text
stringlengths
21
172k
source
stringlengths
32
113
ARPA-E, orAdvanced Research Projects Agency–Energyis an agency within theUnited States Department of Energytasked with funding the research and development of advanced energy technologies.[1]The goal of the agency is to improve U.S. economic prosperity, national security, and environmental well being. ARPA-E typically ...
https://en.wikipedia.org/wiki/Advanced_Research_Projects_Agency%E2%80%93Energy
Ananti-patterninsoftware engineering,project management, andbusiness processesis a common response to a recurring problem that is usually ineffective and risks being highly counterproductive.[1][2]The term, coined in 1995 by computer programmerAndrew Koenig, was inspired by the bookDesign Patterns(which highlights a nu...
https://en.wikipedia.org/wiki/Anti-pattern
Incomputer networking,Energy-Efficient Ethernet(EEE) is a set of enhancements totwisted-pair,twinaxial,backplane, andoptical fiberEthernet physical-layer variantsthat reduce power consumption during periods of low data activity.[1]The intention is to reduce power consumption by at least half, while retaining full compa...
https://en.wikipedia.org/wiki/Energy-Efficient_Ethernet
Incomputing,cache replacement policies(also known ascache replacement algorithmsorcache algorithms) areoptimizinginstructions oralgorithmswhich acomputer programor hardware-maintained structure can utilize to manage acacheof information. Caching improves performance by keeping recent or often-used data items in memory ...
https://en.wikipedia.org/wiki/Cache_replacement_policies
TheITU-TRecommendationE.212defines mobile country codes (MCC) as well as mobile network codes (MNC). Themobile country codeconsists of three decimal digits and the mobile network code consists of two or three decimal digits (for example: MNC of 001 is not the same as MNC of 01). The first digit of the mobile country c...
https://en.wikipedia.org/wiki/Mobile_network_code
TheCondorwas an overnight fast freight train service operated byBritish RailwaysbetweenLondonandGlasgowfrom 1959 until 1965 with all freight carried in containers. The name was derived from 'CONtainers DOoR-to-Door'.[1] Following the1955 Modernisation Plan,British Railwaysembarked on a series of modernisation plans in...
https://en.wikipedia.org/wiki/Condor_(express_freight)
Hauntology(aportmanteauofhauntingandontology, alsospectral studies,spectralities, or thespectral turn) is a range of ideas referring to the return or persistence of elements from the social or cultural past, as in the manner of a ghost. The term is aneologismfirst introduced by French philosopherJacques Derridain his 1...
https://en.wikipedia.org/wiki/Hauntology
-logyis asuffixin the English language, used with words originally adapted fromAncient Greekending in-λογία(-logía).[1]The earliest English examples were anglicizations of the French-logie, which was in turn inherited from theLatin-logia.[2]The suffix became productive in English from the 18th century, allowing the for...
https://en.wikipedia.org/wiki/-ology
Pretty Good Privacy(PGP) is anencryption programthat providescryptographicprivacyandauthenticationfordata communication. PGP is used forsigning, encrypting, and decrypting texts,e-mails, files, directories, and whole disk partitions and to increase thesecurityof e-mail communications.Phil Zimmermanndeveloped PGP in 199...
https://en.wikipedia.org/wiki/Pretty_Good_Privacy
Anobject databaseorobject-oriented databaseis adatabase management systemin which information is represented in the form ofobjectsas used inobject-oriented programming. Object databases are different fromrelational databaseswhich are table-oriented. A third type,object–relational databases, is a hybrid of both approach...
https://en.wikipedia.org/wiki/Object_database
Inmathematics,racksandquandlesare sets withbinary operationssatisfying axioms analogous to theReidemeister movesused to manipulateknotdiagrams. While mainly used to obtain invariants of knots, they can be viewed asalgebraicconstructions in their own right. In particular, the definition of a quandle axiomatizes the pr...
https://en.wikipedia.org/wiki/Racks_and_quandles
Heterodox Rational expectationsis an economic theory that seeks to infer themacroeconomicconsequences of individuals' decisions based on all available knowledge. It assumes that individuals' actions are based on the best available economic theory and information. The concept of rational expectations was first introdu...
https://en.wikipedia.org/wiki/Rational_expectations
Limited-memory BFGS(L-BFGSorLM-BFGS) is anoptimizationalgorithmin the family ofquasi-Newton methodsthat approximates theBroyden–Fletcher–Goldfarb–Shanno algorithm(BFGS) using a limited amount ofcomputer memory.[1]It is a popular algorithm for parameter estimation inmachine learning.[2][3]The algorithm's target problem ...
