id stringlengths 14 20 | title stringlengths 4 131 | text stringlengths 52 43k | source stringclasses 1
value |
|---|---|---|---|
wiki_33074_chunk_4 | International Requirements Engineering Board | CPRE Foundation Level
The IREB Syllabus for the CPRE Foundation Level of the IREB Certified Professional for Requirements Engineering
sets the following priorities:
The focus is on acquiring the necessary practical knowledge and learning the basic concepts in Requirements Engineering, with reinforcement through pract... | wikipedia |
wiki_164_chunk_4 | Descriptive statistics | The use of descriptive and summary statistics has an extensive history and, indeed, the simple tabulation of populations and of economic data was the first way the topic of statistics appeared. More recently, a collection of summarisation techniques has been formulated under the heading of exploratory data analysis: an... | wikipedia |
wiki_19012_chunk_27 | Impact of nanotechnology | Regulatory bodies such as the United States Environmental Protection Agency and the Food and Drug Administration in the U.S. or the Health & Consumer Protection Directorate of the European Commission have started dealing with the potential risks posed by nanoparticles. So far, neither engineered nanoparticles nor the p... | wikipedia |
wiki_36883_chunk_1 | Laboratory for Computational Cultural Dynamics | Motivation
The overall goal of the LCCD is to develop the computational infrastructure needed to help others when decision making in a cultural situation is required.
The technologies developed at the lab see potential application in:
understanding terrorist organizations and predicting terrorist behavior;
understand... | wikipedia |
wiki_155_chunk_6 | Clay Mathematics Institute | In recognition of major breakthroughs in mathematical research, the institute has an annual prize — the Clay Research Award. Its recipients to date are Ian Agol, Manindra Agrawal, Yves Benoist, Manjul Bhargava, Tristan Buckmaster, Danny Calegari, Alain Connes, Nils Dencker, Alex Eskin, David Gabai, Ben Green, Mark Gros... | wikipedia |
wiki_591_chunk_28 | Temporomandibular joint dysfunction | Possible associations
TMD has been suggested to be associated with other conditions or factors, with varying degrees evidence and some more commonly than others. E.g. It has been shown that 75% of people with TMD could also be diagnosed with fibromyalgia, since they met the diagnostic criteria, and that conversely, 18%... | wikipedia |
wiki_24985_chunk_3 | Computer Task Group | Diversified Systems Inc. (1983)
Automated Business Systems, Inc. (1983)
Berger, Vernay & Co. (1985)
Delta Force Inc. (1985)
Documentation Resources, Inc. (1986)
Shubrooks International, Ltd. (1986)
Applied Management Systems, Inc. (1988)
Connolly Data Systems Inc. (1990)
Telecommunications Management Consultant... | wikipedia |
wiki_862_chunk_56 | Philosophiæ Naturalis Principia Mathematica | Cambridge University Library has Newton's own copy of the first edition, with handwritten notes for the second edition.
The Earl Gregg Swem Library at the College of William & Mary has a first edition copy of the Principia. Throughout are Latin annotations written by Thomas S. Savage. These handwritten notes are curre... | wikipedia |
wiki_22679_chunk_6 | The Zoological Record | Online availability
The Zoological Record is one of the few extremely important historical publications in the field of zoological nomenclature that are not available at open access to the public in a digitised image format, for example at the Biodiversity Heritage Library or the Internet Archive. In the United States... | wikipedia |
wiki_26525_chunk_6 | Materials science in science fiction | |Duralumin is a rather old aluminum alloy with unexceptional properties by modern standards. Furthermore, other metals such as titanium are much stronger and about the same weight.
|-
|Einsteinium
|The Tashkent Crisis|In William Craig's Cold War novel, einsteinium-119 is used to build a nuclear warhead into the casing... | wikipedia |
wiki_37811_chunk_7 | Go (programming language) | Design
Go is influenced by C (especially the Plan 9 dialect ), but with an emphasis on greater simplicity and safety. The language consists of:
A syntax and environment adopting patterns more common in dynamic languages:
Optional concise variable declaration and initialization through type inference (x := 0 instead o... | wikipedia |
wiki_6057_chunk_9 | List of 7400-series integrated circuits | Normal inputs / push–pull outputs
{| class="wikitable"
|-
! Configuration !! Buffer !! Inverter
|-
| Hex 1-input || 74x34 || 74x04
|}
{| class="wikitable"
|-
! Configuration !! AND !! NAND !! OR !! NOR !! XOR !! XNOR
|-
| Quad 2-input || 74x08 || 74x00 || 74x32 || 74x02 || 74x86 || 74x7266
|-
| Triple 3-Input || 74x11 ... | wikipedia |
wiki_16545_chunk_1 | Cell software development | Adapting VMX for SPU Differences between VMX and SPU
The VMX (Vector Multimedia Extensions) technology is conceptually similar to the vector model provided by the SPU processors, but there are many significant differences. The VMX Java mode conforms to the Java Language Specification 1 subset of the default IEEE Standa... | wikipedia |
wiki_4902_chunk_2 | Moufang loop | Examples
Any group is an associative loop and therefore a Moufang loop.
