id stringlengths 14 20 | title stringlengths 4 131 | text stringlengths 52 43k | source stringclasses 1
value |
|---|---|---|---|
wiki_5516_chunk_2 | Transversal (combinatorics) | In computer science, computing transversals is useful in several application domains, with the input family of sets often being described as a hypergraph. Existence and number A fundamental question in the study of SDR is whether or not an SDR exists. Hall's marriage theorem gives necessary and sufficient conditions fo... | wikipedia |
wiki_30349_chunk_15 | Global Energy and Water Exchanges | Critique
One critique of the Build-up Phase data and predictions is that there needs to be better error descriptions. The global estimate of rainfall indicates that the confidence range is large relative to possible trends. The number of ground sensing stations (currently around 40) in the BSRN is rather limited for gl... | wikipedia |
wiki_32762_chunk_10 | FACT (computer language) | Report layouts:
L 1 PAGE-HEADING BATCH NO. ^ IN ERROR PAGE ^
L 2 COLUMN-HEADING EMP.NO. HOURS EMP.NO. HOURS EMP.NO. HOURS EMP.NO. HOURS EMP.NO. HOURS EMP.NO. HOURS EMP.NO. HOURS EMP.NO. HOURS
L 3 ERROR-LINE ^ .^ ^ .^ ^ .^ ^ .^ ... | wikipedia |
wiki_11990_chunk_9 | Anonymous recursion | In the lambda calculus, which only uses functions of a single variable, this can be done via the Y combinator. First make the higher-order function of two variables be a function of a single variable, which directly returns a function, by currying:
fact1 = lambda f: (lambda n1: 1 if n1 == 0 else n1 * f(f)(n1 - 1))
fact... | wikipedia |
wiki_30746_chunk_1 | International Paderborn Computer Chess Championship | Champions
{| class="sortable wikitable"
! # !! Year !! Program !! Champion
|-
| 1||1991||Zugzwang||Rainer Feldmann, Peter Mysliwietz, Heiner Matthias
|-
| 2||1992||Zugzwang||Rainer Feldmann, Peter Mysliwietz, Heiner Matthias
|-
| 3||1993||Bobby||Hans-Joachim Kraas, Günther Schrüfer
|-
| 4||1994||Schach 3.0||Matthias En... | wikipedia |
wiki_29328_chunk_20 | JaVale McGee | |-
| style="text-align:left;"| 2006–07
| style="text-align:left;"| Nevada
| 33 || 0 || 10.0 || .600 || .667 || .471 || 2.2 || .1 || .2 || .9 || 3.3
|-
| style="text-align:left;"| 2007–08
| style="text-align:left;"| Nevada
| 33 || 31 || 27.3 || .529 || .333 || .525 || 7.3 || .6 || .8 || 2.8 || 14.1
|- class="sortbottom"... | wikipedia |
wiki_27222_chunk_3 | Codex Colombino | External links
https://web.archive.org/web/20071219163600/http://www.tula.gob.mx/CONGRESO/CdiceColombino.html (image)
World Digital Library Collection
https://www-oxfordreference-com.ezp-prod1.hul.harvard.edu/view/10.1093/acref/9780195108156.001.0001/acref-9780195108156-e-134?rskey=xRon5X&result=134 | wikipedia |
wiki_2841_chunk_72 | Logicism | The unit class, impredicativity, and the vicious circle principle
A benign impredicative definition: Suppose a librarian wants to index her collection into a single book (call it Ι for "index"). Her index will list all the books and their locations in the library. As it turns out, there are only three books, and these... | wikipedia |
wiki_6637_chunk_59 | FOCAL (programming language) | Example code
The original Lunar Lander makes an excellent example for examining FOCAL code, as it uses most of the features of the language. This code is from the original, found on Jim Storer's Lunar Lander page.
01.04 T "CONTROL CALLING LUNAR MODULE. MANUAL CONTROL IS NECESSARY"!
01.06 T "YOU MAY RESET FUEL RATE ... | wikipedia |
wiki_11908_chunk_5 | Discriminant of an algebraic number field | Examples
Quadratic number fields: let d be a square-free integer, then the discriminant of is
An integer that occurs as the discriminant of a quadratic number field is called a fundamental discriminant.