https://en.wikipedia.org/wiki/L-BFGS
FOAF(an acronym offriend of a friend) is amachine-readableontologydescribingpersons, their activities and their relations to other people and objects. Anyone can use FOAF to describe themselves. FOAF allows groups of people to describesocial networkswithout the need for a centralised database. FOAF is a descriptive vo...
https://en.wikipedia.org/wiki/FOAF_(software)
Incryptographyandcomputer science, ahash treeorMerkle treeis atreein which every "leaf"nodeis labelled with thecryptographic hashof a data block, and every node that is not a leaf (called abranch,inner node, orinode) is labelled with the cryptographic hash of the labels of its child nodes. A hash tree allows efficient ...
https://en.wikipedia.org/wiki/Merkle_tree
Inanalytic philosophyandcomputer science,referential transparencyandreferential opacityare properties of linguistic constructions,[a]and by extension of languages. A linguistic construction is calledreferentially transparentwhen for any expression built from it,replacinga subexpression with another one thatdenotesthe s...
https://en.wikipedia.org/wiki/Referential_transparency
Bayesian statistics(/ˈbeɪziən/BAY-zee-ənor/ˈbeɪʒən/BAY-zhən)[1]is a theory in the field ofstatisticsbased on theBayesian interpretation of probability, whereprobabilityexpresses adegree of beliefin anevent. The degree of belief may be based on prior knowledge about the event, such as the results of previous experiments...
https://en.wikipedia.org/wiki/Bayesian_statistics
Inlinguistics, agraphemeis the smallest functional unit of awriting system.[1]The wordgraphemeis derived fromAncient Greekgráphō('write'), and the suffix-emeby analogy withphonemeand otheremic units. The study of graphemes is calledgraphemics. The concept of graphemes is abstract and similar to the notion incomputingof...
https://en.wikipedia.org/wiki/Grapheme
Collective intelligenceCollective actionSelf-organized criticalityHerd mentalityPhase transitionAgent-based modellingSynchronizationAnt colony optimizationParticle swarm optimizationSwarm behaviour Social network analysisSmall-world networksCentralityMotifsGraph theoryScalingRobustnessSystems biologyDynamic networks ...
https://en.wikipedia.org/wiki/Emergence
Inmathematics,Dirichlet convolution(ordivisor convolution) is abinary operationdefined forarithmetic functions; it is important innumber theory. It was developed byPeter Gustav Lejeune Dirichlet. Iff,g:N→C{\displaystyle f,g:\mathbb {N} \to \mathbb {C} }are twoarithmetic functions, their Dirichlet convolutionf∗g{\displ...
https://en.wikipedia.org/wiki/Dirichlet_convolution
Design optimizationis an engineering design methodology using a mathematical formulation of a design problem to support selection of the optimal design among many alternatives. Design optimization involves the following stages:[1][2] The formal mathematical (standard form) statement of the design optimization problem ...
https://en.wikipedia.org/wiki/Design_Optimization
Inlinear algebra, aneigenvector(/ˈaɪɡən-/EYE-gən-) orcharacteristic vectoris avectorthat has itsdirectionunchanged (or reversed) by a givenlinear transformation. More precisely, an eigenvectorv{\displaystyle \mathbf {v} }of a linear transformationT{\displaystyle T}isscaled by a constant factorλ{\displaystyle \lambda }w...
https://en.wikipedia.org/wiki/Eigenvalues_and_eigenvectors
Data Integrity Field(DIF) is an approach to protectdata integrityincomputer data storagefromdata corruption. It was proposed in 2003 by theT10 subcommitteeof theInternational Committee for Information Technology Standards.[1]A similar approach for data integrity was added in 2016 to the NVMe 1.2.1 specification.[2] P...
https://en.wikipedia.org/wiki/Data_Integrity_Field
Quantum networksform an important element ofquantum computingandquantum communicationsystems. Quantum networks facilitate the transmission of information in the form of quantum bits, also calledqubits, between physically separated quantum processors. A quantum processor is a machine able to performquantum circuitson a ...
https://en.wikipedia.org/wiki/Quantum_network
Subitizingis the rapid, accurate, and effortless ability to perceive small quantities of items in aset, typically when there are four or fewer items, without relying on linguistic or arithmetic processes. The term refers to the sensation of instantly knowing how many objects are in the visual scene when their number fa...