The nonzero octonions form a nonassociative Moufang loop under octonion multiplication.
The subset of unit norm octonions (forming a 7-sphere in O) is closed under multiplication and therefore forms a Moufang loop.
The subset of unit norm integ... | wikipedia |
wiki_414_chunk_91 | Nuclear power | Speed of transition and investment needed
Analysis in 2015 by professor Barry W. Brook and colleagues found that nuclear energy could displace or remove fossil fuels from the electric grid completely within 10 years. This finding was based on the historically modest and proven rate at which nuclear energy was added in ... | wikipedia |
wiki_1270_chunk_19 | National Science Foundation Network | In addition to the five NSF supercomputer centers, NSFNET provided connectivity to eleven regional networks and through these networks to many smaller regional and campus networks. The NSFNET regional networks were:
BARRNet, the Bay Area Regional Research Network in Palo Alto, California;
CERFnet, California Education ... | wikipedia |
wiki_23109_chunk_9 | List of Philippine mythological figures | Chief Spirits: may take the form of human beings, former mortals who mix with the living, and reside in bathing places
Anlabban: looks after the general welfare of the people; special protector of hunters
Bago: the spirit of the forest
Sirinan: the spirit of the river
Landusan: responsible for some cases of extreme pov... | wikipedia |
wiki_9392_chunk_40 | Galactic Civilizations II: Dread Lords | Two new civilizations: a genocidal Drengin offshoot called the Korath and a civilization called the Krynn
A new campaign in which the player leads the Drengin Empire
The ability to create custom opponents
An "environment" statistic to planets, which will determine which civilization can innately colonize or what tec... | wikipedia |
wiki_28990_chunk_4 | Network Centric Product Support | Typical Usage
The extension of the World Wide Web architecture into the product is important to understand, as all decisions for manufacturing of spare parts, scheduling for flights, and other factory OEM and airline operator functions, are driven primarily by what happens to the product in the field (rate of wear and ... | wikipedia |
wiki_33201_chunk_7 | List of surviving DuMont Television Network broadcasts | The Admiral Broadway Revue – three half-hour segments
The Adventures of Ellery Queen – one episode (December 21, 1950)
The Alan Dale Show – one episode (June 1948 )
The Armed Forces Hour – two 15-minute segments
The Arthur Murray Party – one hour-long episode, one half-hour episode, and four half-hour segments
The... | wikipedia |
wiki_2017_chunk_12 | Scale-free network | Immunization
The question of how to immunize efficiently scale free networks which represent realistic networks such as the Internet and social networks has been studied extensively. One such strategy is to immunize the largest degree nodes, i.e., targeted (intentional) attacks since for this case p is relatively high ... | wikipedia |
wiki_1229_chunk_5 | Bytecode | More recently, the authors of V8 and Dart have challenged the notion that intermediate bytecode is needed for fast and efficient VM implementation. Both of these language implementations currently do direct JIT compiling from source code to machine code with no bytecode intermediary. | wikipedia |
wiki_9084_chunk_19 | SK8 (programming language) | References Citations Bibliography Related patents
System and method of using object sensitivity for selecting computer-generated objects, United States Patent 5737554
Graphical interface for interacting constrained actors, United States Patent 5450540 Further reading
How to make complex software customizable, Systems, ... | wikipedia |
wiki_7192_chunk_12 | Deontic logic | Mally's first deontic logic and von Wright's first plausible deontic logic
Ernst Mally, a pupil of Alexius Meinong, was the first to propose a formal system of deontic logic in his Grundgesetze des Sollens (1926) and he founded it on the syntax of Whitehead's and Russell's propositional calculus. Mally's deontic vocabu... | wikipedia |
wiki_30183_chunk_7 | Integrated Space Cell | Technology Experiment Satellite or (TES) is an experimental satellite to demonstrate and validate, in orbit, technologies that could be used in the future satellites of Indian Space Research Organisation (ISRO). The Technology Experiment Satellite (TES) has a panchromatic camera capable of producing images of 1 meter r... | wikipedia |