Cyclotomic fields: let n > 2 be an integer, let ζn be a primitive nth root of unity, and let Kn = Q(ζn) be the nth... | wikipedia |
wiki_2270_chunk_8 | History of computing hardware (1960s–present) | The first generation had pioneered the use of special facilities for calling subroutines, e.g., TSX on the IBM 709. In the second generation, such facilities were ubiquitous. In the descriptions below, NSI is the next sequential instruction, the return address. Some examples are:
Automatically record the NSI in a regi... | wikipedia |
wiki_19211_chunk_1 | Mathematical discussion of rangekeeping | Rangekeeping is an excellent example of the application of analog computing to a real-world mathematical modeling problem. Because nations had so much money invested in their capital ships, they were willing to invest enormous amounts of money in the development of rangekeeping hardware to ensure that the guns of these... | wikipedia |
wiki_32894_chunk_1 | Spectral geometry | Inverse problems seek to identify features of the geometry from information about the eigenvalues of the Laplacian. One of the earliest results of this kind was due to Hermann Weyl who used David Hilbert's theory of integral equation in 1911 to show that the volume of a bounded domain in Euclidean space can be determi... | wikipedia |
wiki_25397_chunk_2 | Mathematical Contest in Modeling | Problems
At the beginning of the contest, teams have a choice between two problems. Problem A involves a system that requires the use of continuous mathematics, and thus often involves concepts from geometry, physics, or engineering. Problem B involves a system that requires the use of discrete mathematics. In 2016, ... | wikipedia |
wiki_39905_chunk_4 | Religious and political symbols in Unicode | Dingbats block
The Dingbats block also contains some symbols with political/religious connotations:
{| class="wikitable" style="text-align:center"
|-
! Symbol !! Code point !! Name
|-
| || U+2719 || style="text-align:left" | OUTLINED GREEK CROSS
|-
| || U+271A || style="text-align:left" | HEAVY GREEK CROSS
|-
| || U... | wikipedia |
wiki_19713_chunk_1 | Council for the Mathematical Sciences | Purpose
to represent the interests of mathematics to government, Research Councils and other public bodies;
to promote good practice in the mathematics curriculum and its teaching and learning at all levels and in all sectors of education;
to respond coherently and effectively to proposals from government and other ... | wikipedia |
wiki_16607_chunk_7 | Bruce Woodcock (computer games analyst) | References
MMOGCHART.COM(Bruce Woodcock's website)
Biography at Austin Game Conference website
"Network Appliance's Knight of the Message Boards", July 3, 2000 - Profile of Woodcock in Business Week
"Race to build Stormreach" by Hiawatha Bay, The Boston Globe, June 8, 2005
"Can Mickey and Frodo revive virtual wo... | wikipedia |
wiki_38771_chunk_5 | All the Wrong Questions | Characters
Lemony Snicket: the narrator and protagonist; a thirteen-year-old apprentice of V.F.D. staying in Stain'd-by-the-Sea.
S. Theodora Markson: Snicket's chaperone in the town; an incompetent member of V.F.D. Known for her unruly hair.
Moxie Mallahan: a child and aspiring journalist living in Stain'd-by-the-Se... | wikipedia |
wiki_30856_chunk_2 | Q (programming language from Kx Systems) | The following code demonstrates the relationships of the data structures. Expressions to evaluate appear prefixed with the q) prompt, with the output of the evaluation shown beneath: q)`john / an atom of type symbol
`john
q)50 / an atom of type integer
50 q)`john`jack / a list of symbols
`john`jack
q)50 60 / a list ... | wikipedia |
wiki_4547_chunk_19 | United States of America Mathematical Olympiad | 2006-2007
Beginning in 2006, the USAMO was expanded to include approximately 500 students (around 430 were actually invited, read below) due to a proposal and sponsorship from the Art of Problem Solving website:
The goal is to select about 500 of the top scorers from this year's AIME and AMC 12A, AMC 12B, AMC 10A and ... | wikipedia |
wiki_38440_chunk_6 | Computer architecture | There are other technologies in computer architecture. The following technologies are used in bigger companies like Intel, and were estimated in 2002 to count for 1% of all of computer architecture:
Macroarchitecture: architectural layers more abstract than microarchitecture
Assembly instruction set architecture: A s... | wikipedia |
wiki_21913_chunk_3 | South Asia Theological Research Institute | Courses offered
{| class="toccolours" style="float:right; margin-left:1em; font-size:85%; background:#ffc; color:black; width:35em; max-width:40%;" cellspacing="0" cellpadding="0"
|-
! style="background:#ccc;"| Succession of Deans of SATHRI
|-
| style="text-align: left;" |
1989-2000, The Rev. K. C. Abraham, Ph.D. (Prin... | wikipedia |
wiki_4937_chunk_9 | Network theory | Link analysis
Link analysis is a subset of network analysis, exploring associations between objects. An example may be examining the addresses of suspects and victims, the telephone numbers they have dialed and financial transactions that they have partaken in during a given timeframe, and the familial relationships be... | wikipedia |
wiki_15293_chunk_1 | EEVIAC Operational Index and Reference Guide, Including Other Modern Computational Devices | Track listing
"Interstellar Hardrive"
"D:Contamination"
"U-235/PU-239"
"Domain of the Human Race"
"Theme from EEVIAC"
"A Reversal of Polarity"
"Fractionalized Reception of a Scrambled Transmission"
"Engines of Difference"
"Psychology of A.I. (Numbers Follow Answers)"
"Krasnoyask-26"
"Within the Mainframe, Im... | wikipedia |
wiki_24875_chunk_4 | Residuated Boolean algebra | Examples
Any Boolean algebra, with the monoid multiplication • taken to be conjunction and both residuals taken to be material implication x→y. Of the remaining 15 binary Boolean operations that might be considered in place of conjunction for the monoid multiplication, only five meet the monotonicity requirement, name... | wikipedia |
wiki_956_chunk_45 | Unification (computer science) | A successful example computation path for the unification problem { app(x,app(y,x)) ≐ a.a.nil } is shown below. To avoid variable name clashes, rewrite rules are consistently renamed each time before their use by rule mutate; v2, v3, ... are computer-generated variable names for this purpose. In each line, the chosen e... | wikipedia |
wiki_6166_chunk_16 | Loop unrolling | Assembler example (IBM/360 or Z/Architecture)
This example is for IBM/360 or Z/Architecture assemblers and assumes a field of 100 bytes (at offset zero) is to be copied from array FROM to array TO—both having 50 entries with element lengths of 256 bytes each.* The return address is in R14.
