id
stringlengths
14
20
title
stringlengths
4
131
text
stringlengths
52
43k
source
stringclasses
1 value
wiki_5516_chunk_2
Transversal (combinatorics)
In computer science, computing transversals is useful in several application domains, with the input family of sets often being described as a hypergraph. Existence and number A fundamental question in the study of SDR is whether or not an SDR exists. Hall's marriage theorem gives necessary and sufficient conditions fo...
wikipedia
wiki_30349_chunk_15
Global Energy and Water Exchanges
Critique One critique of the Build-up Phase data and predictions is that there needs to be better error descriptions. The global estimate of rainfall indicates that the confidence range is large relative to possible trends. The number of ground sensing stations (currently around 40) in the BSRN is rather limited for gl...
wikipedia
wiki_32762_chunk_10
FACT (computer language)
Report layouts: L 1 PAGE-HEADING BATCH NO. ^ IN ERROR PAGE ^ L 2 COLUMN-HEADING EMP.NO. HOURS EMP.NO. HOURS EMP.NO. HOURS EMP.NO. HOURS EMP.NO. HOURS EMP.NO. HOURS EMP.NO. HOURS EMP.NO. HOURS L 3 ERROR-LINE ^ .^ ^ .^ ^ .^ ^ .^ ...
wikipedia
wiki_11990_chunk_9
Anonymous recursion
In the lambda calculus, which only uses functions of a single variable, this can be done via the Y combinator. First make the higher-order function of two variables be a function of a single variable, which directly returns a function, by currying: fact1 = lambda f: (lambda n1: 1 if n1 == 0 else n1 * f(f)(n1 - 1)) fact...
wikipedia
wiki_30746_chunk_1
International Paderborn Computer Chess Championship
Champions {| class="sortable wikitable" ! # !! Year !! Program !! Champion |- | 1||1991||Zugzwang||Rainer Feldmann, Peter Mysliwietz, Heiner Matthias |- | 2||1992||Zugzwang||Rainer Feldmann, Peter Mysliwietz, Heiner Matthias |- | 3||1993||Bobby||Hans-Joachim Kraas, Günther Schrüfer |- | 4||1994||Schach 3.0||Matthias En...
wikipedia
wiki_29328_chunk_20
JaVale McGee
|- | style="text-align:left;"| 2006–07 | style="text-align:left;"| Nevada | 33 || 0 || 10.0 || .600 || .667 || .471 || 2.2 || .1 || .2 || .9 || 3.3 |- | style="text-align:left;"| 2007–08 | style="text-align:left;"| Nevada | 33 || 31 || 27.3 || .529 || .333 || .525 || 7.3 || .6 || .8 || 2.8 || 14.1 |- class="sortbottom"...
wikipedia
wiki_27222_chunk_3
Codex Colombino
External links https://web.archive.org/web/20071219163600/http://www.tula.gob.mx/CONGRESO/CdiceColombino.html (image) World Digital Library Collection https://www-oxfordreference-com.ezp-prod1.hul.harvard.edu/view/10.1093/acref/9780195108156.001.0001/acref-9780195108156-e-134?rskey=xRon5X&result=134
wikipedia
wiki_2841_chunk_72
Logicism
The unit class, impredicativity, and the vicious circle principle A benign impredicative definition: Suppose a librarian wants to index her collection into a single book (call it Ι for "index"). Her index will list all the books and their locations in the library. As it turns out, there are only three books, and these...
wikipedia
wiki_6637_chunk_59
FOCAL (programming language)
Example code The original Lunar Lander makes an excellent example for examining FOCAL code, as it uses most of the features of the language. This code is from the original, found on Jim Storer's Lunar Lander page. 01.04 T "CONTROL CALLING LUNAR MODULE. MANUAL CONTROL IS NECESSARY"! 01.06 T "YOU MAY RESET FUEL RATE ...
wikipedia
wiki_11908_chunk_5
Discriminant of an algebraic number field
Examples Quadratic number fields: let d be a square-free integer, then the discriminant of is An integer that occurs as the discriminant of a quadratic number field is called a fundamental discriminant. Cyclotomic fields: let n > 2 be an integer, let ζn be a primitive nth root of unity, and let Kn = Q(ζn) be the nth...
wikipedia
wiki_2270_chunk_8
History of computing hardware (1960s–present)
The first generation had pioneered the use of special facilities for calling subroutines, e.g., TSX on the IBM 709. In the second generation, such facilities were ubiquitous. In the descriptions below, NSI is the next sequential instruction, the return address. Some examples are: Automatically record the NSI in a regi...