wiki_89_chunk_92 | Computer program | Here is a C programming language source code for the PERSON abstract datatype in a simple school application: /* person.c */
/* -------- */
#include "person.h" PERSON *person_new( char *name )
{
PERSON *person; if ( ! ( person = calloc( 1, sizeof( PERSON ) ) ) )
{
fprintf(stderr,
"ERROR ... | wikipedia |
wiki_20067_chunk_5 | K-set (geometry) | Construction algorithms
Edelsbrunner and Welzl first studied the problem of constructing all k-sets of an input point set, or dually of constructing the k-level of an arrangement. The k-level version of their algorithm can be viewed as a plane sweep algorithm that constructs the level in left-to-right order. Viewed in... | wikipedia |
wiki_33177_chunk_87 | Robotics | Moreover, there are certain skills to which humans will be better suited than machines for some time to come and the question is how to achieve the best combination of human and robot skills. The advantages of robotics include heavy-duty jobs with precision and repeatability, whereas the advantages of humans include cr... | wikipedia |
wiki_9_chunk_10 | Algorithms for calculating variance | The following formulas can be used to update the mean and (estimated) variance of the sequence, for an additional element xn. Here, denotes the sample mean of the first n samples , their biased sample variance, and their unbiased sample variance. These formulas suffer from numerical instability, as they repeatedly s... | wikipedia |
wiki_31320_chunk_19 | Topology (electrical circuits) | Comprehensive cataloguing of network graphs as they apply to electrical circuits began with Percy MacMahon in 1891 (with an engineer friendly article in The Electrician in 1892) who limited his survey to series and parallel combinations. MacMahon called these graphs yoke-chains. Ronald M. Foster in 1932 categorised g... | wikipedia |
wiki_38249_chunk_2 | Algorithmic skeleton | Example program
The following example is based on the Java Skandium library for parallel programming. The objective is to implement an Algorithmic Skeleton-based parallel version of the QuickSort algorithm using the Divide and Conquer pattern. Notice that the high-level approach hides Thread management from the program... | wikipedia |
wiki_918_chunk_13 | MathML | <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE math PUBLIC "-//W3C//DTD MathML 2.0//EN"
"http://www.w3.org/Math/DTD/mathml2/mathml2.dtd">
<math xmlns="http://www.w3.org/1998/Math/MathML">
<mrow>
<mi>a</mi> <mo>⁢</mo> <msup><mi>x</mi><mn>2</mn></msup>
<mo>+</mo><mi>b</mi><mo>&Invisibl... | wikipedia |
wiki_8345_chunk_3 | Intrinsic function | C and C++
Compilers for C and C++, of Microsoft,
Intel, and the GNU Compiler Collection (GCC)
implement intrinsics that map directly to the x86 single instruction, multiple data (SIMD) instructions (MMX, Streaming SIMD Extensions (SSE), SSE2, SSE3, SSSE3, SSE4, AVX, AVX2, AVX512, FMA, ...). The Microsoft Visual C++ co... | wikipedia |
wiki_24497_chunk_15 | List of problems in loop theory and quasigroup theory | Loops with abelian inner mapping group
Let Q be a loop with abelian inner mapping group. Is Q nilpotent? If so, is there a bound on the nilpotency class of Q? In particular, can the nilpotency class of Q be higher than 3?
Proposed: at Loops '07, Prague 2007
Comments: When the inner mapping group Inn(Q) is finite and a... | wikipedia |
wiki_8969_chunk_12 | Combat flight simulation game | Survey
A survey simulation is a classification of simulator that includes a variety (or survey) of aircraft from the period in question. This type of classification applies to many historical combat simulators, and typically includes aircraft from all nations participating in the conflict. Early simulators suffered fro... | wikipedia |
wiki_24205_chunk_15 | Rod calculus | Sunzi Suanjing described in detail the algorithm of multiplication. On the left are the steps to calculate 38×76:
Place the multiplicand on top, the multiplier on bottom. Line up the units place of the multiplier with the highest place of the multiplicand. Leave room in the middle for recording.
