id stringlengths 14 20 | title stringlengths 4 131 | text stringlengths 52 43k | source stringclasses 1
value |
|---|---|---|---|
wiki_15922_chunk_0 | List of MeSH codes (B05) | The following is a partial list of the "B" codes for Medical Subject Headings (MeSH), as defined by the United States National Library of Medicine (NLM). This list continues the information at List of MeSH codes (B04). Codes following these are found at List of MeSH codes (B06). For other MeSH codes, see List of MeSH c... | wikipedia |
wiki_26054_chunk_29 | Dalian Software Park | In Dalian Software Park
Built and managed by Dalian Software Co., Ltd.
American companies: Accenture, Fidelity Investments, Genpact (a GE company), HP, IBM, Oracle Corporation, Cisco, Symantec, Netapp, etc.
Chinese companies: China Software & Service (CS&S), Neusoft Group, Neusoft Institute of Information, New Touch, ... | wikipedia |
wiki_6529_chunk_3 | NL (complexity) | NL-complete problems
Several problems are known to be NL-complete under log-space reductions, including ST-connectivity and 2-satisfiability. ST-connectivity asks, for nodes S and T in a directed graph, whether T is reachable from S. 2-satisfiability asks, given a propositional formula of which each clause is the disj... | wikipedia |
wiki_3421_chunk_2 | Piecewise linear function | Other examples of piecewise linear functions include the absolute value function, the sawtooth function, and the floor function. Fitting to a curve An approximation to a known curve can be found by sampling the curve and interpolating linearly between the points. An algorithm for computing the most significant points s... | wikipedia |
wiki_9794_chunk_4 | Powerhouse (TV series) | Episode list
"With a Little Help From My Friends (Part 1)": Brenda Gaines inherits her late father's gym, Powerhouse, intending to convert it into a youth center. She receives help from Jennifer LaBianca, Kevin Jackson, Tony Dominguez, Lolo Knopke, and Pepper McKenzie, but their efforts are threatened by a gang led by... | wikipedia |
wiki_26525_chunk_16 | Materials science in science fiction | In the video game Fallout 3, one of the consumable items is called the "Nuka-Cola Quantum", which supposedly gets its unique properties from the addition of strontium-90 in its formula.
|A dirty bomb containing strontium-90 is a potential terrorist weapon.
|-
|Thallium
|Protector and other Larry Niven works set in Know... | wikipedia |
wiki_9207_chunk_10 | Phonological history of English close back vowels | {| cellspacing="0" cellpadding="0"
|-
| style="width:9em"|
| style="width:3em" valign="center"|
| style="width:3em"|
| style="width:3em"|
| style="width:3em"|
| style="width:3em" |
|
|- style="text-align:center"
|
| moodgoosetooth
| goodfootbook
| bloodfloodbrother
| cutdullfun
| putfullsugar
|- style="text-align:cente... | wikipedia |
wiki_20621_chunk_6 | Evergreen (software) | Evergreen's features include:
Circulation: for staff to check items in and out to patrons
Cataloging: to add items to the library's collection and input information, classifying and indexing those items. Evergreen is known for an extremely flexible indexing system that allows for a high level of customization and by... | wikipedia |
wiki_33193_chunk_19 | Combinatorics on words | Considered problems
One problem considered in the study of combinatorics on words in group theory is the following: for two elements x,y of a semigroup, does x=y modulo the defining relations of x and y. Post and Markov studied this problem and determined it undecidable. Undecidable means the theory cannot be proved.... | wikipedia |
wiki_6311_chunk_11 | Code reuse | Systematic software reuse is a strategy for increasing productivity and improving the quality of the software industry. Although it is simple in concept, successful software reuse implementation is difficult in practice. A reason put forward for this is the dependence of software reuse on the context in which it is imp... | wikipedia |
wiki_28484_chunk_7 | Annotated Code of Maryland | Named articles
The following is a list of the 36 named articles of the code, with the year of enactment of each. Multiple entries mean that an article was enacted in stages.