wikipedia
wiki_19211_chunk_1
Mathematical discussion of rangekeeping
Rangekeeping is an excellent example of the application of analog computing to a real-world mathematical modeling problem. Because nations had so much money invested in their capital ships, they were willing to invest enormous amounts of money in the development of rangekeeping hardware to ensure that the guns of these...
wikipedia
wiki_32894_chunk_1
Spectral geometry
Inverse problems seek to identify features of the geometry from information about the eigenvalues of the Laplacian. One of the earliest results of this kind was due to Hermann Weyl who used David Hilbert's theory of integral equation in 1911 to show that the volume of a bounded domain in Euclidean space can be determi...
wikipedia
wiki_25397_chunk_2
Mathematical Contest in Modeling
Problems At the beginning of the contest, teams have a choice between two problems. Problem A involves a system that requires the use of continuous mathematics, and thus often involves concepts from geometry, physics, or engineering. Problem B involves a system that requires the use of discrete mathematics. In 2016, ...
wikipedia
wiki_39905_chunk_4
Religious and political symbols in Unicode
Dingbats block The Dingbats block also contains some symbols with political/religious connotations: {| class="wikitable" style="text-align:center" |- ! Symbol !! Code point !! Name |- | || U+2719 || style="text-align:left" | OUTLINED GREEK CROSS |- | || U+271A || style="text-align:left" | HEAVY GREEK CROSS |- | || U...
wikipedia
wiki_19713_chunk_1
Council for the Mathematical Sciences
Purpose to represent the interests of mathematics to government, Research Councils and other public bodies; to promote good practice in the mathematics curriculum and its teaching and learning at all levels and in all sectors of education; to respond coherently and effectively to proposals from government and other ...
wikipedia
wiki_16607_chunk_7
Bruce Woodcock (computer games analyst)
References MMOGCHART.COM(Bruce Woodcock's website) Biography at Austin Game Conference website "Network Appliance's Knight of the Message Boards", July 3, 2000 - Profile of Woodcock in Business Week "Race to build Stormreach" by Hiawatha Bay, The Boston Globe, June 8, 2005 "Can Mickey and Frodo revive virtual wo...
wikipedia
wiki_38771_chunk_5
All the Wrong Questions
Characters Lemony Snicket: the narrator and protagonist; a thirteen-year-old apprentice of V.F.D. staying in Stain'd-by-the-Sea. S. Theodora Markson: Snicket's chaperone in the town; an incompetent member of V.F.D. Known for her unruly hair. Moxie Mallahan: a child and aspiring journalist living in Stain'd-by-the-Se...
wikipedia
wiki_30856_chunk_2
Q (programming language from Kx Systems)
The following code demonstrates the relationships of the data structures. Expressions to evaluate appear prefixed with the q) prompt, with the output of the evaluation shown beneath: q)`john / an atom of type symbol `john q)50 / an atom of type integer 50 q)`john`jack / a list of symbols `john`jack q)50 60 / a list ...
wikipedia
wiki_4547_chunk_19
United States of America Mathematical Olympiad
2006-2007 Beginning in 2006, the USAMO was expanded to include approximately 500 students (around 430 were actually invited, read below) due to a proposal and sponsorship from the Art of Problem Solving website: The goal is to select about 500 of the top scorers from this year's AIME and AMC 12A, AMC 12B, AMC 10A and ...
wikipedia
wiki_38440_chunk_6
Computer architecture
There are other technologies in computer architecture. The following technologies are used in bigger companies like Intel, and were estimated in 2002 to count for 1% of all of computer architecture: Macroarchitecture: architectural layers more abstract than microarchitecture Assembly instruction set architecture: A s...
wikipedia
wiki_21913_chunk_3
South Asia Theological Research Institute
Courses offered {| class="toccolours" style="float:right; margin-left:1em; font-size:85%; background:#ffc; color:black; width:35em; max-width:40%;" cellspacing="0" cellpadding="0" |- ! style="background:#ccc;"| Succession of Deans of SATHRI |- | style="text-align: left;" | 1989-2000, The Rev. K. C. Abraham, Ph.D. (Prin...
wikipedia
wiki_4937_chunk_9
Network theory
Link analysis Link analysis is a subset of network analysis, exploring associations between objects. An example may be examining the addresses of suspects and victims, the telephone numbers they have dialed and financial transactions that they have partaken in during a given timeframe, and the familial relationships be...
wikipedia
wiki_15293_chunk_1
EEVIAC Operational Index and Reference Guide, Including Other Modern Computational Devices
Track listing "Interstellar Hardrive" "D:Contamination" "U-235/PU-239" "Domain of the Human Race" "Theme from EEVIAC" "A Reversal of Polarity" "Fractionalized Reception of a Scrambled Transmission" "Engines of Difference" "Psychology of A.I. (Numbers Follow Answers)" "Krasnoyask-26" "Within the Mainframe, Im...