Start calculating from ... | wikipedia |
wiki_19298_chunk_9 | 1950–51 United States network television schedule | NBCReturning SeriesThe Aldrich Family
Armstrong Circle Theatre
Bonny Maid Versatile Varieties
Break the Bank
Camel News Caravan
Cameo Theatre
Candid Camera
The Clock
Duffy's Tavern
Fireside Theatre
Garroway at Large
Gillette Cavalcade of Sports
Greatest Fights of the Century
The Halls of Ivy
Hawkins Falls
The Jack Cart... | wikipedia |
wiki_23909_chunk_4 | European Sensory Network | ESN Studies
Some examples:
Proficiency Testing in Sensory Analysis : within the frame of the EU-funded project "ProfiSens", ESN has contributed to the development of international guidelines on how to evaluate panel performance and on how to monitor the consistency and comparability of test data in sensory laboratori... | wikipedia |
wiki_27985_chunk_4 | Bees algorithm | Pseudocode for the standard bees algorithm
1 for i=1,…,ns
i scout[i]=Initialise_scout()
ii flower_patch[i]=Initialise_flower_patch(scout[i])
2 do until stopping_condition=TRUE
i Recruitment()
ii for i =1,...,na
1 flower_patch[i]=Local_search(flower_patch... | wikipedia |
wiki_14705_chunk_8 | Extreme Networks | Therefore, through a series of historical and contemporary merger and acquisition activity, Extreme Networks claims an industry lineage that includes, at a minimum, the networking-focused elements of the following companies: Digital, Chantry, Siemens, Cabletron, Enterasys, AirDefense, Symbol, Motorola, Zebra, Wellfleet... | wikipedia |
wiki_30342_chunk_17 | List of renewable energy companies by stock exchange | |-
|Iberdrola Renovables, SA
| style="text-align:center;"| Madrid
| style="text-align:center;"|
| style="text-align:center;"| 2007
| style="text-align:center;"| Wind, solar, biomass |-
|Infigen Energy
| style="text-align:center;"| Sydney
| style="text-align:center;"|
| style="text-align:center;"| 2003
| style="text-a... | wikipedia |
wiki_32051_chunk_39 | Introduction to evolution | Biogeography is the study of the geographical distribution of species. Evidence from biogeography, especially from the biogeography of oceanic islands, played a key role in convincing both Darwin and Alfred Russel Wallace that species evolved with a branching pattern of common descent. Islands often contain endemic spe... | wikipedia |
wiki_8093_chunk_3 | Autocode | Below is an example of Glennie's Autocode function which calculates the formula: . The example omits necessary scaling instruction needed to place integers into variables and assumes that results of multiplication fit into lower accumulator. | wikipedia |
wiki_22603_chunk_17 | Harvard John A. Paulson School of Engineering and Applied Sciences | Howard H. Aiken (AM '37, PhD '39) - computer scientist and designer of the Harvard Mark I
Hardy Cross (MCE '11) - American structural engineer and developer of the moment distribution method for structural analysis of statically indeterminate structures
Howard Wilson Emmons (PhD '38) - mechanical engineer considered ... | wikipedia |
wiki_34580_chunk_0 | Common modeling infrastructure | Common modeling infrastructure refers to software libraries that can be shared across multiple institutions in order to increase software reuse and interoperability in complex modeling systems. Early initiatives were in the climate and weather domain, where software components representing distinct physical domains (f... | wikipedia |
wiki_17797_chunk_11 | Armed Forces Radiobiology Research Institute | Operating research facilities for and disseminate results from the study of radiobiology and ionizing radiation bioeffects and the development of medical countermeasures against ionizing radiation
Providing analysis, study, and consultation on the impact of the biological effects of ionizing radiation on the organizat... | wikipedia |
wiki_5511_chunk_15 | Topological sorting | Application to shortest path finding
The topological ordering can also be used to quickly compute shortest paths through a weighted directed acyclic graph. Let be the list of vertices in such a graph, in topological order. Then the following algorithm computes the shortest path from some source vertex to all other ve... | wikipedia |
wiki_2247_chunk_8 | Experimental mathematics | Visual investigations
In Indra's Pearls, David Mumford and others investigated various properties of Möbius transformation and the Schottky group using computer generated images of the groups which: furnished convincing evidence for many conjectures and lures to further exploration. Plausible but false examples Some pl... | wikipedia |
wiki_35939_chunk_12 | Human–computer interaction | The following experimental design principles are considered, when evaluating a current user interface, or designing a new user interface:
Early focus is placed on the user(s) and task(s): How many users are needed to perform the task(s) is established and who the appropriate users should be is determined (someone who ... | wikipedia |
wiki_30027_chunk_26 | Zonal spherical function | Computing the inner product above leads to Harish-Chandra's formula for the zonal spherical function {| border="1" cellspacing="0" cellpadding="5" |
|} as an integral over K. | wikipedia |
wiki_4824_chunk_7 | National Cryptologic Museum | Early Cryptology, which deals with cryptologic history prior to the formation of NSA, with exhibits dating back to the 16th century (the Renaissance-era book Polygraphiae) forward to the early 1950s, focusing on artifacts from the Founding Fathers of the United States, the American Civil War, the United States Army Cod... | wikipedia |
