needed]
The French inventorNicolas-Joseph Cugnotbui... | https://en.wikipedia.org/wiki/Mass_automobility |
Afinite differenceis a mathematical expression of the formf(x+b) −f(x+a). Finite differences (or the associateddifference quotients) are often used as approximations of derivatives, such as innumerical differentiation.
Thedifference operator, commonly denotedΔ{\displaystyle \Delta }, is theoperatorthat maps a function... | https://en.wikipedia.org/wiki/Newton_series |
Incomputer science, alogical shiftis abitwise operationthat shifts all the bits of its operand. The two base variants are thelogical left shiftand thelogical right shift. This is further modulated by the number of bit positions a given value shall be shifted, such asshift left by 1orshift right by n. Unlike anarithmeti... | https://en.wikipedia.org/wiki/Logical_shift_left |
Description logics(DL) are a family of formalknowledge representationlanguages. Many DLs are more expressive thanpropositional logicbut less expressive thanfirst-order logic. In contrast to the latter, the core reasoning problems for DLs are (usually)decidable, and efficient decision procedures have been designed and i... | https://en.wikipedia.org/wiki/Description_logic |
Reliability engineeringis a sub-discipline ofsystems engineeringthat emphasizes the ability of equipment to function without failure. Reliability is defined as the probability that a product, system, or service will perform its intended function adequately for a specified period of time, OR will operate in a defined en... | https://en.wikipedia.org/wiki/Reliability_theory |
In algebra, theprincipal factorof aJ{\displaystyle {\mathcal {J}}}-classJof asemigroupSis equal toJifJis thekernelofS, and toJ∪{0}{\displaystyle J\cup \{0\}}otherwise.
Thisabstract algebra-related article is astub. You can help Wikipedia byexpanding it. | https://en.wikipedia.org/wiki/Principal_factor |
Small language models(SLMs) areartificial intelligencelanguage modelsdesigned for humannatural language processingincludinglanguage and text generation. Unlikelarge language models(LLMs), small language models are much smaller in scale and scope.
Typically, an LLM's number of training parameters is in the hundreds of ... | https://en.wikipedia.org/wiki/Small_language_model |
Black-box testing,sometimes referred to asspecification-based testing,[1]is a method ofsoftware testingthat examines the functionality of an application without peering into its internal structures or workings. This method of test can be applied virtually to every level of software testing:unit,integration,systemandacc... | https://en.wikipedia.org/wiki/Black_box_testing |
CIPURSEis an open security standard fortransitfare collection systems. It makes use ofsmart cardtechnologies and additional security measures.
The CIPURSE open security standard[1]was established by theOpen Standard for Public Transportation Alliance[2]to address the needs of local and regional transit authorities for... | https://en.wikipedia.org/wiki/CIPURSE |
Lexical functional grammar(LFG) is aconstraint-basedgrammar frameworkintheoretical linguistics. It posits two separate levels of syntactic structure, aphrase structure grammarrepresentation of word order and constituency, and a representation of grammatical functions such as subject and object, similar todependency gra... | https://en.wikipedia.org/wiki/Lexical_functional_grammar |
SPORE, theSecurity Protocols Open Repository, is an online library ofsecurity protocolswith comments and links to papers. Each protocol is downloadable in a variety of formats, including rules for use with automatic protocol verification tools. All protocols are described usingBAN logicor the style used by Clark and Ja... | https://en.wikipedia.org/wiki/Security_Protocols_Open_Repository |
The English language uses manyGreekandLatinroots,stems, andprefixes. These roots are listed alphabetically on three pages:
Some of those used inmedicineand medical technology are listed in theList of medical roots, suffixes and prefixes. | https://en.wikipedia.org/wiki/List_of_Greek_and_Latin_roots_in_English |
TheHuygens–Fresnel principle(named afterDutchphysicistChristiaan HuygensandFrenchphysicistAugustin-Jean Fresnel) states that every point on awavefrontis itself the source of spherical wavelets, and the secondary wavelets emanating from different points mutuallyinterfere.[1]The sum of these spherical wavelets forms a ne... | https://en.wikipedia.org/wiki/Huygens%E2%80%93Fresnel_principle |
Adatabase transactionsymbolizes aunit of work, performed within adatabase management system(or similar system) against adatabase, that is treated in a coherent and reliable way independent of other transactions. A transaction generally represents any change in a database. Transactions in a database environment have two... | https://en.wikipedia.org/wiki/Database_transaction |
Ahybrid systemis adynamical systemthat exhibits both continuous and discrete dynamic behavior – a system that can bothflow(described by adifferential equation) andjump(described by astate machine,automaton, or adifference equation).[1]Often, the term "hybrid dynamical system" is used instead of "hybrid system", to dist... | https://en.wikipedia.org/wiki/Hybrid_system |
No instruction set computing(NISC) is a computing architecture and compiler technology for designing highly efficient custom processors and hardware accelerators by allowing a compiler to have low-level control of hardware resources.