wikipedia
wiki_24875_chunk_4
Residuated Boolean algebra
Examples Any Boolean algebra, with the monoid multiplication • taken to be conjunction and both residuals taken to be material implication x→y. Of the remaining 15 binary Boolean operations that might be considered in place of conjunction for the monoid multiplication, only five meet the monotonicity requirement, name...
wikipedia
wiki_956_chunk_45
Unification (computer science)
A successful example computation path for the unification problem { app(x,app(y,x)) ≐ a.a.nil } is shown below. To avoid variable name clashes, rewrite rules are consistently renamed each time before their use by rule mutate; v2, v3, ... are computer-generated variable names for this purpose. In each line, the chosen e...
wikipedia
wiki_6166_chunk_16
Loop unrolling
Assembler example (IBM/360 or Z/Architecture) This example is for IBM/360 or Z/Architecture assemblers and assumes a field of 100 bytes (at offset zero) is to be copied from array FROM to array TO—both having 50 entries with element lengths of 256 bytes each.* The return address is in R14. * Initialize registers R15, ...
wikipedia
wiki_20689_chunk_4
CSA (database company)
Civil Engineering Abstracts CSA/ASCE Civil Engineering Abstracts encompasses global, indexing, and abstracting coverage of civil engineering technical literature. Coverage also includes the complementary fields of forensic engineering, engineering services management, engineering services marketing, engineering educati...
wikipedia
wiki_2991_chunk_16
Kahan summation algorithm
Further enhancements Neumaier introduced an improved version of Kahan algorithm, which he calls an "improved Kahan–Babuška algorithm", which also covers the case when the next term to be added is larger in absolute value than the running sum, effectively swapping the role of what is large and what is small. In pseudoco...
wikipedia
wiki_6608_chunk_6
Gauss–Newton algorithm
In a biology experiment studying the relation between substrate concentration and reaction rate in an enzyme-mediated reaction, the data in the following table were obtained. {|class="wikitable" style="text-align: center;" ! | 1 || 2 || 3 || 4 || 5 || 6 || 7 |- ! | 0.038 || 0.194 || 0.425 || 0.626 || 1.253 || ...
wikipedia
wiki_23074_chunk_13
New York Number Theory Seminar
The third edition was published in 1985. The work undergone during the seminars has recognised the support of the NSF and the U.S. Air Force on the introduction page of the edition. They also acknowledge the help of the Computer Algebra Group of the T.J. Watson Research Center who contributed with extended research and...
wikipedia
wiki_26493_chunk_177
Comparison of programming languages (associative array)
- exception NotFound; exception NotFound - val m : (string, string) HashTable.hash_table = HashTable.mkTable (HashString.hashString, op=) (3, NotFound); val m = HT {eq_pred=fn,hash_fn=fn,n_items=ref 0,not_found=NotFound(-), table=ref [|NIL,NIL,NIL,NIL,NIL,NIL,NIL,NIL,NIL,NIL,NIL,NIL,...|]} : (string,string...
wikipedia
wiki_16032_chunk_7
Tacit programming
A few programs have been written to automatically convert a Haskell expression to a point-free form. APL family In J, the same sort of point-free code occurs in a function made to compute the average of a list (array) of numbers: avg=: +/ % # +/ sums the items of the array by mapping (/) summation (+) to the array. % d...
wikipedia
wiki_4359_chunk_19
Dead zone (ecology)
"Eutrophication poses a threat to the environment, the economy (e.g. impact on shellfish production, fishing, tourism), but also to human health (Von Blottnitz et al., 2006; Sutton et al., 2011). Attempts to evaluate the monetary impacts of eutrophication have been made over the last two decades, mainly in the United S...
wikipedia
wiki_942_chunk_5
CYK algorithm
Probabilistic CYK (for finding the most probable parse) Allows to recover the most probable parse given the probabilities of all productions. let the input be a string I consisting of n characters: a1 ... an. let the grammar contain r nonterminal symbols R1 ... Rr, with start symbol R1. let P[n,n,r] be an array of ...
wikipedia
wiki_36916_chunk_13
Blossom algorithm
INPUT: Graph G, matching M on G OUTPUT: augmenting path P in G or empty path if none found B01 function find_augmenting_path(G, M) : P B02 F ← empty forest B03 unmark all vertices and edges in G, mark all edges of M B05 for each exposed vertex v do B06 create a singleton tree { v } and add th...
