text stringlengths 11 320k | source stringlengths 26 161 |
|---|---|
Innumber theory,Fermat's little theoremstates that ifpis aprime number, then for anyintegera, the numberap−ais an integer multiple ofp. In the notation ofmodular arithmetic, this is expressed asap≡a(modp).{\displaystyle a^{p}\equiv a{\pmod {p}}.}
For example, ifa= 2andp= 7, then27= 128, and128 − 2 = 126 = 7 × 18is an ... | https://en.wikipedia.org/wiki/Fermat%27s_little_theorem |
Inmathematics, apermutationof asetcan mean one of two different things:
An example of the first meaning is the six permutations (orderings) of the set {1, 2, 3}: written astuples, they are (1, 2, 3), (1, 3, 2), (2, 1, 3), (2, 3, 1), (3, 1, 2), and (3, 2, 1).Anagramsof a word whose letters are all different are also pe... | https://en.wikipedia.org/wiki/Permutation |
Inmathematics,Stirling numbersarise in a variety ofanalyticandcombinatorialproblems. They are named afterJames Stirling, who introduced them in a purely algebraic setting in his bookMethodus differentialis(1730).[1]They were rediscovered and given a combinatorial meaning by Masanobu Saka in his 1782Sanpō-Gakkai(The Sea... | https://en.wikipedia.org/wiki/Stirling_numbers |
Inmathematics,Stirling's approximation(orStirling's formula) is anasymptoticapproximation forfactorials. It is a good approximation, leading to accurate results even for small values ofn{\displaystyle n}. It is named afterJames Stirling, though a related but less precise result was first stated byAbraham de Moivre.[1][... | https://en.wikipedia.org/wiki/Stirling_approximation |
Incryptography, theInternational Data Encryption Algorithm(IDEA), originally calledImproved Proposed Encryption Standard(IPES), is asymmetric-keyblock cipherdesigned byJames MasseyofETH ZurichandXuejia Laiand was first described in 1991. The algorithm was intended as a replacement for theData Encryption Standard(DES). ... | https://en.wikipedia.org/wiki/IDEA_(cipher) |
TheGlobal System for Mobile Communications(GSM) is a family of standards to describe the protocols for second-generation (2G) digitalcellular networks,[2]as used by mobile devices such asmobile phonesandmobile broadband modems. GSM is also atrade markowned by theGSM Association.[3]"GSM" may also refer to the voice code... | https://en.wikipedia.org/wiki/Global_System_for_Mobile_Communications |
TheGlobal System for Mobile Communications(GSM) is a family of standards to describe the protocols for second-generation (2G) digitalcellular networks,[2]as used by mobile devices such asmobile phonesandmobile broadband modems. GSM is also atrade markowned by theGSM Association.[3]"GSM" may also refer to the voice code... | https://en.wikipedia.org/wiki/GSM#Security |
3Grefers to the third-generation ofcellular networktechnology. These networks were rolled out beginning in the early 2000s and represented a significant advancement over the second-generation (2G), particularly in terms of data transfer speeds andmobile internetcapabilities. The major 3G standards areUMTS(developed by3... | https://en.wikipedia.org/wiki/3G#Security |
"Bluetoothis a short-rangewirelesstechnology standard that is used for exchanging data between fixed(...TRUNCATED) | https://en.wikipedia.org/wiki/Bluetooth#Security |
"Wired Equivalent Privacy(WEP) is an obsolete, severely flawedsecurityalgorithm for 802.11wireless n(...TRUNCATED) | https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy#Authentication |
End of preview. Expand in Data Studio
A document collection for the summer 2025 EPFL CS-552 MNLP project by artdev99.
Contains Wikipedia and CommonCrawl pages.
1'293'772 chunks from 72'218 documents (chunk size: 512, overlap: 64).
- Downloads last month
- 4