Agriculture (1973)
Alcoholic Beverages (2016)
Business Occupations and Professions (1989)
Business Regulation (1992)
Commercial Law (1975)
Corpora... | wikipedia |
wiki_7456_chunk_6 | Mode (statistics) | The following MATLAB (or Octave) code example computes the mode of a sample: X = sort(x); % x is a column vector dataset
indices = find(diff([X; realmax]) > 0); % indices where repeated values change
[modeL,i] = max (diff([0; indices])); % longest persistence length of repeated val... | wikipedia |
wiki_4594_chunk_2 | Rapid single flux quantum | An SFQ pulse is produced when magnetic flux through a superconducting loop containing a Josephson junction changes by one flux quantum, Φ0 as a result of the junction switching. SFQ pulses have a quantized area ʃV(t)dt = Φ0 ≈ = 2.07 mV⋅ps = 2.07 mA⋅pH due to magnetic flux quantization, a fundamental property of superc... | wikipedia |
wiki_12803_chunk_29 | Science, technology, engineering, and mathematics | An exhaustive list of STEM disciplines does not exist because the definition varies by organization. The U.S. Immigration and Customs Enforcement lists disciplines including architecture, physics, actuarial science, chemistry, biology, mathematics, applied mathematics, statistics, computer science, computational scienc... | wikipedia |
wiki_11673_chunk_6 | Cognitive robotics | Some researchers in cognitive robotics have tried using architectures such as (ACT-R and Soar (cognitive architecture)) as a basis of their cognitive robotics programs. These highly modular symbol-processing architectures have been used to simulate operator performance and human performance when modeling simplistic and... | wikipedia |
wiki_35806_chunk_11 | Advanced Telescope for High Energy Astrophysics | Athena science goals
The "Hot and Energetic Universe" science theme revolves around two fundamental questions in astrophysics: How does ordinary matter assemble into the large-scale structures that we see today? And how do black holes grow and shape the Universe? Both questions can only be answered using a sensitive ... | wikipedia |
wiki_15198_chunk_3 | Ab initio quantum chemistry methods | One needs to consider the computational cost of ab initio methods when determining whether they are appropriate for the problem at hand. When compared to much less accurate approaches, such as molecular mechanics, ab initio methods often take larger amounts of computer time, memory, and disk space, though, with modern ... | wikipedia |
wiki_26180_chunk_15 | Physical unclonable function | In 2015, some studies claimed it is possible to attack certain kinds of PUFs with low-cost equipment in a matter of milliseconds. A team at Ruhr Universität of Bochum, Germany demonstrated a method to create a model of XOR Arbiter PUFs and thus be able to predict their response to any kind of challenge. Their method re... | wikipedia |
wiki_1303_chunk_9 | Generic programming | A broad survey of genericity mechanisms in programming languages follows. For a specific survey comparing suitability of mechanisms for generic programming, see. In object-oriented languages When creating container classes in statically typed languages, it is inconvenient to write specific implementations for each data... | wikipedia |
wiki_15092_chunk_8 | Rugged computer | Standards
MIL-STD-810: Specifically MIL-STD-810G CN1 (2014), a military standard, issued in 1962, which establishes a set of tests for determining equipment suitability to military operations. Often used as a reference in the commercial laptop industry.