* Initialize registers R15, ... | wikipedia |
wiki_20689_chunk_4 | CSA (database company) | Civil Engineering Abstracts
CSA/ASCE Civil Engineering Abstracts encompasses global, indexing, and abstracting coverage of civil engineering technical literature. Coverage also includes the complementary fields of forensic engineering, engineering services management, engineering services marketing, engineering educati... | wikipedia |
wiki_2991_chunk_16 | Kahan summation algorithm | Further enhancements
Neumaier introduced an improved version of Kahan algorithm, which he calls an "improved Kahan–Babuška algorithm", which also covers the case when the next term to be added is larger in absolute value than the running sum, effectively swapping the role of what is large and what is small. In pseudoco... | wikipedia |
wiki_6608_chunk_6 | Gauss–Newton algorithm | In a biology experiment studying the relation between substrate concentration and reaction rate in an enzyme-mediated reaction, the data in the following table were obtained.
{|class="wikitable" style="text-align: center;"
!
| 1 || 2 || 3 || 4 || 5 || 6 || 7
|-
!
| 0.038 || 0.194 || 0.425 || 0.626 || 1.253 || ... | wikipedia |
wiki_23074_chunk_13 | New York Number Theory Seminar | The third edition was published in 1985. The work undergone during the seminars has recognised the support of the NSF and the U.S. Air Force on the introduction page of the edition. They also acknowledge the help of the Computer Algebra Group of the T.J. Watson Research Center who contributed with extended research and... | wikipedia |
wiki_26493_chunk_177 | Comparison of programming languages (associative array) | - exception NotFound;
exception NotFound
- val m : (string, string) HashTable.hash_table = HashTable.mkTable (HashString.hashString, op=) (3, NotFound);
val m =
HT
{eq_pred=fn,hash_fn=fn,n_items=ref 0,not_found=NotFound(-),
table=ref [|NIL,NIL,NIL,NIL,NIL,NIL,NIL,NIL,NIL,NIL,NIL,NIL,...|]}
: (string,string... | wikipedia |
wiki_16032_chunk_7 | Tacit programming | A few programs have been written to automatically convert a Haskell expression to a point-free form. APL family
In J, the same sort of point-free code occurs in a function made to compute the average of a list (array) of numbers:
avg=: +/ % #
+/ sums the items of the array by mapping (/) summation (+) to the array. % d... | wikipedia |
wiki_4359_chunk_19 | Dead zone (ecology) | "Eutrophication poses a threat to the environment, the economy (e.g. impact on shellfish production, fishing, tourism), but also to human health (Von Blottnitz et al., 2006; Sutton et al., 2011). Attempts to evaluate the monetary impacts of eutrophication have been made over the last two decades, mainly in the United S... | wikipedia |
wiki_942_chunk_5 | CYK algorithm | Probabilistic CYK (for finding the most probable parse)
Allows to recover the most probable parse given the probabilities of all productions.
let the input be a string I consisting of n characters: a1 ... an.
let the grammar contain r nonterminal symbols R1 ... Rr, with start symbol R1.
let P[n,n,r] be an array of ... | wikipedia |
wiki_36916_chunk_13 | Blossom algorithm | INPUT: Graph G, matching M on G
OUTPUT: augmenting path P in G or empty path if none found
B01 function find_augmenting_path(G, M) : P
B02 F ← empty forest
B03 unmark all vertices and edges in G, mark all edges of M
B05 for each exposed vertex v do
B06 create a singleton tree { v } and add th... | wikipedia |
wiki_907_chunk_13 | Geostatistics | GeoENVia promotes the use of geostatistical methods in environmental applications, and organizes bi-annual conferences.