https://en.wikipedia.org/wiki/Subitizing_and_counting
In mathematics, adyadic rationalorbinary rationalis a number that can be expressed as afractionwhosedenominatoris apower of two. For example, 1/2, 3/2, and 3/8 are dyadic rationals, but 1/3 is not. These numbers are important incomputer sciencebecause they are the only ones with finitebinary representations. Dyadic rat...
https://en.wikipedia.org/wiki/Dyadic_rational
Top-Down Parsing Language(TDPL) is a type ofanalyticformal grammardeveloped byAlexander Birmanin the early 1970s[1][2][3]in order to study formally the behavior of a common class of practicaltop-down parsersthat support a limited form ofbacktracking. Birman originally named his formalismthe TMG Schema(TS), afterTMG, a...
https://en.wikipedia.org/wiki/Top-down_parsing_language
2AS5,2A07 93986 114142 ENSG00000128573 ENSMUSG00000029563 O15409Q75MZ5Q0PRL4Q8N6B6 P58463 NM_148900 NM_053242NM_212435NM_001286607 NP_683698NP_001166237.1NP_683697.2 NP_001273536NP_444472NP_997600 Forkhead box protein P2(FOXP2) is aproteinthat, in humans, is encoded by theFOXP2gene. FOXP2 is a member of thef...
https://en.wikipedia.org/wiki/FOXP2
Inmathematics, adualitytranslates concepts,theoremsormathematical structuresinto other concepts, theorems or structures in aone-to-onefashion, often (but not always) by means of aninvolutionoperation: if the dual ofAisB, then the dual ofBisA. In other cases the dual of the dual – the double dual or bidual – is not nece...
https://en.wikipedia.org/wiki/Duality_(mathematics)
Ingame theory, ann-player gameis a game which is well defined for any number of players. This is usually used in contrast to standard2-player gamesthat are only specified for two players. In definingn-player games,game theoristsusually provide a definition that allow for any (finite) number of players.[1]The limiting c...
https://en.wikipedia.org/wiki/Maxn_algorithm
In the jargon ofcomputer programming, asource upgradeis a modification of acomputer program'ssource code, which adds new features and options to it, improves performance and stability, or fixesbugsand errors from the previousversion. There are two popular types of source upgrades, which are listed here: Thiscomputer-p...
https://en.wikipedia.org/wiki/Source_upgrade
Inmathematics,complex geometryis the study ofgeometricstructures and constructions arising out of, or described by, thecomplex numbers. In particular, complex geometry is concerned with the study ofspacessuch ascomplex manifoldsandcomplex algebraic varieties, functions ofseveral complex variables, and holomorphic const...
https://en.wikipedia.org/wiki/Complex_geometry
In thephilosophy of mathematics, thepre-intuitionistsis the name given byL. E. J. Brouwerto several influential mathematicians who shared similar opinions on the nature of mathematics. The term was introduced by Brouwer in his 1951 lectures atCambridgewhere he described the differences between his philosophy ofintuitio...
https://en.wikipedia.org/wiki/Preintuitionism
Asoftware design description(a.k.a.software design documentorSDD; justdesign document; alsoSoftware Design Specification) is a representation of a software design that is to be used for recording design information, addressing various design concerns, and communicating that information to the design’s stakeholders.[1]A...
https://en.wikipedia.org/wiki/Design_document
Theblocking of YouTube videos in Germanywas part of a former dispute between the video sharing platformYouTubeand theGesellschaft für musikalische Aufführungs- und mechanische Vervielfältigungsrechte(GEMA, or "Society for Musical Performance and Mechanical Reproduction Rights" in English), a performance rights organiza...
https://en.wikipedia.org/wiki/Blocking_of_YouTube_videos_in_Germany
Inmathematical modeling,overfittingis "the production of an analysis that corresponds too closely or exactly to a particular set of data, and may therefore fail to fit to additional data or predict future observations reliably".[1]Anoverfitted modelis amathematical modelthat contains moreparametersthan can be justified...
https://en.wikipedia.org/wiki/Overfitting
Instatisticsand in particularstatistical theory,unbiased estimation of a standard deviationis the calculation from astatistical sampleof an estimated value of thestandard deviation(a measure ofstatistical dispersion) of apopulationof values, in such a way that theexpected valueof the calculation equals the true value. ...