wikipedia
wiki_907_chunk_13
Geostatistics
GeoENVia promotes the use of geostatistical methods in environmental applications, and organizes bi-annual conferences. , a resource on the internet about geostatistics and spatial statistics On-Line Library that chronicles Matheron's journey from classical statistics to the new science of geostatistics https://we...
wikipedia
wiki_1527_chunk_38
Generating function
using the Riemann zeta function. The sequence ak generated by a Dirichlet series generating function (DGF) corresponding to: where is the Riemann zeta function, has the ordinary generating function: Multivariate generating functions Multivariate generating functions arise in practice when calculating the number of con...
wikipedia
wiki_3229_chunk_19
Integer programming
In the special case of 0-1 ILP, Lenstra's algorithm is equivalent to complete enumeration: the number of all possible solutions is fixed (2n), and checking the feasibility of each solution can be done in time poly(m, log V). In the general case, where each variable can be an arbitrary integer, complete enumeration is i...
wikipedia
wiki_30823_chunk_2
Computer graphics (computer science)
There are several international conferences and journals where the most significant results in computer graphics are published. Among them are the SIGGRAPH and Eurographics conferences and the Association for Computing Machinery (ACM) Transactions on Graphics journal. The joint Eurographics and ACM SIGGRAPH symposium s...
wikipedia
wiki_38000_chunk_25
Consumer neuroscience
Limitations Most of the consumer neuroscience studies involving brain scanning techniques have been conducted in medical or technological environments where such brain imaging devices are present. This is not a realistic environment for consumer decision making and may serve to skew the data relative to consumer deci...
wikipedia
wiki_9832_chunk_13
Lamport's bakery algorithm
When implementing the pseudo code in a single process system or under cooperative multitasking, it is better to replace the "do nothing" sections with code that notifies the operating system to immediately switch to the next thread. This primitive is often referred to as yield. Lamport's bakery algorithm assumes a sequ...
wikipedia
wiki_1763_chunk_54
Computer-assisted language learning
A distinction needs to be made between the impact and the effectiveness of CALL. Impact may be measured quantitatively and qualitatively in terms of the uptake and use of ICT in teaching foreign languages, issues of availability of hardware and software, budgetary considerations, Internet access, teachers' and learners...
wikipedia
wiki_28723_chunk_4
Neuroscience Information Framework
The NIFSTD, or NIF Standard Ontology contains many of the terms, synonyms and abbreviations useful for neuroscience, as well as dynamic categories such as defined cell classes based on various properties like neuron by neurotransmitter or by circuit role or drugs of abuse according to the National Institutes on Drug Ab...
wikipedia
wiki_637_chunk_3
Jess (programming language)
(assert (car (color red) (mileage 10000) (value 400))) Sample code: (clear) (deftemplate blood-donor (slot name) (slot type)) (deffacts blood-bank ; put names & their types into [[working memory]] (blood-donor (name "Alice")(type "A")) (blood-donor (name "Agatha")(type "A")) (blood-donor (...
wikipedia
wiki_521_chunk_20
Statistics
Experimental and observational studies A common goal for a statistical research project is to investigate causality, and in particular to draw a conclusion on the effect of changes in the values of predictors or independent variables on dependent variables. There are two major types of causal statistical studies: exper...
wikipedia
wiki_18663_chunk_4
Society for Anthropological Sciences
It maintains a website at http://www.societyforanthropologicalsciences.org. The purpose of the site is promote discussion and cooperation among anthropologists and others interested in promoting scientific anthropology, as opposed to those who argue that anthropology (and social science generally) is not scientific, ...
wikipedia
wiki_17601_chunk_23
Softmax function
Here is an example of Julia code: julia> A = [1.0, 2.0, 3.0, 4.0, 1.0, 2.0, 3.0]; # semicolon to suppress interactive output julia> exp.(A) ./ sum(exp.(A)) 7-element Array{Float64,1}: 0.0236405 0.0642617 0.174681 0.474833 0.0236405 0.0642617 0.174681 Here is an example of R code:
wikipedia
wiki_11615_chunk_13
Mathematics of Sudoku
Rectangular regions A popular variant is made of rectangular regions (blocks or boxes) – for example, 2×3 hexominoes tiled in a 6×6 grid. The following notation is used for discussing this variant: R×C denotes a rectangular region with R rows and C columns. The implied grid configuration has: grid dimensions N×N, wh...