, a resource on the internet about geostatistics and spatial statistics
On-Line Library that chronicles Matheron's journey from classical statistics to the new science of geostatistics
https://we... | wikipedia |
wiki_1527_chunk_38 | Generating function | using the Riemann zeta function. The sequence ak generated by a Dirichlet series generating function (DGF) corresponding to: where is the Riemann zeta function, has the ordinary generating function: Multivariate generating functions
Multivariate generating functions arise in practice when calculating the number of con... | wikipedia |
wiki_3229_chunk_19 | Integer programming | In the special case of 0-1 ILP, Lenstra's algorithm is equivalent to complete enumeration: the number of all possible solutions is fixed (2n), and checking the feasibility of each solution can be done in time poly(m, log V). In the general case, where each variable can be an arbitrary integer, complete enumeration is i... | wikipedia |
wiki_30823_chunk_2 | Computer graphics (computer science) | There are several international conferences and journals where the most significant results in computer graphics are published. Among them are the SIGGRAPH and Eurographics conferences and the Association for Computing Machinery (ACM) Transactions on Graphics journal. The joint Eurographics and ACM SIGGRAPH symposium s... | wikipedia |
wiki_38000_chunk_25 | Consumer neuroscience | Limitations
Most of the consumer neuroscience studies involving brain scanning techniques have been conducted in medical or technological environments where such brain imaging devices are present. This is not a realistic environment for consumer decision making and may serve to skew the data relative to consumer deci... | wikipedia |
wiki_9832_chunk_13 | Lamport's bakery algorithm | When implementing the pseudo code in a single process system or under cooperative multitasking, it is better to replace the "do nothing" sections with code that notifies the operating system to immediately switch to the next thread. This primitive is often referred to as yield. Lamport's bakery algorithm assumes a sequ... | wikipedia |
wiki_1763_chunk_54 | Computer-assisted language learning | A distinction needs to be made between the impact and the effectiveness of CALL. Impact may be measured quantitatively and qualitatively in terms of the uptake and use of ICT in teaching foreign languages, issues of availability of hardware and software, budgetary considerations, Internet access, teachers' and learners... | wikipedia |
wiki_28723_chunk_4 | Neuroscience Information Framework | The NIFSTD, or NIF Standard Ontology contains many of the terms, synonyms and abbreviations useful for neuroscience, as well as dynamic categories such as defined cell classes based on various properties like neuron by neurotransmitter or by circuit role or drugs of abuse according to the National Institutes on Drug Ab... | wikipedia |
wiki_637_chunk_3 | Jess (programming language) | (assert (car (color red) (mileage 10000) (value 400)))
Sample code:
(clear)
(deftemplate blood-donor (slot name) (slot type))
(deffacts blood-bank ; put names & their types into [[working memory]]
(blood-donor (name "Alice")(type "A"))
(blood-donor (name "Agatha")(type "A"))
(blood-donor (... | wikipedia |
wiki_521_chunk_20 | Statistics | Experimental and observational studies
A common goal for a statistical research project is to investigate causality, and in particular to draw a conclusion on the effect of changes in the values of predictors or independent variables on dependent variables. There are two major types of causal statistical studies: exper... | wikipedia |
wiki_18663_chunk_4 | Society for Anthropological Sciences | It maintains a website at http://www.societyforanthropologicalsciences.org. The purpose of the site is promote discussion and cooperation among anthropologists and others interested in promoting scientific anthropology, as opposed to those who argue that anthropology (and social science generally) is not scientific, ... | wikipedia |
wiki_17601_chunk_23 | Softmax function | Here is an example of Julia code: julia> A = [1.0, 2.0, 3.0, 4.0, 1.0, 2.0, 3.0]; # semicolon to suppress interactive output julia> exp.(A) ./ sum(exp.(A))
7-element Array{Float64,1}:
0.0236405
0.0642617
0.174681
0.474833
0.0236405
0.0642617
0.174681 Here is an example of R code: | wikipedia |
wiki_11615_chunk_13 | Mathematics of Sudoku | Rectangular regions
A popular variant is made of rectangular regions (blocks or boxes) – for example, 2×3 hexominoes tiled in a 6×6 grid. The following notation is used for discussing this variant:
R×C denotes a rectangular region with R rows and C columns.