https://en.wikipedia.org/wiki/Unbiased_estimation_of_standard_deviation
Alpha–beta pruningis asearch algorithmthat seeks to decrease the number of nodes that are evaluated by theminimax algorithmin itssearch tree. It is an adversarial search algorithm used commonly for machine playing of two-playercombinatorial games(Tic-tac-toe,Chess,Connect 4, etc.). It stops evaluating a move when at le...
https://en.wikipedia.org/wiki/Alpha%E2%80%93beta_pruning
Neural coding(orneural representation) is aneurosciencefield concerned with characterising the hypothetical relationship between thestimulusand the neuronal responses, and the relationship among theelectrical activitiesof the neurons in theensemble.[1][2]Based on the theory that sensory and other information is represe...
https://en.wikipedia.org/wiki/Neural_coding
TheSignal Protocol(formerly known as theTextSecure Protocol) is a non-federatedcryptographic protocolthat providesend-to-end encryptionfor voice andinstant messagingconversations.[2]The protocol was developed byOpen Whisper Systemsin 2013[2]and was introduced in theopen-sourceTextSecureapp, which later becameSignal. Se...
https://en.wikipedia.org/wiki/Signal_Protocol
Demographic gravitationis a concept of "social physics",[1]introduced byPrinceton UniversityastrophysicistJohn Quincy Stewart[2]in 1947.[3]It is an attempt to use equations and notions ofclassical physics, such asgravity, to seek simplified insights and even laws ofdemographicbehaviour for large numbers of human beings...
https://en.wikipedia.org/wiki/Demographic_gravitation
Incomputing, awordis anyprocessordesign's natural unit of data. A word is a fixed-sizeddatumhandled as a unit by theinstruction setor the hardware of the processor. The number ofbitsor digits[a]in a word (theword size,word width, orword length) is an important characteristic of any specific processor design orcomputer ...
https://en.wikipedia.org/wiki/Word_(computer_architecture)
Incomputer science,resource starvationis a problem encountered inconcurrent computingwhere aprocessis perpetually denied necessaryresourcesto process its work.[1]Starvation may be caused by errors in a scheduling ormutual exclusionalgorithm, but can also be caused byresource leaks, and can be intentionally caused via a...
https://en.wikipedia.org/wiki/Starvation_(computer_science)
Adictionary coder, also sometimes known as asubstitution coder, is a class oflossless data compressionalgorithms which operate by searching for matches between the text to be compressed and a set ofstringscontained in adata structure(called the 'dictionary') maintained by the encoder. When the encoder finds such a matc...
https://en.wikipedia.org/wiki/Dictionary_coder
Antiquity Medieval Early modern Modern Iran India East-Asia Karma(/ˈkɑːrmə/, fromSanskrit:कर्म,IPA:[ˈkɐɾmɐ]ⓘ;Pali:kamma) is an ancient Indian concept that refers to an action, work, or deed, and its effect or consequences.[1]InIndian religions, the term more specifically refers to a principle ofcause and effect,...
https://en.wikipedia.org/wiki/Karma
Phishingis a form ofsocial engineeringand ascamwhere attackers deceive people into revealingsensitive information[1]or installingmalwaresuch asviruses,worms,adware, orransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to obse...
https://en.wikipedia.org/wiki/Phishing
Metadata(ormetainformation) is "datathat provides information about other data",[1]but not the content of the data itself, such as the text of a message or the image itself.[2]There are many distinct types of metadata, including: Metadata is not strictly bound to one of these categories, as it can describe a piece of ...
https://en.wikipedia.org/wiki/Metadata
Areal-time operating system(RTOS) is anoperating system(OS) forreal-time computingapplications that processes data and events that have critically defined time constraints. A RTOS is distinct from atime-sharingoperating system, such asUnix, which manages the sharing of system resources with a scheduler, data buffers, o...
https://en.wikipedia.org/wiki/Real-time_operating_system
Inprobabilityandstatistics, anexponential familyis aparametricset ofprobability distributionsof a certain form, specified below. This special form is chosen for mathematical convenience, including the enabling of the user to calculate expectations, covariances using differentiation based on some useful algebraic proper...
https://en.wikipedia.org/wiki/Exponential_family
In the computer industry,vaporware(orvapourware) is a product, typically computerhardwareorsoftware, that is announced to the general public but is late, never actually manufactured, or officially canceled. Use of the word has broadened to include products such as automobiles. Vaporware is often announced months or ye...