wikipedia
wiki_3019_chunk_37
R (programming language)
Coefficients: Estimate Std. Error t value Pr(>|t|) (Intercept) -9.3333 2.8441 -3.282 0.030453 * x 7.0000 0.7303 9.585 0.000662 *** --- Signif. codes: 0 ‘***’ 0.001 ‘**’ 0.01 ‘*’ 0.05 ‘.’ 0.1 ‘ ’ 1
wikipedia
wiki_8086_chunk_32
Courant Institute of Mathematical Sciences
External links Courant Institute of Mathematical Sciences Department of Mathematics, New York University Applied Mathematics Laboratory New York University Computer Science New York University Mathematics in Finance New York University Scientific Computing http://www.cims.nyu.edu/~csplash/index.php NYU Mathematics Soci...
wikipedia
wiki_1712_chunk_5
Statistics Canada
Statistics Canada provides free access to numerous aggregate data tables on various subjects of relevance to Canadian life. Many tables used to be published as the Canadian Socio-economic Information Management System, or CANSIM, which has since been replaced by new, more easily manipulated data tables Subject areas in...
wikipedia
wiki_35835_chunk_4
Journal of Cell Biology
Key dates January 25, 1955: Publication of the first issue of The Journal of Biophysical and Biochemical Cytology. January 1961 – December 1983: Raymond Griffiths is Executive Editor. January 1962: Journal name changed to The Journal of Cell Biology. January 1984 – December 1998: Bernie Gilula is Editor in Chief. Janu...
wikipedia
wiki_39909_chunk_6
Alpha algorithm
Description The alpha miner starts with converting an event log into directly-follows, sequence, parallel, and choice relations, and using them to create a petri net describing the process model. Initially the algorithm constructs a footprint matrix. Using the footprint matrix and the above shown pattern, one can const...
wikipedia
wiki_8588_chunk_39
Matrix calculus
{|class="wikitable" style="text-align: center;" |+ Identities: vector-by-scalar ! scope="col" width="150" | Condition ! scope="col" width="100" | Expression ! scope="col" width="100" | Numerator layout, i.e. by y,result is column vector ! scope="col" width="100" | Denominator layout, i.e. by yT,result is row vector...
wikipedia
wiki_7647_chunk_24
Minkowski's question-mark function
Restricting the Minkowski question mark function to ?:[0,1] → [0,1], it can be used as the cumulative distribution function of a singular distribution on the unit interval. This distribution is symmetric about its midpoint, with raw moments of about m1 = 0.5, m2 = 0.290926, m3 = 0.186389 and m4 = 0.126992, and so a ...
wikipedia
wiki_34229_chunk_8
Symbol (programming)
Examples The following is a simple example of a symbol literal in Ruby: my_symbol = :a my_symbol = :"an identifier" Strings can be coerced into symbols, vice versa: irb(main):001:0> my_symbol = "Hello, world!".intern => :"Hello, world!" irb(main):002:0> my_symbol = "Hello, world!".to_sym => :"Hello, world!" irb(main)...
wikipedia
wiki_33657_chunk_12
Hayden Geological Survey of 1871
The survey followed the Firehole River upstream to Madison Lake and then over the divide to Shoshone Lake eventually camping near Lost Lake about from the West Thumb area of Yellowstone Lake. On August 7, 1871 they camped and explored at West Thumb for two days. As some of the military escort were to travel back to F...
wikipedia
wiki_15554_chunk_6
Jacobi eigenvalue algorithm
procedure jacobi(S ∈ Rn×n; out e ∈ Rn; out E ∈ Rn×n) var i, k, l, m, state ∈ N s, c, t, p, y, d, r ∈ R ind ∈ Nn changed ∈ Ln function maxind(k ∈ N) ∈ N ! index of largest off-diagonal element in row k m := k+1 for i := k+2 to n do if │Ski│ > │Skm│ then m := i endif endf...
wikipedia
wiki_2443_chunk_141
Quantitative genetics
A second application involves using regression analysis, which estimates from statistics the ordinate (Y-estimate), derivative (regression coefficient) and constant (Y-intercept) of calculus. The regression coefficient estimates the rate of change of the function predicting Y from X, based on minimizing the residuals b...
wikipedia
wiki_849_chunk_29
Algebraic notation (chess)
Though not technically a part of algebraic notation, the following are some symbols commonly used by annotators, for example in publications Chess Informant and Encyclopaedia of Chess Openings, to give editorial comment on a move or position. {| |- style="vertical-align:bottom;" |colspan="2;"|On moves: |- style="vertic...
wikipedia
wiki_19608_chunk_15
Comparison of programming languages (syntax)
Parentheses ( ... ) OCaml, Prolog, Standard ML Square brackets [ ... ] Smalltalk (blocks are first class objects. a.k.a. closures) begin ... end Ada, ALGOL, Pascal, Ruby (for, do/while & do/until loops), OCaml, SCL, Simula, Erlang. do ... end PL/I, REXX do ... done Bash (for & while loops), Visual Basic, Fortran, ...