The implied grid configuration has:
grid dimensions N×N, wh... | wikipedia |
wiki_3019_chunk_37 | R (programming language) | Coefficients:
Estimate Std. Error t value Pr(>|t|)
(Intercept) -9.3333 2.8441 -3.282 0.030453 *
x 7.0000 0.7303 9.585 0.000662 ***
---
Signif. codes: 0 ‘***’ 0.001 ‘**’ 0.01 ‘*’ 0.05 ‘.’ 0.1 ‘ ’ 1 | wikipedia |
wiki_8086_chunk_32 | Courant Institute of Mathematical Sciences | External links
Courant Institute of Mathematical Sciences
Department of Mathematics, New York University
Applied Mathematics Laboratory
New York University Computer Science
New York University Mathematics in Finance
New York University Scientific Computing
http://www.cims.nyu.edu/~csplash/index.php
NYU Mathematics Soci... | wikipedia |
wiki_1712_chunk_5 | Statistics Canada | Statistics Canada provides free access to numerous aggregate data tables on various subjects of relevance to Canadian life. Many tables used to be published as the Canadian Socio-economic Information Management System, or CANSIM, which has since been replaced by new, more easily manipulated data tables Subject areas in... | wikipedia |
wiki_35835_chunk_4 | Journal of Cell Biology | Key dates
January 25, 1955: Publication of the first issue of The Journal of Biophysical and Biochemical Cytology.
January 1961 – December 1983: Raymond Griffiths is Executive Editor.
January 1962: Journal name changed to The Journal of Cell Biology.
January 1984 – December 1998: Bernie Gilula is Editor in Chief.
Janu... | wikipedia |
wiki_39909_chunk_6 | Alpha algorithm | Description
The alpha miner starts with converting an event log into directly-follows, sequence, parallel, and choice relations, and using them to create a petri net describing the process model. Initially the algorithm constructs a footprint matrix. Using the footprint matrix and the above shown pattern, one can const... | wikipedia |
wiki_8588_chunk_39 | Matrix calculus | {|class="wikitable" style="text-align: center;"
|+ Identities: vector-by-scalar
! scope="col" width="150" | Condition
! scope="col" width="100" | Expression
! scope="col" width="100" | Numerator layout, i.e. by y,result is column vector
! scope="col" width="100" | Denominator layout, i.e. by yT,result is row vector... | wikipedia |
wiki_7647_chunk_24 | Minkowski's question-mark function | Restricting the Minkowski question mark function to ?:[0,1] → [0,1], it can be used as the cumulative distribution function of a singular distribution on the unit interval. This distribution is symmetric about its midpoint, with raw moments of about m1 = 0.5, m2 = 0.290926, m3 = 0.186389 and m4 = 0.126992, and so a ... | wikipedia |
wiki_34229_chunk_8 | Symbol (programming) | Examples
The following is a simple example of a symbol literal in Ruby:
my_symbol = :a
my_symbol = :"an identifier"
Strings can be coerced into symbols, vice versa:
irb(main):001:0> my_symbol = "Hello, world!".intern
=> :"Hello, world!"
irb(main):002:0> my_symbol = "Hello, world!".to_sym
=> :"Hello, world!"
irb(main)... | wikipedia |
wiki_33657_chunk_12 | Hayden Geological Survey of 1871 | The survey followed the Firehole River upstream to Madison Lake and then over the divide to Shoshone Lake eventually camping near Lost Lake about from the West Thumb area of Yellowstone Lake. On August 7, 1871 they camped and explored at West Thumb for two days. As some of the military escort were to travel back to F... | wikipedia |
wiki_15554_chunk_6 | Jacobi eigenvalue algorithm | procedure jacobi(S ∈ Rn×n; out e ∈ Rn; out E ∈ Rn×n)
var
i, k, l, m, state ∈ N
s, c, t, p, y, d, r ∈ R
ind ∈ Nn
changed ∈ Ln
function maxind(k ∈ N) ∈ N ! index of largest off-diagonal element in row k
m := k+1
for i := k+2 to n do
if │Ski│ > │Skm│ then m := i endif
endf... | wikipedia |
wiki_2443_chunk_141 | Quantitative genetics | A second application involves using regression analysis, which estimates from statistics the ordinate (Y-estimate), derivative (regression coefficient) and constant (Y-intercept) of calculus. The regression coefficient estimates the rate of change of the function predicting Y from X, based on minimizing the residuals b... | wikipedia |
wiki_849_chunk_29 | Algebraic notation (chess) | Though not technically a part of algebraic notation, the following are some symbols commonly used by annotators, for example in publications Chess Informant and Encyclopaedia of Chess Openings, to give editorial comment on a move or position.