NISC is a statically scheduled horizontal nanocoded architecture (SSHNA). The term "s... | https://en.wikipedia.org/wiki/No_instruction_set_computing |
Inprobability theory, abeta negative binomial distributionis theprobability distributionof adiscreterandom variableX{\displaystyle X}equal to the number of failures needed to getr{\displaystyle r}successes in a sequence ofindependentBernoulli trials. The probabilityp{\displaystyle p}of success on each trial stays const... | https://en.wikipedia.org/wiki/Beta_negative_binomial_distribution |
Robert Anson Heinlein(/ˈhaɪnlaɪn/HYNE-lyne;[2][3][4]July 7, 1907 – May 8, 1988) was an Americanscience fictionauthor,aeronautical engineer, andnaval officer. Sometimes called the "dean of science fiction writers",[5]he was among the first to emphasize scientific accuracy in his fiction, and was thus a pioneer of the su... | https://en.wikipedia.org/wiki/Robert_A._Heinlein |
Abinary prefixis aunit prefixthat indicates amultipleof aunit of measurementby an integerpower of two. The most commonly used binary prefixes arekibi(symbol Ki, meaning210= 1024),mebi(Mi, 220=1048576), andgibi(Gi, 230=1073741824). They are most often used ininformation technologyas multipliers ofbitandbyte, when expres... | https://en.wikipedia.org/wiki/Binary_prefix |
Arootkitis a collection ofcomputer software, typically malicious, designed to enable access to acomputeror an area of itssoftwarethat is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.[1]The termrootkitis acompoundof "root" (the traditional ... | https://en.wikipedia.org/wiki/Rootkit |
Incomputer science, acontinuationis anabstract representationof thecontrol stateof acomputer program. A continuation implements (reifies) the program control state, i.e. the continuation is a data structure that represents the computational process at a given point in the process's execution; the created data structure... | https://en.wikipedia.org/wiki/Continuation |
Inmathematics,quantalesare certainpartially orderedalgebraic structuresthat generalizelocales(point free topologies) as well as various multiplicativelatticesofidealsfromring theoryandfunctional analysis(C*-algebras,von Neumann algebras).[1]Quantales are sometimes referred to ascompleteresiduated semigroups.
Aquantale... | https://en.wikipedia.org/wiki/Quantale |
Inmathematics, aDirac measureassigns a size to a set based solely on whether it contains a fixed elementxor not. It is one way of formalizing the idea of theDirac delta function, an important tool in physics and other technical fields.
ADirac measureis ameasureδxon a setX(with anyσ-algebraofsubsetsofX) defined for a g... | https://en.wikipedia.org/wiki/Dirac_measure |
Thehistory of mathematicsdeals with the origin of discoveries inmathematicsand themathematical methods and notation of the past. Before themodern ageand the worldwide spread of knowledge, written examples of new mathematical developments have come to light only in a few locales. From 3000 BC theMesopotamianstates ofSum... | https://en.wikipedia.org/wiki/History_of_mathematics |
TheInternational Association for Cryptologic Research(IACR) is a non-profit scientific organization that furthers research incryptologyand related fields. The IACR was organized at the initiative ofDavid Chaumat the CRYPTO '82 conference.[1]
The IACR organizes and sponsors three annual flagshipconferences, four area c... | https://en.wikipedia.org/wiki/International_Association_for_Cryptologic_Research |
Incomputingandcomputer programming,exception handlingis the process of responding to the occurrence ofexceptions– anomalous or exceptional conditions requiring special processing – during theexecutionof aprogram. In general, an exception breaks the normal flow of execution and executes a pre-registeredexception handler... | https://en.wikipedia.org/wiki/Exception_handling |
Negation as failure(NAF, for short) is anon-monotonicinference rule inlogic programming, used to derivenotp{\displaystyle \mathrm {not} ~p}(i.e. thatp{\displaystyle p}is assumed not to hold) from failure to derivep{\displaystyle p}. Note thatnotp{\displaystyle \mathrm {not} ~p}can be different from the statement¬p{\di... | https://en.wikipedia.org/wiki/Negation_as_failure |
Fault toleranceis the ability of asystemto maintain proper operation despite failures or faults in one or more of its components. This capability is essential forhigh-availability,mission-critical, or evenlife-critical systems.
Fault tolerance specifically refers to a system's capability to handle faults without any d... | https://en.wikipedia.org/wiki/Fault_tolerance |
Internet of things(IoT) describes devices withsensors, processing ability,softwareand othertechnologiesthat connect and exchange data with other devices and systems over theInternetor other communication networks.[1][2][3][4][5]The IoT encompasseselectronics,communication, andcomputer scienceengineering. "Internet of t... | https://en.wikipedia.org/wiki/Internet_of_Things |
Digital physicsis a speculative idea suggesting that theuniversecan be conceived of as a vast, digital computation device, or as the output of adeterministicorprobabilisticcomputer program.[1]The hypothesis that the universe is adigital computerwas proposed byKonrad Zusein his 1969 bookRechnender Raum[2](Calculating-sp... | https://en.wikipedia.org/wiki/Digital_physics |
TheSortino ratiomeasures therisk-adjusted returnof an investmentasset,portfolio, orstrategy.[1]It is a modification of theSharpe ratiobut penalizes only those returns falling below a user-specified target or requiredrate of return, while the Sharpe ratio penalizes both upside and downsidevolatilityequally. Though both ... | https://en.wikipedia.org/wiki/Sortino_ratio |
Inpropositional logicandBoolean algebra, there is aduality betweenconjunctionanddisjunction,[1][2][3]also called theduality principle.[4][5][6]It is the most widely known example of duality in logic.[1]The duality consists in thesemetalogicaltheorems:
The connectives may be defined in terms of each other as follows:
... | https://en.wikipedia.org/wiki/Conjunction/disjunction_duality |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.