wikipedia
wiki_8588_chunk_44
Matrix calculus
{|class="wikitable" style="text-align: center;" |+ Identities: matrix-by-scalar ! scope="col" width="175" | Condition ! scope="col" width="100" | Expression ! scope="col" width="100" | Numerator layout, i.e. by Y |- | U = U(x) || || |- | A, B are not functions of x, U = U(x) || || |- | U = U(x), V = V(x) || || ...
wikipedia
wiki_38856_chunk_7
Company Level Intelligence Cell
References Corps creates intel cells at rifle-company level Creating Intelligence, Neil Garra, http://www.s2company.com/index.php?topic=4 Company-Level Intelligence Cell, Training and evaluation at Talon Reach V: “all-in” for intelligence integration at the company level, by Maj Brendan Heatherman, MCIS Staff, and M...
wikipedia
wiki_35990_chunk_2
The Selected Works of T. S. Spivet
Plot summary The novel is told from the perspective of twelve-year-old T.S. Spivet, a mapmaking enthusiast living on a ranch near Divide, Montana, a small village near Butte, Montana, practically on the continental divide. T.S.'s mother, whom he consistently refers to as "Dr. Clair," is an entomologist preoccupied — or...
wikipedia
wiki_34985_chunk_4
IEEE Oceanic Engineering Society
(a) IEEE Journal of Oceanic Engineering: A quarterly journal published by OES whose field of interest includes all aspects of science, engineering and technology that address research, development, and operations pertaining to all bodies of water. This includes the creation of new capabilities and technologies from con...
wikipedia
wiki_29911_chunk_4
Feature-oriented programming
A third generation of research focussed on the fact that every program has multiple representations (e.g., source, makefiles, documentation, etc.) and adding a feature to a program should elaborate each of its representations so that all are consistent. Additionally, some of representations could be generated (or deri...
wikipedia
wiki_26407_chunk_32
Text Executive Programming Language
TEX commands: call ! – call a subroutine in the current program or in another file. the call ends when a stop or return clear – remove a named variable from the pool or use * to remove all variables goto ! – goto the named file and label ercall ! – call subroutine on error in the preceding command ergoto ! – goto...
wikipedia
wiki_20402_chunk_7
Tree of life (biology)
Charles Darwin (1809–1882) used the metaphor of a "tree of life" to conceptualize his theory of evolution. In On the Origin of Species (1859) he presented an abstract diagram of a theoretical tree of life for species of an unnamed large genus (see figure). On the horizontal base line hypothetical species within this ge...
wikipedia
wiki_16437_chunk_12
Civil Services Examination
From 2011 onwards, the preliminary examination intends to focus on analytical abilities and understanding rather than the ability to memorize. The new pattern includes two papers of two hours duration and 200 marks each. Both papers have multiple choice objective type questions only. They are as follows: Paper I tests...
wikipedia
wiki_13051_chunk_9
Cell (novel)
Characters Clayton Riddell: a graphic artist separated from his family in Boston as the Pulse destroys civilization. Clay heads north with a group of survivors and tries to find his son, Johnny, and estranged wife, Sharon. Thomas McCourt: a middle-aged man from Malden; Tom teams up with Clay in the initial chaos create...
wikipedia
wiki_11351_chunk_5
Programming complexity
Chidamber and Kemerer proposed a set of programing complexity metrics, widely used in many measurements and academic articles. They are WMC, CBO, RFC, NOC, DIT, and LCOM, described below: WMC - weighted methods per class n is the number of methods on the class is the complexity of the method CBO - coupling betwee...
wikipedia
wiki_20689_chunk_18
CSA (database company)
The database covers theory, experimentation, application, emerging technologies, and companies that are involved in the space sciences (including aeronautics and astronautics), computer & information technology, solid state materials (including solid state devices), communications, chemistry geoscience, and finally ele...
wikipedia
wiki_17201_chunk_12
Use of Free and Open-Source Software (FOSS) in the U.S. Department of Defense
Create a "Generally Recognized As Safe" FOSS list. This list would provide quick official recognition of FOSS applications that are (a) commercially supported, (b) widely used, and (c) have proven track records of security and reliability—e.g., as measured by speed of closures of CERT reports in comparison to closed-so...
wikipedia
wiki_13132_chunk_7
Extreme programming practices
Determine Risk Index: Give each user story an index from 0 to 2 on each of the following factors: Completeness (do we know all of the story details?) Complete (0) Incomplete (1) Unknown (2) Volatility (is it likely to change?) low (0) medium (1) high (2) Complexity (how hard is it to build?) simple (0) standard (1) com...