https://en.wikipedia.org/wiki/Vaporware
SemEval(SemanticEvaluation) is an ongoing series of evaluations ofcomputational semantic analysissystems; it evolved from theSensevalword senseevaluation series. The evaluations are intended to explore the nature ofmeaningin language. While meaning is intuitive to humans, transferring those intuitions to computational ...
https://en.wikipedia.org/wiki/SemEval
Instatistics,projection pursuit regression (PPR)is astatistical modeldeveloped byJerome H. FriedmanandWerner Stuetzlethat extendsadditive models. This model adapts the additive models in that it first projects thedata matrixofexplanatory variablesin the optimal direction before applying smoothing functions to these exp...
https://en.wikipedia.org/wiki/Projection_pursuit_regression
Classified informationis confidential material that a government deems to besensitive informationwhich must be protected from unauthorized disclosure that requires special handling and dissemination controls. Access is restricted bylawor regulation to particular groups of individuals with the necessarysecurity clearanc...
https://en.wikipedia.org/wiki/Classified_information#Canada
LightGBM, short forLight Gradient-Boosting Machine, is afree and open-sourcedistributedgradient-boostingframework formachine learning, originally developed byMicrosoft.[4][5]It is based ondecision treealgorithms and used forranking,classificationand other machine learning tasks. The development focus is on performance ...
https://en.wikipedia.org/wiki/LightGBM
Cyc(pronounced/ˈsaɪk/SYKE) is a long-termartificial intelligence(AI) project that aims to assemble a comprehensiveontologyandknowledge basethat spans the basic concepts and rules about how the world works. Hoping to capturecommon sense knowledge, Cyc focuses onimplicit knowledge. The project began in July 1984 atMCCand...
https://en.wikipedia.org/wiki/Cyc
The Medical Priority Dispatch System(MPDS), sometimes referred to as theAdvanced Medical Priority Dispatch System(AMPDS) is a unified system used to dispatch appropriate aid to medical emergencies including systematized caller interrogation and pre-arrival instructions. Priority Dispatch Corporation is licensed to desi...
https://en.wikipedia.org/wiki/Advanced_Medical_Priority_Dispatch_System
Solving chessconsists of finding an optimal strategy for the game ofchess; that is, one by which one of the players (White or Black) can always force either a victory or a draw (seesolved game). It is also related to more generally solvingchess-likegames (i.e.combinatorial gamesofperfect information) such asCapablanca ...
https://en.wikipedia.org/wiki/Solving_chess
This is a glossary ofSudokuterms and jargon. Sudoku with a 9×9 grid is assumed, unless otherwise noted. ASudoku(i.e. thepuzzle) is a partially completedgrid. A grid has 9rows, 9columnsand 9boxes, each having 9cells(81 total). Boxes can also be calledblocksorregions.[1]Three horizontally adjacent blocks are aband, and ...
https://en.wikipedia.org/wiki/Glossary_of_Sudoku
TheACMConference on Information and Knowledge Management(CIKM, pronounced/ˈsikəm/) is an annualcomputer scienceresearch conferencededicated toinformation management(IM) andknowledge management(KM). Since the first event in 1992, the conference has evolved into one of the major forums for research ondatabase management,...
https://en.wikipedia.org/wiki/Conference_on_Information_and_Knowledge_Management
Incomputer programming, asemipredicate problemoccurs when asubroutineintended to return a useful value can fail, but the signalling of failure uses an otherwise validreturn value.[1]The problem is that the caller of the subroutine cannot tell what the result means in this case. Thedivisionoperation yields areal number...
https://en.wikipedia.org/wiki/Semipredicate_problem
NXLog[1]is a multi-platform log collection and centralization tool that offers log processing features, including log enrichment (parsing, filtering, and conversion) and log forwarding.[2]In concept NXLog is similar tosyslog-ngorRsyslogbut it is not limited toUNIXandsyslogonly. It supports all majoroperating systemssuc...
https://en.wikipedia.org/wiki/NXLog
Aversioning file systemis any computerfile systemwhich allows acomputer fileto exist in several versions at the same time. Thus it is a form ofrevision control. Most common versioning file systems keep a number of old copies of the file. Some limit the number of changes per minute or per hour to avoid storing large ...