wiki_18764_chunk_126 | Anonymous function | Visual Basic .NET
Visual Basic .NET 2008 introduced anonymous functions through the lambda form. Combined with implicit typing, VB provides an economical syntax for anonymous functions. As with Python, in VB.NET, anonymous functions must be defined on one line; they cannot be compound statements. Further, an anonymous ... | wikipedia |
wiki_7478_chunk_4 | General Algebraic Modeling System | Background
The driving force behind the development of GAMS were the users of mathematical programming who believed in optimization as a powerful and elegant framework for solving real life problems in science and engineering. At the same time, these users were frustrated by high costs, skill requirements, and an overa... | wikipedia |
wiki_36728_chunk_20 | List of important publications in theoretical computer science | Description: A very popular text on algorithms in the late 1980s. It was more accessible and readable (but more elementary) than Aho, Hopcroft, and Ullman. There are more recent editions. Introduction to Algorithms Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Clifford Stein
3rd Edition, MIT Press, 2... | wikipedia |
wiki_32722_chunk_12 | Pure (programming language) | let x = dmatrix {2,1,-1,8; -3,-1,2,-11; -2,1,2,-3};
x; gauss_elimination x; As a language based on term rewriting, Pure fully supports symbolic computation with expressions. Here is an example showing the use of local rewriting rules to expand and factor simple arithmetic expressions: expand = reduce with
(a+b)*c = a... | wikipedia |
wiki_12627_chunk_11 | Gompertz function | Growth of tumors
In the 1960s A.K. Laird for the first time successfully used the Gompertz curve to fit data of growth of tumors. In fact, tumors are cellular populations growing in a confined space where the availability of nutrients is limited. Denoting the tumor size as X(t) it is useful to write the Gompertz Curve ... | wikipedia |
wiki_27152_chunk_3 | Hardware scout | References
Improving data cache performance by pre-executing instructions under a cache miss
Improving processor performance by dynamically preprocessing the instruction stream
High Performance Throughput Computing
Runahead execution: an alternative to very large instruction windows for out-of-order processors
Sun... | wikipedia |
wiki_2158_chunk_19 | Lock (computer science) | Lack of composability
One of lock-based programming's biggest problems is that "locks don't compose": it is hard to combine small, correct lock-based modules into equally correct larger programs without modifying the modules or at least knowing about their internals. Simon Peyton Jones (an advocate of software transact... | wikipedia |
wiki_14084_chunk_4 | Tridiagonal matrix algorithm | The implementation in a VBA subroutine without preserving the coefficient vectors:
Sub TriDiagonal_Matrix_Algorithm(N%, A#(), B#(), C#(), D#(), X#())
Dim i%, W#
For i = 2 To N
W = A(i) / B(i - 1)
B(i) = B(i) - W * C(i - 1)
D(i) = D(i) - W * D(i - 1)
Next i
X(N) = D(N) / B(N)
... | wikipedia |
wiki_25402_chunk_12 | Beznau Nuclear Power Plant | Furthermore, each reactor unit has been equipped with an emergency building (NANO, NAchrüstung NOtstandsystem). These contain additional safety systems for the reactor emergency shutdown and for the feeding of the steam generators, a 50 kV emergency power line, and a diesel electricity generator. They are heavily prote... | wikipedia |
wiki_35603_chunk_1 | Mia's Math Adventure: Just in Time! | Activities
The game's 12 educational activities teach arithmetic (addition, subtraction, multiplication and division) geometry (circle, square, rectangle, triangle, closed and broken lines) logic, place value, fractions, measures, etc. Critical reception
Mia's Math Adventure received positive reviews from the National ... | wikipedia |
wiki_32367_chunk_18 | Z88 FEM software | Application in the industry
Due to the Open Source approach many applications use the Z88 solver, its plot output, etc. Among other things Z88 has been adapted into a program to calculate point concentrated and linear loads on glass panes in building construction. Routines have been implemented to determine the Young'... | wikipedia |
wiki_2671_chunk_37 | Reverse mathematics | Weaker systems than recursive comprehension can be defined. The weak system RCA consists of elementary function arithmetic EFA (the basic axioms plus Δ induction in the enriched language with an exponential operation) plus Δ comprehension. Over RCA, recursive comprehension as defined earlier (that is, with Σ inductio... | wikipedia |
wiki_30692_chunk_68 | Personal computer | See also List of home computers
Public computer
Portable computer
Desktop replacement computer
Quiet PC
Pocket PC
Market share of personal computer vendors
Personal Computer Museum
Enthusiast computer References Further reading
Accidental Empires: How the boys of Silicon Valley make their millions, battle for... | wikipedia |
wiki_7943_chunk_5 | Paul Seymour (mathematician) | Major contributions
Combinatorics in Oxford in the 1970s was dominated by matroid theory, due to the influence of Dominic Welsh and Aubrey William Ingleton. Much of Seymour's early work, up to about 1980, was on matroid theory, and included three important matroid results: his D.Phil. thesis on matroids with the max-fl... | wikipedia |
wiki_2804_chunk_12 | Berkeley Open Infrastructure for Network Computing | Projects