wikipedia
wiki_6352_chunk_47
Gene expression programming
For example, below is shown a simple chromosome composed of only one gene a head size of 7 (the Dc stretches over positions 15–22): 01234567890123456789012 +?*+?**aaa??aaa68083295 where the terminal "?” represents the placeholder for the RNCs. This kind of chromosome is expressed exactly as shown above, giving: Then th...
wikipedia
wiki_32_chunk_22
Analysis of algorithms
Growth rate analysis of other resources The methodology of run-time analysis can also be utilized for predicting other growth rates, such as consumption of memory space. As an example, consider the following pseudocode which manages and reallocates memory usage by a program based on the size of a file which that progr...
wikipedia
wiki_3229_chunk_23
Integer programming
Sparse integer programming It is often the case that the matrix which defines the integer program is sparse. In particular, this occurs when the matrix has a block structure, which is the case in many applications. The sparsity of the matrix can be measured as follows. The graph of has vertices corresponding to colu...
wikipedia
wiki_6166_chunk_29
Loop unrolling
l.d $f10, 24($5) ; iteration with displacement 24 l.d $f12, 24($6) mul.d $f10, $f10, $f12 add.d $f8, $f8, $f10 addi $5, $5, 32 addi $6, $6, 32 addi $7, $7, -4 test: bgtz $7, loop3 ; Continue loop if $7 >...
wikipedia
wiki_34246_chunk_2
Dungeon Master Option: High-Level Campaigns
Header The book begins with a one-page foreword by Skip Williams. Chapter One (pages 6–29) explains the seven maxims for running high-level AD&D campaigns: Don't depend on the dice, Use adversaries intelligently and inventively, Control magic, Be aware of demographics, Think on an epic scale, Plan ahead, and Share resp...
wikipedia
wiki_7791_chunk_20
Chinese mathematics
Linear algebra The Book of Computations is the first known text to solve systems of equations with two unknowns. There are a total of three sets of problems within The Book of Computations involving solving systems of equations with the false position method, which again are put into practical terms. Chapter Seven of ...
wikipedia
wiki_2693_chunk_7
Disk (mathematics)
Computation Complete elliptic integrals can be computed by the method of the arithmetic-geometric mean. can then be determined to good accuracy by code along the following lines: double discdist(double q) { double x,a,b,c,oldc,adash,mult,csum,K,KminusE,qsq,pi=3.141592653589793 ; if(q==0) return 2.0/3.0 ; else...
wikipedia
wiki_27918_chunk_1
List of unsolved problems in statistics
Inference and testing How to detect and correct for systematic errors, especially in sciences where random errors are large (a situation Tukey termed uncomfortable science). The Graybill–Deal estimator is often used to estimate the common mean of two normal populations with unknown and possibly unequal variances. Tho...
wikipedia
wiki_3248_chunk_27
Sum-addressed decoder
References Paul Demone has an explanation of sum-addressed caches in a realworldtech article. Heald et al. have a paper in ISSCC 1998 that explains what may be the original sum-addressed cache in the Ultrasparc III. Sum-addressed memory is described in United States patent 5,754,819, May 19, 1998, Low-latency memory...
wikipedia
wiki_36622_chunk_5
Discovery Networks Deutschland
Some programmes shown on DMAX Was geht? Experiment am Limit (What works? Experiments at the limits) - gives solutions for childhood dreams and daily problems. e.g.: can a gun be fired underwater? Die Ludolfs – 4 Brüder auf'm Schrottplatz (The Ludolfs – four brothers at the scrapyard) - observes Peter, Manni, Uwe and ...
wikipedia
wiki_19542_chunk_5
Map algebra
Tomlin classified the many possible map algebra operations into three types, to which some systems add a fourth: Local Operators Operations that operate on one cell location at a time during the scan phase. A simple example would be an arithmetic operator such as addition: to compute MAP3 = MAP1 + MAP2, the software ...
wikipedia
wiki_13449_chunk_61
Turing's proof
11 S.D – Standard Description: a sequence of symbols A, C, D, L, R, N, “;” on a Turing machine tape 12 D.N — Description Number: an S.D converted to a number: 1=A, 2=C, 3 =D, 4=L, 5=R, 6=N, 7=; 13 M(n) — a machine whose D.N is number “n” 14 satisfactory — a S.D or D.N that represents a circle-free machine
wikipedia
wiki_5511_chunk_14
Topological sorting
Note that the prefix sum for the local offsets can be efficiently calculated in parallel. p processing elements with IDs from 0 to p-1 Input: G = (V, E) DAG, distributed to PEs, PE index j = 0, ..., p - 1 Output: topological sorting of G function traverseDAGDistributed δ incoming degree of local vertices V ...