{|
|- style="vertical-align:bottom;"
|colspan="2;"|On moves:
|- style="vertic... | wikipedia |
wiki_19608_chunk_15 | Comparison of programming languages (syntax) | Parentheses ( ... )
OCaml, Prolog, Standard ML
Square brackets [ ... ]
Smalltalk (blocks are first class objects. a.k.a. closures)
begin ... end
Ada, ALGOL, Pascal, Ruby (for, do/while & do/until loops), OCaml, SCL, Simula, Erlang.
do ... end
PL/I, REXX
do ... done
Bash (for & while loops), Visual Basic, Fortran, ... | wikipedia |
wiki_8588_chunk_44 | Matrix calculus | {|class="wikitable" style="text-align: center;"
|+ Identities: matrix-by-scalar
! scope="col" width="175" | Condition
! scope="col" width="100" | Expression
! scope="col" width="100" | Numerator layout, i.e. by Y
|-
| U = U(x) || ||
|-
| A, B are not functions of x, U = U(x) || ||
|-
| U = U(x), V = V(x) || || ... | wikipedia |
wiki_38856_chunk_7 | Company Level Intelligence Cell | References
Corps creates intel cells at rifle-company level
Creating Intelligence, Neil Garra, http://www.s2company.com/index.php?topic=4
Company-Level Intelligence Cell, Training and evaluation at Talon Reach V: “all-in” for intelligence integration at the company level, by Maj Brendan Heatherman, MCIS Staff, and M... | wikipedia |
wiki_35990_chunk_2 | The Selected Works of T. S. Spivet | Plot summary
The novel is told from the perspective of twelve-year-old T.S. Spivet, a mapmaking enthusiast living on a ranch near Divide, Montana, a small village near Butte, Montana, practically on the continental divide.
T.S.'s mother, whom he consistently refers to as "Dr. Clair," is an entomologist preoccupied — or... | wikipedia |
wiki_34985_chunk_4 | IEEE Oceanic Engineering Society | (a) IEEE Journal of Oceanic Engineering: A quarterly journal published by OES whose field of interest includes all aspects of science, engineering and technology that address research, development, and operations pertaining to all bodies of water. This includes the creation of new capabilities and technologies from con... | wikipedia |
wiki_29911_chunk_4 | Feature-oriented programming | A third generation of research focussed on the fact that every program has multiple representations (e.g., source, makefiles,
documentation, etc.) and adding a feature to a program should elaborate each of its representations so that all are consistent. Additionally, some of representations could be generated (or deri... | wikipedia |
wiki_26407_chunk_32 | Text Executive Programming Language | TEX commands:
call ! – call a subroutine in the current program or in another file. the call ends when a stop or return
clear – remove a named variable from the pool or use * to remove all variables
goto ! – goto the named file and label
ercall ! – call subroutine on error in the preceding command
ergoto ! – goto... | wikipedia |
wiki_20402_chunk_7 | Tree of life (biology) | Charles Darwin (1809–1882) used the metaphor of a "tree of life" to conceptualize his theory of evolution. In On the Origin of Species (1859) he presented an abstract diagram of a theoretical tree of life for species of an unnamed large genus (see figure). On the horizontal base line hypothetical species within this ge... | wikipedia |
wiki_16437_chunk_12 | Civil Services Examination | From 2011 onwards, the preliminary examination intends to focus on analytical abilities and understanding rather than the ability to memorize. The new pattern includes two papers of two hours duration and 200 marks each. Both papers have multiple choice objective type questions only. They are as follows:
Paper I tests... | wikipedia |
wiki_13051_chunk_9 | Cell (novel) | Characters
Clayton Riddell: a graphic artist separated from his family in Boston as the Pulse destroys civilization. Clay heads north with a group of survivors and tries to find his son, Johnny, and estranged wife, Sharon.
Thomas McCourt: a middle-aged man from Malden; Tom teams up with Clay in the initial chaos create... | wikipedia |
wiki_11351_chunk_5 | Programming complexity | Chidamber and Kemerer proposed a set of programing complexity metrics, widely used in many measurements and academic articles. They are WMC, CBO, RFC, NOC, DIT, and LCOM, described below:
WMC - weighted methods per class
n is the number of methods on the class
is the complexity of the method
CBO - coupling betwee... | wikipedia |
wiki_20689_chunk_18 | CSA (database company) | The database covers theory, experimentation, application, emerging technologies, and companies that are involved in the space sciences (including aeronautics and astronautics), computer & information technology, solid state materials (including solid state devices), communications, chemistry geoscience, and finally ele... | wikipedia |
wiki_17201_chunk_12 | Use of Free and Open-Source Software (FOSS) in the U.S. Department of Defense | Create a "Generally Recognized As Safe" FOSS list. This list would provide quick official recognition of FOSS applications that are (a) commercially supported, (b) widely used, and (c) have proven track records of security and reliability—e.g., as measured by speed of closures of CERT reports in comparison to closed-so... | wikipedia |
wiki_13132_chunk_7 | Extreme programming practices | Determine Risk Index: Give each user story an index from 0 to 2 on each of the following factors:
Completeness (do we know all of the story details?)