There are 32 active projects listed in the BOINC official website:
Amicable Numbers – Mathematics
Asteroids@home – Astrophysics
BOINC@TACC – Multiple scientific areas
Climateprediction.net – Climate study
Collatz Conjecture – Mathematics
Cosmology@Home – Astronomy
Einstein@home – Astrophysics
Gerasim@H... | wikipedia |
wiki_12260_chunk_11 | Microelectronics and Computer Technology Corporation | External links
Oral history interview with Laszlo A. Belady, Charles Babbage Institute, University of Minnesota. Discusses his tenure as Vice President and Program Director of the Microelectronics and Computer Technology Corporation (MCC); as Chairman, CTO, and CEO of the Mitsubishi Electric Research Laboratories, In... | wikipedia |
wiki_14160_chunk_4 | Logical matrix | A permutation matrix is a (0, 1)-matrix, all of whose columns and rows each have exactly one nonzero element.
A Costas array is a special case of a permutation matrix.
An incidence matrix in combinatorics and finite geometry has ones to indicate incidence between points (or vertices) and lines of a geometry, blocks ... | wikipedia |
wiki_4231_chunk_16 | Truth function | Instead of using truth tables, logical connective symbols can be interpreted by means of an interpretation function and a functionally complete set of truth-functions (Gamut 1991), as detailed by the principle of compositionality of meaning.
Let I be an interpretation function, let Φ, Ψ be any two sentences and let the... | wikipedia |
wiki_37773_chunk_34 | Statistics education | Graduate coursework and programs
Only three universities currently offer graduate programs in statistics education: the University of Granada, the University of Minnesota, and the University of Florida. However, graduate students in a variety of disciplines (e.g., mathematics education, psychology, educational psycholo... | wikipedia |
wiki_9209_chunk_13 | Renewable Energy Certificate (United States) | Whereas air and water pollution travels across state and national boundaries irrespective of its origin, the value of RECs and the emergence of RECs markets depend very much on the markets created state by state through legislative action to mandate a Renewable Portfolio Standard. Such a balkanized approach to establis... | wikipedia |
wiki_4039_chunk_13 | Simplified Instructional Computer | Emulating the SIC System
Since the SIC and SIC/XE machines are not real machines, the task of actually constructing a SIC emulator is often part of coursework in a systems programming class. The purpose of SIC is to teach introductory-level systems programmers or collegiate students how to write and assemble code belo... | wikipedia |
wiki_1067_chunk_41 | Civil Service (United Kingdom) | Professions
The lingua franca is to describe civil servants, and in particular their grades, predominantly through a lens of administrative activity (as in the current structure of the table above), but in practice the civil service has, and always had, a number of subdivisions, with the Historic Grades having an addi... | wikipedia |
wiki_4415_chunk_1 | Embedded software | Manufacturers build embedded software into the electronics of cars, telephones, modems, robots, appliances, toys, security systems, pacemakers, televisions and set-top boxes, and digital watches, for example. This software can be very simple, such as lighting controls running on an 8-bit microcontroller with a few kilo... | wikipedia |
wiki_31260_chunk_3 | Sexological testing | What is expected of psychological measurements is "sufficient" accuracy and reliability, i.e. capability to express an indication or focus which clinicians can use as a "guideline" to rapidly and accurately deepen the aspects highlighted by the measurements and check them together with their patients. For this purpose,... | wikipedia |
wiki_410_chunk_3 | List of NATO reporting names for miscellaneous aircraft | Aero L-29 "Maya"
Antonov An-71 "Madcap"
Beriev A-50 "Mainstay"
Beriev Be-2 "Mote"
Beriev Be-4 "Mug"
Beriev Be-6 "Madge"
Beriev Be-8 "Mole"
Beriev Be-10 "Mallow"
Beriev Be-12 "Mail"
Beriev Be-40 "Mermaid"
Beriev MBR-2 "Mote"
Ilyushin Il-28U "Mascot"
Ilyushin Il-38 "May"
Ilyushin Il-78 "Midas"
Ilyushin Il-8... | wikipedia |
wiki_27_chunk_22 | Automatic number announcement circuit | Local numbers These are regular numbers within valid local exchanges in the communities listed. Many belong to competitive local exchange carriers or independent telephone company exchanges. Supposedly, a test call gives an automatic announcement. Some may announce caller ID instead of ANI; these will incur a toll (if ... | wikipedia |
wiki_1926_chunk_28 | Conservation biology | Conservation physiology was defined by Steven J. Cooke and colleagues as: "An integrative scientific discipline applying physiological concepts, tools, and knowledge to characterizing biological diversity and its ecological implications; understanding and predicting how organisms, populations, and ecosystems respond to... | wikipedia |
wiki_4142_chunk_22 | Ant colony optimization algorithms | Convergence
For some versions of the algorithm, it is possible to prove that it is convergent (i.e., it is able to find the global optimum in finite time). The first evidence of convergence for an ant colony algorithm was made in 2000, the graph-based ant system algorithm, and later on for the ACS and MMAS algorithms. ... | wikipedia |
wiki_34956_chunk_2 | Trapeze Software | 2013 Acquired Mentor Engineering Inc.