wikipedia
wiki_1067_chunk_39
Civil Service (United Kingdom)
{|class="wikitable" ! width="9%" rowspan="2"|Group ! colspan="2" | Historic names ! width="26%" colspan="3" style='background: #ffebd2' | Current structure ! colspan="3" width="39%" |Equivalent military rank(NATO Code) |- ! Grade(pre 1971) ! 1971 unified grading structure ! colspan="2" width="13%" | 1996 SCS changes ! ...
wikipedia
wiki_15404_chunk_13
Engineering ethics
Institute of Electrical and Electronics Engineers: "We, the members of the IEEE, … do hereby commit ourselves to the highest ethical and professional conduct and agree: 1. to accept responsibility in making decisions consistent with the safety, health and welfare of the public, and to disclose promptly factors that mig...
wikipedia
wiki_38313_chunk_3
Lightweight Kernel Operating System
Characteristics Although it is surprisingly difficult to exactly define what a lightweight kernel is, there are some common design goals: Targeted at massively parallel environments composed of thousands of processors with distributed memory and a tightly coupled network. Provide necessary support for scalable, perf...
wikipedia
wiki_21686_chunk_12
Javaris Crittenton
|- | style="text-align:left;"| | style="text-align:left;"| L.A. Lakers | 22|| 0 || 7.8 || .491 || .333 || .679 || 1 || .8 || .3 || 0 || 3.3 |- | style="text-align:left;"| | style="text-align:left;"| Memphis | 28 || 0 || 18.1 || .400 || .265 || .697 || 3.2 || 1.2 || 0.1 || 0.4 || 7.4 |- | style="text-align:left;"| | ...
wikipedia
wiki_23161_chunk_14
FAME (database)
Expanded managed content provides out-of-the-box data and object models for: Equity pricing Corporate bond pricing Futures, commodities and options Company and index fundamentals Company and index estimates Macro-economic indicators and benchmark construction FAME 10 provides a number of enhanced features for cr...
wikipedia
wiki_8203_chunk_2
Global Infectious Disease Epidemiology Network
The second module follows the epidemiology of individual diseases, including their global background and status in each of 205 countries and regions. All past and current outbreaks of all diseases, in all countries, are described in detail. The user may also access a list of diseases compatible with any combination of ...
wikipedia
wiki_27985_chunk_16
Bees algorithm
%% Iterations of the grouped bees algorithm for i=1:maxIteration % GBA's main loop beeIndex = 0; % keep track of all bees (i.e, patches) for g=1:nGroups % for each group of scout bees for j = 1 : groups(g) % exploit each patch within each group beeIndex = beeIndex + 1; % increase the counter p...
wikipedia
wiki_39905_chunk_7
Religious and political symbols in Unicode
Enclosed Ideographic Supplement block The Unicode chart for the Enclosed Ideographic Supplement block notes several symbols used for Chinese folk religion: {| class="wikitable" style="text-align:center" |- ! Symbol !! Code point !! Name and notes |- | || U+1F260 || style="text-align:left" | ROUNDED SYMBOL FOR FU (luck...
wikipedia
wiki_649_chunk_18
Beam-powered propulsion
Testing Early in the morning of 2 October 2000 at the High Energy Laser Systems Test Facility (HELSTF), Lightcraft Technologies, Inc. (LTI) with the help of Franklin B. Mead of the U.S. Air Force Research Laboratory and Leik Myrabo set a new world's altitude record of 233 feet (71 m) for its 4.8 inch (12.2 cm) diameter...
wikipedia
wiki_4174_chunk_11
Computer-Assisted Passenger Prescreening System
Redress process - A system of due process exists whereby aviation passengers determined to pose a threat are either delayed or prohibited from boarding their scheduled flights by TSA may appeal such decisions and correct erroneous information contained in CAPPS II or Secure Flight or other follow-on/successor programs....
wikipedia
wiki_942_chunk_4
CYK algorithm
let the input be a string I consisting of n characters: a1 ... an. let the grammar contain r nonterminal symbols R1 ... Rr, with start symbol R1. let P[n,n,r] be an array of booleans. Initialize all elements of P to false. for each s = 1 to n for each unit production Rv → as set P[1,s,v] = true fo...
wikipedia
wiki_547_chunk_64
Scheme (programming language)
Scheme has three different types of equivalence between arbitrary objects denoted by three different equivalence predicates, relational operators for testing equality, eq?, eqv? and equal?: eq? evaluates to #f unless its parameters represent the same data object in memory; eqv? is generally the same as eq? but treat...
wikipedia