Dataset Viewer
Auto-converted to Parquet Duplicate
text
stringlengths
11
320k
source
stringlengths
26
161
Innumber theory,Fermat's little theoremstates that ifpis aprime number, then for anyintegera, the numberap−ais an integer multiple ofp. In the notation ofmodular arithmetic, this is expressed asap≡a(modp).{\displaystyle a^{p}\equiv a{\pmod {p}}.} For example, ifa= 2andp= 7, then27= 128, and128 − 2 = 126 = 7 × 18is an ...
https://en.wikipedia.org/wiki/Fermat%27s_little_theorem
Inmathematics, apermutationof asetcan mean one of two different things: An example of the first meaning is the six permutations (orderings) of the set {1, 2, 3}: written astuples, they are (1, 2, 3), (1, 3, 2), (2, 1, 3), (2, 3, 1), (3, 1, 2), and (3, 2, 1).Anagramsof a word whose letters are all different are also pe...
https://en.wikipedia.org/wiki/Permutation
Inmathematics,Stirling numbersarise in a variety ofanalyticandcombinatorialproblems. They are named afterJames Stirling, who introduced them in a purely algebraic setting in his bookMethodus differentialis(1730).[1]They were rediscovered and given a combinatorial meaning by Masanobu Saka in his 1782Sanpō-Gakkai(The Sea...
https://en.wikipedia.org/wiki/Stirling_numbers
Inmathematics,Stirling's approximation(orStirling's formula) is anasymptoticapproximation forfactorials. It is a good approximation, leading to accurate results even for small values ofn{\displaystyle n}. It is named afterJames Stirling, though a related but less precise result was first stated byAbraham de Moivre.[1][...
https://en.wikipedia.org/wiki/Stirling_approximation
Incryptography, theInternational Data Encryption Algorithm(IDEA), originally calledImproved Proposed Encryption Standard(IPES), is asymmetric-keyblock cipherdesigned byJames MasseyofETH ZurichandXuejia Laiand was first described in 1991. The algorithm was intended as a replacement for theData Encryption Standard(DES). ...
https://en.wikipedia.org/wiki/IDEA_(cipher)
TheGlobal System for Mobile Communications(GSM) is a family of standards to describe the protocols for second-generation (2G) digitalcellular networks,[2]as used by mobile devices such asmobile phonesandmobile broadband modems. GSM is also atrade markowned by theGSM Association.[3]"GSM" may also refer to the voice code...
https://en.wikipedia.org/wiki/Global_System_for_Mobile_Communications
TheGlobal System for Mobile Communications(GSM) is a family of standards to describe the protocols for second-generation (2G) digitalcellular networks,[2]as used by mobile devices such asmobile phonesandmobile broadband modems. GSM is also atrade markowned by theGSM Association.[3]"GSM" may also refer to the voice code...
https://en.wikipedia.org/wiki/GSM#Security
3Grefers to the third-generation ofcellular networktechnology. These networks were rolled out beginning in the early 2000s and represented a significant advancement over the second-generation (2G), particularly in terms of data transfer speeds andmobile internetcapabilities. The major 3G standards areUMTS(developed by3...
https://en.wikipedia.org/wiki/3G#Security
"Bluetoothis a short-rangewirelesstechnology standard that is used for exchanging data between fixed(...TRUNCATED)
https://en.wikipedia.org/wiki/Bluetooth#Security
"Wired Equivalent Privacy(WEP) is an obsolete, severely flawedsecurityalgorithm for 802.11wireless n(...TRUNCATED)
https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy#Authentication
End of preview. Expand in Data Studio

A document collection for the summer 2025 EPFL CS-552 MNLP project by artdev99.

Contains Wikipedia and CommonCrawl pages.

1'293'772 chunks from 72'218 documents (chunk size: 512, overlap: 64).

Downloads last month
4