2011 Created Cultura Technologies, bringing together the acquired Agri-Food software businesses.
2010 Acquired BMS Computer Solutions Ltd, a provider of software to the Agriculture industry.
2010 Acquired AGRIS and ExtendAg product suites from John Deere Agri Services, ... | wikipedia |
wiki_2827_chunk_32 | Simplex algorithm | In 2014, it was proved that a particular variant of the simplex method is NP-mighty, i.e., it can be used to solve, with polynomial overhead, any problem in NP implicitly during the algorithm's execution. Moreover, deciding whether a given variable ever enters the basis during the algorithm's execution on a given inpu... | wikipedia |
wiki_20512_chunk_8 | Unicode equivalence | Example
{| class="wikitable" align="center" width="50%" style="text-align: center;"
|+ |Amélie with its two canonically equivalent Unicode forms (NFC and NFD)|- style="background-color:#ffeaea"
! style="width: 10em;" | NFC character
| | A || m || colspan="2" | é || l || i || e
|- style="background-color:#ffc6c6"
! NFC... | wikipedia |
wiki_24354_chunk_3 | Shapley–Shubik power index | There are some algorithms for calculating the power index, e.g., dynamic programming techniques, enumeration methods and Monte Carlo methods. Since Shapley and Shubik have published their paper, several axiomatic approaches have been used to mathematically study the Shapley–Shubik power index, with the anonymity axiom,... | wikipedia |
wiki_28036_chunk_4 | Clone (algebra) | Abstract clones
Philip Hall introduced the concept of abstract clone. An abstract clone is different from a concrete clone in that the set A is not given.
Formally, an abstract clone comprises
a set Cn for each natural number n,
elements k,n in Cn for all k ≤ n, and
a family of functions ∗:Cm × (Cn)m → Cn for all m ... | wikipedia |
wiki_38422_chunk_5 | Tensor software | Software for use with Maxima
Maxima is a free open source general purpose computer algebra system which includes several packages for tensor algebra calculations in its core distribution.
It is particularly useful for calculations with abstract tensors, i.e., when one wishes to do calculations without defining all comp... | wikipedia |
wiki_23470_chunk_1 | List of solar thermal power stations | Operational
{| class="wikitable sortable"
|+ Operational solar thermal power stations (of at least 50 MW capacity)
|-
!Name!!Country!!Location!!Coordinates
!Electrical capacity (MW)!!Technology type
!Storage hours!!Notes and references
|-
| Noor / Ouarzazate Solar Power Station || || Ghassate (Ouarzazate province) ||... | wikipedia |
wiki_16607_chunk_6 | Bruce Woodcock (computer games analyst) | Works
"An Analysis of MMOG Subscription Growth", MMOGCHART.COM, 2002 - 2008
"Confessions of an MMOG Cross-Dresser", The Escapist #77, December, 2006
"Is Rape Wrong on Azeroth?", The Escapist #69, October, 2006
"IGDA 2004 Persistent Worlds Whitepaper", contributor, January, 2005
"Illusions of Reality", Quanta #3,... | wikipedia |
wiki_35666_chunk_33 | Format-preserving encryption | Another mode was included in the draft NIST guidance but was removed before final publication. FF2 is VAES3 scheme for FFX: An addendum to "The FFX Mode of Operation for Preserving Encryption": A parameter collection for encipher strings of arbitrary radix with subkey operation to lengthen life of the enciphering key. ... | wikipedia |
wiki_6230_chunk_26 | Code injection | External links
Article "Three Ways to Inject Your Code into Another Process" by Robert Kuster
Article "Inject your code to a Portable Executable file" by A. Danehkar
Article "Injective Code inside Import Table" by A. Danehkar
Article "Defending against Injection Attacks through Context-Sensitive String Evaluation (... | wikipedia |
wiki_11900_chunk_5 | Software factory | Components
Software factories are unique and therefore contain a unique set of assets designed to help build a specific type of application. In general, most software factories contain interrelated assets of the following types:
Factory Schema: A document that categorizes and summarizes the assets used to build and ma... | wikipedia |
wiki_2113_chunk_9 | Validity (statistics) | A test has content validity built into it by careful selection of which items to include (Anastasi & Urbina, 1997). Items are chosen so that they comply with the test specification which is drawn up through a thorough examination of the subject domain. Foxcroft, Paterson, le Roux & Herbst (2004, p. 49)<ref>Foxcroft, ... | wikipedia |
wiki_3849_chunk_5 | Tiny Encryption Algorithm | void decrypt (uint32_t v[2], const uint32_t k[4]) {
uint32_t v0=v[0], v1=v[1], sum=0xC6EF3720, i; /* set up; sum is (delta << 5) & 0xFFFFFFFF */
uint32_t delta=0x9E3779B9; /* a key schedule constant */
uint32_t k0=k[0], k1=k[1], k2=k[2], k3=k[3]; /* cache key */
for (i=0; i<32; i+... | wikipedia |
wiki_26097_chunk_2 | Lesk algorithm | A frequently used example illustrating this algorithm is for the context "pine cone". The following dictionary definitions are used:
PINE
1. kinds of evergreen tree with needle-shaped leaves
2. waste away through sorrow or illness CONE
1. solid body which narrows to a point
2. something of this shape whether so... | wikipedia |
wiki_4506_chunk_3 | De Casteljau's algorithm | An example implementation of De Casteljau's algorithm in Python:
def de_casteljau(t, coefs):
beta = [c for c in coefs] # values in this list are overridden
n = len(beta)
for j in range(1, n):
for k in range(n - j):
beta[k] = beta[k] * (1 - t) + beta[k + 1] * t
return beta[0] An examp... | wikipedia |
wiki_16591_chunk_3 | Pathfinder network | Example
Here is an example of an undirected pathfinder network derived from average similarity ratings of a group of biology graduate students. The students rated the relatedness of all pairs of the terms shown, and the mean rating for each pair was computed. The network shown is the PFnet(2, ∞). | wikipedia |
wiki_8919_chunk_1 | Computerworld Smithsonian Award | Winners
1989 - Inaugural winners, all listed: Bell & Howell's Image Plus Search System; Orangeburg School District 5, Orangeburg, South Carolina; Passaic River Basin Early Flood Warning System, Sierra-Micro Inc.; FIX and FAST, Fidelity Investments; The Missing Children Project, University of Illinois; BI Home Escort S... | wikipedia |
wiki_6115_chunk_4 | Royal Meteorological Society | Atmospheric Science Letters: a monthly magazine that provides a peer reviewed publication route for new shorter contributions in the field of atmospheric and closely related sciences.
Weather: a monthly magazine with many full colour illustrations and photos for specialists and general readers with an interest in mete... | wikipedia |
wiki_33081_chunk_7 | DiaGrid (distributed computing network) | http://www.dia-grid.org
https://www.youtube.com/watch?v=CH_YHGYQl2g
http://campustechnology.com/articles/2009/07/22/campus-technology-innovators-awards-2009-high-performance-computing.aspx
http://markets.hpcwire.com/taborcomm.hpcwire/?GUID=10770002&Page=MediaViewer&ChannelID=3198
http://cloudcomputing.sys-con.com/node/... | wikipedia |
wiki_22091_chunk_5 | Peter Baumann (computer scientist) | Awards and patents (source: Peter Baumann's homepage) Copernicus Masters Competition 2014: >Winner, Big Data Challenge
Open Geospatial Consortium Kenneth Gardels Award 2014
Geospatial World Forum Innovation Award 2013
Innovationspreis Mittelstand 2012, category: Best of Open Source
European IT Prize 1998
Jos Schep... | wikipedia |
wiki_21685_chunk_9 | Connected Mathematics | Research findings
Connected Mathematics has become the most widely used of middle school curriculum materials developed to implement the NCTM Standards. Effects of its use have been described in expository journal articles and evaluated in mathematics education research projects. Many of the research studies are mas... | wikipedia |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.