https://en.wikipedia.org/wiki/Versioning_file_system
WAP Binary XML(WBXML) is a binary representation ofXML. It was developed by theWAP Forumand since 2002 is maintained by theOpen Mobile Allianceas a standard to allow XML documents to be transmitted in a compact manner over mobile networks and proposed as an addition to theWorld Wide Web Consortium'sWireless Application...
https://en.wikipedia.org/wiki/WBXML
Incomputing, anatural user interface(NUI) ornatural interfaceis auser interfacethat is effectively invisible, and remains invisible as the user continuously learns increasingly complex interactions. The word "natural" is used because most computer interfaces use artificial control devices whose operation has to be lear...
https://en.wikipedia.org/wiki/Natural_user_interface
Inmathematics, thedistributive propertyofbinary operationsis a generalization of thedistributive law, which asserts that the equalityx⋅(y+z)=x⋅y+x⋅z{\displaystyle x\cdot (y+z)=x\cdot y+x\cdot z}is always true inelementary algebra. For example, inelementary arithmetic, one has2⋅(1+3)=(2⋅1)+(2⋅3).{\displaystyle 2\cdot (1...
https://en.wikipedia.org/wiki/Distributivity
Typographical syntax, also known asorthotypography, is the aspect oftypographythat defines the meaning and rightful usage oftypographic signs, notablypunctuation marks, and elements oflayoutsuch asflush marginsandindentation.[1][2] Orthotypographic rules vary broadly fromlanguageto language, from country to country, a...
https://en.wikipedia.org/wiki/Typographical_syntax
Innumerical analysis, theNewton–Raphson method, also known simply asNewton's method, named afterIsaac NewtonandJoseph Raphson, is aroot-finding algorithmwhich produces successively betterapproximationsto theroots(or zeroes) of areal-valuedfunction. The most basic version starts with areal-valued functionf, itsderivativ...
https://en.wikipedia.org/wiki/Newton%27s_method
One-key MAC(OMAC) is a family ofmessage authentication codesconstructed from ablock ciphermuch like theCBC-MACalgorithm. It may be used to provide assurance of the authenticity and, hence, the integrity of data. Two versions are defined: OMAC is free for all uses: it is not covered by any patents.[4] The core of the ...
https://en.wikipedia.org/wiki/One-key_MAC
Acar, or anautomobile, is amotor vehiclewithwheels. Most definitions of cars state that they run primarily onroads,seatone to eight people, have four wheels, and mainly transportpeoplerather thancargo.[1][2]There are around one billion cars in use worldwide.[citation needed] The French inventorNicolas-Joseph Cugnotbui...
https://en.wikipedia.org/wiki/Mass_automobility
Afinite differenceis a mathematical expression of the formf(x+b) −f(x+a). Finite differences (or the associateddifference quotients) are often used as approximations of derivatives, such as innumerical differentiation. Thedifference operator, commonly denotedΔ{\displaystyle \Delta }, is theoperatorthat maps a function...
https://en.wikipedia.org/wiki/Newton_series
Incomputer science, alogical shiftis abitwise operationthat shifts all the bits of its operand. The two base variants are thelogical left shiftand thelogical right shift. This is further modulated by the number of bit positions a given value shall be shifted, such asshift left by 1orshift right by n. Unlike anarithmeti...
https://en.wikipedia.org/wiki/Logical_shift_left
Description logics(DL) are a family of formalknowledge representationlanguages. Many DLs are more expressive thanpropositional logicbut less expressive thanfirst-order logic. In contrast to the latter, the core reasoning problems for DLs are (usually)decidable, and efficient decision procedures have been designed and i...
https://en.wikipedia.org/wiki/Description_logic
Reliability engineeringis a sub-discipline ofsystems engineeringthat emphasizes the ability of equipment to function without failure. Reliability is defined as the probability that a product, system, or service will perform its intended function adequately for a specified period of time, OR will operate in a defined en...
https://en.wikipedia.org/wiki/Reliability_theory
In algebra, theprincipal factorof aJ{\displaystyle {\mathcal {J}}}-classJof asemigroupSis equal toJifJis thekernelofS, and toJ∪{0}{\displaystyle J\cup \{0\}}otherwise. Thisabstract algebra-related article is astub. You can help Wikipedia byexpanding it.
https://en.wikipedia.org/wiki/Principal_factor
Small language models(SLMs) areartificial intelligencelanguage modelsdesigned for humannatural language processingincludinglanguage and text generation. Unlikelarge language models(LLMs), small language models are much smaller in scale and scope. Typically, an LLM's number of training parameters is in the hundreds of ...