Complete (0)
Incomplete (1)
Unknown (2)
Volatility (is it likely to change?)
low (0)
medium (1)
high (2)
Complexity (how hard is it to build?)
simple (0)
standard (1)
com... | wikipedia |
wiki_6352_chunk_47 | Gene expression programming | For example, below is shown a simple chromosome composed of only one gene a head size of 7 (the Dc stretches over positions 15–22): 01234567890123456789012 +?*+?**aaa??aaa68083295 where the terminal "?” represents the placeholder for the RNCs. This kind of chromosome is expressed exactly as shown above, giving: Then th... | wikipedia |
wiki_32_chunk_22 | Analysis of algorithms | Growth rate analysis of other resources
The methodology of run-time analysis can also be utilized for predicting other growth rates, such as consumption of memory space. As an example, consider the following pseudocode which manages and reallocates memory usage by a program based on the size of a file which that progr... | wikipedia |
wiki_3229_chunk_23 | Integer programming | Sparse integer programming
It is often the case that the matrix which defines the integer program is sparse. In particular, this occurs when the matrix has a block structure, which is the case in many applications. The sparsity of the matrix can be measured as follows. The graph of has vertices corresponding to colu... | wikipedia |
wiki_6166_chunk_29 | Loop unrolling | l.d $f10, 24($5) ; iteration with displacement 24
l.d $f12, 24($6)
mul.d $f10, $f10, $f12
add.d $f8, $f8, $f10 addi $5, $5, 32
addi $6, $6, 32
addi $7, $7, -4
test:
bgtz $7, loop3 ; Continue loop if $7 >... | wikipedia |
wiki_34246_chunk_2 | Dungeon Master Option: High-Level Campaigns | Header
The book begins with a one-page foreword by Skip Williams. Chapter One (pages 6–29) explains the seven maxims for running high-level AD&D campaigns: Don't depend on the dice, Use adversaries intelligently and inventively, Control magic, Be aware of demographics, Think on an epic scale, Plan ahead, and Share resp... | wikipedia |
wiki_7791_chunk_20 | Chinese mathematics | Linear algebra
The Book of Computations is the first known text to solve systems of equations with two unknowns. There are a total of three sets of problems within The Book of Computations involving solving systems of equations with the false position method, which again are put into practical terms. Chapter Seven of ... | wikipedia |
wiki_2693_chunk_7 | Disk (mathematics) | Computation
Complete elliptic integrals can be computed by the method of the arithmetic-geometric mean. can then be determined to good accuracy by code along the following lines:
double discdist(double q)
{ double x,a,b,c,oldc,adash,mult,csum,K,KminusE,qsq,pi=3.141592653589793 ;
if(q==0) return 2.0/3.0 ; else... | wikipedia |
wiki_27918_chunk_1 | List of unsolved problems in statistics | Inference and testing
How to detect and correct for systematic errors, especially in sciences where random errors are large (a situation Tukey termed uncomfortable science).
The Graybill–Deal estimator is often used to estimate the common mean of two normal populations with unknown and possibly unequal variances. Tho... | wikipedia |
wiki_3248_chunk_27 | Sum-addressed decoder | References
Paul Demone has an explanation of sum-addressed caches in a realworldtech article.
Heald et al. have a paper in ISSCC 1998 that explains what may be the original sum-addressed cache in the Ultrasparc III.
Sum-addressed memory is described in
United States patent 5,754,819,
May 19, 1998,
Low-latency memory... | wikipedia |
wiki_36622_chunk_5 | Discovery Networks Deutschland | Some programmes shown on DMAX
Was geht? Experiment am Limit (What works? Experiments at the limits) - gives solutions for childhood dreams and daily problems. e.g.: can a gun be fired underwater?
Die Ludolfs – 4 Brüder auf'm Schrottplatz (The Ludolfs – four brothers at the scrapyard) - observes Peter, Manni, Uwe and ... | wikipedia |
wiki_19542_chunk_5 | Map algebra | Tomlin classified the many possible map algebra operations into three types, to which some systems add a fourth:
Local Operators
Operations that operate on one cell location at a time during the scan phase. A simple example would be an arithmetic operator such as addition: to compute MAP3 = MAP1 + MAP2, the software ... | wikipedia |
wiki_13449_chunk_61 | Turing's proof | 11 S.D – Standard Description: a sequence of symbols A, C, D, L, R, N, “;” on a Turing machine tape 12 D.N — Description Number: an S.D converted to a number: 1=A, 2=C, 3 =D, 4=L, 5=R, 6=N, 7=; 13 M(n) — a machine whose D.N is number “n” 14 satisfactory — a S.D or D.N that represents a circle-free machine | wikipedia |
wiki_5511_chunk_14 | Topological sorting | Note that the prefix sum for the local offsets can be efficiently calculated in parallel.
p processing elements with IDs from 0 to p-1
Input: G = (V, E) DAG, distributed to PEs, PE index j = 0, ..., p - 1
Output: topological sorting of G
function traverseDAGDistributed
δ incoming degree of local vertices V
... | wikipedia |
wiki_1067_chunk_39 | Civil Service (United Kingdom) | {|class="wikitable"
! width="9%" rowspan="2"|Group
! colspan="2" | Historic names
! width="26%" colspan="3" style='background: #ffebd2' | Current structure
! colspan="3" width="39%" |Equivalent military rank(NATO Code)
|-
! Grade(pre 1971)
! 1971 unified grading structure
! colspan="2" width="13%" | 1996 SCS changes
! ... | wikipedia |
wiki_15404_chunk_13 | Engineering ethics | Institute of Electrical and Electronics Engineers: "We, the members of the IEEE, … do hereby commit ourselves to the highest ethical and professional conduct and agree: 1. to accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that mig... | wikipedia |
wiki_38313_chunk_3 | Lightweight Kernel Operating System | Characteristics
Although it is surprisingly difficult to exactly define what a lightweight kernel is, there are some common design goals:
Targeted at massively parallel environments composed of thousands of processors with distributed memory and a tightly coupled network.
Provide necessary support for scalable, perf... | wikipedia |
wiki_21686_chunk_12 | Javaris Crittenton | |-
| style="text-align:left;"|
| style="text-align:left;"| L.A. Lakers
| 22|| 0 || 7.8 || .491 || .333 || .679 || 1 || .8 || .3 || 0 || 3.3
|-
| style="text-align:left;"|
| style="text-align:left;"| Memphis
| 28 || 0 || 18.1 || .400 || .265 || .697 || 3.2 || 1.2 || 0.1 || 0.4 || 7.4
|-
| style="text-align:left;"|
| ... | wikipedia |
wiki_23161_chunk_14 | FAME (database) | Expanded managed content provides out-of-the-box data and object models for:
Equity pricing
Corporate bond pricing
Futures, commodities and options
Company and index fundamentals
Company and index estimates
Macro-economic indicators and benchmark construction
FAME 10 provides a number of enhanced features for cr... | wikipedia |
wiki_8203_chunk_2 | Global Infectious Disease Epidemiology Network | The second module follows the epidemiology of individual diseases, including their global background and status in each of 205 countries and regions. All past and current outbreaks of all diseases, in all countries, are described in detail. The user may also access a list of diseases compatible with any combination of ... | wikipedia |
wiki_27985_chunk_16 | Bees algorithm | %% Iterations of the grouped bees algorithm
for i=1:maxIteration % GBA's main loop
beeIndex = 0; % keep track of all bees (i.e, patches)
for g=1:nGroups % for each group of scout bees
for j = 1 : groups(g) % exploit each patch within each group
beeIndex = beeIndex + 1; % increase the counter p... | wikipedia |
wiki_39905_chunk_7 | Religious and political symbols in Unicode | Enclosed Ideographic Supplement block
The Unicode chart for the Enclosed Ideographic Supplement block notes several symbols used for Chinese folk religion:
{| class="wikitable" style="text-align:center"
|-
! Symbol !! Code point !! Name and notes
|-
| || U+1F260 || style="text-align:left" | ROUNDED SYMBOL FOR FU (luck... | wikipedia |
wiki_649_chunk_18 | Beam-powered propulsion | Testing
Early in the morning of 2 October 2000 at the High Energy Laser Systems Test Facility (HELSTF), Lightcraft Technologies, Inc. (LTI) with the help of Franklin B. Mead of the U.S. Air Force Research Laboratory and Leik Myrabo set a new world's altitude record of 233 feet (71 m) for its 4.8 inch (12.2 cm) diameter... | wikipedia |
wiki_4174_chunk_11 | Computer-Assisted Passenger Prescreening System | Redress process - A system of due process exists whereby aviation passengers determined to pose a threat are either delayed or prohibited from boarding their scheduled flights by TSA may appeal such decisions and correct erroneous information contained in CAPPS II or Secure Flight or other follow-on/successor programs.... | wikipedia |
wiki_942_chunk_4 | CYK algorithm | let the input be a string I consisting of n characters: a1 ... an.
let the grammar contain r nonterminal symbols R1 ... Rr, with start symbol R1.
let P[n,n,r] be an array of booleans. Initialize all elements of P to false.
for each s = 1 to n
for each unit production Rv → as
set P[1,s,v] = true
fo... | wikipedia |
wiki_547_chunk_64 | Scheme (programming language) | Scheme has three different types of equivalence between arbitrary objects denoted by three different equivalence predicates, relational operators for testing equality, eq?, eqv? and equal?:
eq? evaluates to #f unless its parameters represent the same data object in memory;
eqv? is generally the same as eq? but treat... | wikipedia |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.