https://en.wikipedia.org/wiki/Small_language_model
Black-box testing,sometimes referred to asspecification-based testing,[1]is a method ofsoftware testingthat examines the functionality of an application without peering into its internal structures or workings. This method of test can be applied virtually to every level of software testing:unit,integration,systemandacc...
https://en.wikipedia.org/wiki/Black_box_testing
CIPURSEis an open security standard fortransitfare collection systems. It makes use ofsmart cardtechnologies and additional security measures. The CIPURSE open security standard[1]was established by theOpen Standard for Public Transportation Alliance[2]to address the needs of local and regional transit authorities for...
https://en.wikipedia.org/wiki/CIPURSE
Lexical functional grammar(LFG) is aconstraint-basedgrammar frameworkintheoretical linguistics. It posits two separate levels of syntactic structure, aphrase structure grammarrepresentation of word order and constituency, and a representation of grammatical functions such as subject and object, similar todependency gra...
https://en.wikipedia.org/wiki/Lexical_functional_grammar
SPORE, theSecurity Protocols Open Repository, is an online library ofsecurity protocolswith comments and links to papers. Each protocol is downloadable in a variety of formats, including rules for use with automatic protocol verification tools. All protocols are described usingBAN logicor the style used by Clark and Ja...
https://en.wikipedia.org/wiki/Security_Protocols_Open_Repository
The English language uses manyGreekandLatinroots,stems, andprefixes. These roots are listed alphabetically on three pages: Some of those used inmedicineand medical technology are listed in theList of medical roots, suffixes and prefixes.
https://en.wikipedia.org/wiki/List_of_Greek_and_Latin_roots_in_English
TheHuygens–Fresnel principle(named afterDutchphysicistChristiaan HuygensandFrenchphysicistAugustin-Jean Fresnel) states that every point on awavefrontis itself the source of spherical wavelets, and the secondary wavelets emanating from different points mutuallyinterfere.[1]The sum of these spherical wavelets forms a ne...
https://en.wikipedia.org/wiki/Huygens%E2%80%93Fresnel_principle
Adatabase transactionsymbolizes aunit of work, performed within adatabase management system(or similar system) against adatabase, that is treated in a coherent and reliable way independent of other transactions. A transaction generally represents any change in a database. Transactions in a database environment have two...
https://en.wikipedia.org/wiki/Database_transaction
Ahybrid systemis adynamical systemthat exhibits both continuous and discrete dynamic behavior – a system that can bothflow(described by adifferential equation) andjump(described by astate machine,automaton, or adifference equation).[1]Often, the term "hybrid dynamical system" is used instead of "hybrid system", to dist...
https://en.wikipedia.org/wiki/Hybrid_system
No instruction set computing(NISC) is a computing architecture and compiler technology for designing highly efficient custom processors and hardware accelerators by allowing a compiler to have low-level control of hardware resources. NISC is a statically scheduled horizontal nanocoded architecture (SSHNA). The term "s...
https://en.wikipedia.org/wiki/No_instruction_set_computing
Inprobability theory, abeta negative binomial distributionis theprobability distributionof adiscreterandom variableX{\displaystyle X}equal to the number of failures needed to getr{\displaystyle r}successes in a sequence ofindependentBernoulli trials. The probabilityp{\displaystyle p}of success on each trial stays const...
https://en.wikipedia.org/wiki/Beta_negative_binomial_distribution
Robert Anson Heinlein(/ˈhaɪnlaɪn/HYNE-lyne;[2][3][4]July 7, 1907 – May 8, 1988) was an Americanscience fictionauthor,aeronautical engineer, andnaval officer. Sometimes called the "dean of science fiction writers",[5]he was among the first to emphasize scientific accuracy in his fiction, and was thus a pioneer of the su...
https://en.wikipedia.org/wiki/Robert_A._Heinlein
Abinary prefixis aunit prefixthat indicates amultipleof aunit of measurementby an integerpower of two. The most commonly used binary prefixes arekibi(symbol Ki, meaning210= 1024),mebi(Mi, 220=1048576), andgibi(Gi, 230=1073741824). They are most often used ininformation technologyas multipliers ofbitandbyte, when expres...
https://en.wikipedia.org/wiki/Binary_prefix
Arootkitis a collection ofcomputer software, typically malicious, designed to enable access to acomputeror an area of itssoftwarethat is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.[1]The termrootkitis acompoundof "root" (the traditional ...
https://en.wikipedia.org/wiki/Rootkit
Incomputer science, acontinuationis anabstract representationof thecontrol stateof acomputer program. A continuation implements (reifies) the program control state, i.e. the continuation is a data structure that represents the computational process at a given point in the process's execution; the created data structure...
https://en.wikipedia.org/wiki/Continuation
Inmathematics,quantalesare certainpartially orderedalgebraic structuresthat generalizelocales(point free topologies) as well as various multiplicativelatticesofidealsfromring theoryandfunctional analysis(C*-algebras,von Neumann algebras).[1]Quantales are sometimes referred to ascompleteresiduated semigroups. Aquantale...
https://en.wikipedia.org/wiki/Quantale
Inmathematics, aDirac measureassigns a size to a set based solely on whether it contains a fixed elementxor not. It is one way of formalizing the idea of theDirac delta function, an important tool in physics and other technical fields. ADirac measureis ameasureδxon a setX(with anyσ-algebraofsubsetsofX) defined for a g...
https://en.wikipedia.org/wiki/Dirac_measure
Thehistory of mathematicsdeals with the origin of discoveries inmathematicsand themathematical methods and notation of the past. Before themodern ageand the worldwide spread of knowledge, written examples of new mathematical developments have come to light only in a few locales. From 3000 BC theMesopotamianstates ofSum...
https://en.wikipedia.org/wiki/History_of_mathematics
TheInternational Association for Cryptologic Research(IACR) is a non-profit scientific organization that furthers research incryptologyand related fields. The IACR was organized at the initiative ofDavid Chaumat the CRYPTO '82 conference.[1] The IACR organizes and sponsors three annual flagshipconferences, four area c...
https://en.wikipedia.org/wiki/International_Association_for_Cryptologic_Research
Incomputingandcomputer programming,exception handlingis the process of responding to the occurrence ofexceptions– anomalous or exceptional conditions requiring special processing – during theexecutionof aprogram. In general, an exception breaks the normal flow of execution and executes a pre-registeredexception handler...
https://en.wikipedia.org/wiki/Exception_handling
Negation as failure(NAF, for short) is anon-monotonicinference rule inlogic programming, used to derivenotp{\displaystyle \mathrm {not} ~p}(i.e. thatp{\displaystyle p}is assumed not to hold) from failure to derivep{\displaystyle p}. Note thatnotp{\displaystyle \mathrm {not} ~p}can be different from the statement¬p{\di...
https://en.wikipedia.org/wiki/Negation_as_failure
Fault toleranceis the ability of asystemto maintain proper operation despite failures or faults in one or more of its components. This capability is essential forhigh-availability,mission-critical, or evenlife-critical systems. Fault tolerance specifically refers to a system's capability to handle faults without any d...
https://en.wikipedia.org/wiki/Fault_tolerance
Internet of things(IoT) describes devices withsensors, processing ability,softwareand othertechnologiesthat connect and exchange data with other devices and systems over theInternetor other communication networks.[1][2][3][4][5]The IoT encompasseselectronics,communication, andcomputer scienceengineering. "Internet of t...
https://en.wikipedia.org/wiki/Internet_of_Things
Digital physicsis a speculative idea suggesting that theuniversecan be conceived of as a vast, digital computation device, or as the output of adeterministicorprobabilisticcomputer program.[1]The hypothesis that the universe is adigital computerwas proposed byKonrad Zusein his 1969 bookRechnender Raum[2](Calculating-sp...
https://en.wikipedia.org/wiki/Digital_physics
TheSortino ratiomeasures therisk-adjusted returnof an investmentasset,portfolio, orstrategy.[1]It is a modification of theSharpe ratiobut penalizes only those returns falling below a user-specified target or requiredrate of return, while the Sharpe ratio penalizes both upside and downsidevolatilityequally. Though both ...
https://en.wikipedia.org/wiki/Sortino_ratio
Inpropositional logicandBoolean algebra, there is aduality betweenconjunctionanddisjunction,[1][2][3]also called theduality principle.[4][5][6]It is the most widely known example of duality in logic.[1]The duality consists in thesemetalogicaltheorems: The connectives may be defined in terms of each other as follows: ...
https://en.wikipedia.org/wiki/Conjunction/disjunction_duality