MIL-STD-461: A United States Military Standard that describes ho... | wikipedia |
wiki_24940_chunk_41 | Network motif | G-Tries
In 2010, Pedro Ribeiro and Fernando Silva proposed a novel data structure for storing a collection of sub-graphs, called a g-trie. This data structure, which is conceptually akin to a prefix tree, stores sub-graphs according to their structures and finds occurrences of each of these sub-graphs in a larger graph... | wikipedia |
wiki_3403_chunk_1 | Amoeba (operating system) | Overview
The goal of the Amoeba project was to construct an operating system for networks of computers that would present the network to the user as if it were a single machine. An Amoeba network consists of a number of workstations connected to a "pool" of processors, and executing a program from a terminal causes it ... | wikipedia |
wiki_1166_chunk_13 | Maple (software) | Solve equations numerically
The following code numerically calculates the roots of a high-order polynomial:
f := x^53-88*x^5-3*x-5 = 0 fsolve(f) -1.097486315, -.5226535640, 1.099074017 The same command can also solve systems of equations:
f := (cos(x+y))^2 + exp(x)*y+cot(x-y)+cosh(z+x) = 0: | wikipedia |
wiki_21351_chunk_7 | Inter-American Biodiversity Information Network | The Thematic Networks, or TNs, are intended to lead the development of theme-specific standards and protocols and in the maintenance of hemisphere-wide networks of specialists and specialized institutions. In each case a Coordinating Institution has signed a memorandum of understanding with the IEC to lead the work of ... | wikipedia |
wiki_34155_chunk_10 | Arithmetic circuit complexity | The state of the art is a lower bound for the size of a circuit computing, e.g., the polynomial given by Strassen and by Baur and Strassen. More precisely, Strassen used Bézout's lemma to show that any circuit that simultaneously computes the polynomials is of size and later Baur and Strassen showed the following:... | wikipedia |
wiki_27675_chunk_8 | Social network aggregation | Applications in marketing
Social network aggregators are a powerful tool in marketing. They appear to be an efficient way to have an organized view of the content to get a better insight into the market. The needs about them are real: a study provided by eMarketer shows that 43% of marketers are complaining about a sig... | wikipedia |
wiki_8382_chunk_5 | National Agricultural Statistics Service | Producers, farm organizations, agribusinesses, lawmakers and government agencies all rely on the information produced by NASS. For instance:
Statistical information on acreage, production, stocks, prices and value is essential for the smooth operation of federal farm programs.
Agricultural data are indispensable for p... | wikipedia |
wiki_7072_chunk_6 | Nested function | Quicksort
A more realistic example is this implementation of quicksort:
void sort(int *items, int size) {
void quickSort(int first, int last) {
void swap(int p, int q) {
int tmp = items[p];
items[p] = items[q];
items[q] = tmp;
}
int partition() {
... | wikipedia |
wiki_8463_chunk_19 | Archaeological theory | The impact of ideology
Archaeology has been and remains a cultural, gender and political battlefield. Many groups have tried to use archaeology to prove some current cultural or political point. Marxist or Marxist-influenced archaeologists in the USSR and the UK (among others) often try to prove the truth of dialectica... | wikipedia |
wiki_11412_chunk_3 | Calculus on Manifolds (book) | ReceptionCalculus on Manifolds aims to present the topics of multivariable and vector calculus in the manner in which they are seen by a modern working mathematician, yet simply and selectively enough to be understood by undergraduate students whose previous coursework in mathematics comprises only one-variable calculu... | wikipedia |
wiki_8497_chunk_14 | Computerized adaptive testing | Components There are five technical components in building a CAT (the following is adapted from Weiss & Kingsbury, 1984 ). This list does not include practical issues, such as item pretesting or live field release. Calibrated item pool
Starting point or entry level
Item selection algorithm
Scoring procedure
Termin... | wikipedia |
wiki_29242_chunk_16 | Airborne Networking | Fighter Platforms
An airborne fighter platform flight profile includes periods of stable flight patterns and dynamic maneuvers at high speeds. Its relatively small size limits the amount of space available for mounting antennas and installing equipment. It will be employed as part of a strike package or combat air pa... | wikipedia |
wiki_51_chunk_13 | Biostatistics | Experimental design
Experimental designs sustain those basic principles of experimental statistics. There are three basic experimental designs to randomly allocate treatments in all plots of the experiment. They are completely randomized design, randomized block design, and factorial designs. Treatments can be arrange... | wikipedia |
wiki_24707_chunk_3 | Reactive programming | Several popular approaches are employed in the creation of reactive programming languages. Specification of dedicated languages that are specific to various domain constraints. Such constraints usually are characterized by real-time, embedded computing or hardware description. Another approach involves the specificatio... | wikipedia |
wiki_15182_chunk_3 | Joint Policy Board for Mathematics | JPBM Communications Award winners
2022: Talithia Williams
2021: John Bailer, Richard Campbell, Rosemary Pennington, and Erica Klarreich
2020: Christopher Budd and James Tanton
2019: Margot Lee Shetterly
2018: Vi Hart and Matt Parker
2017: Siobhan Roberts, for Expository and Popular Books, and Arthur T. Benjamin, for Pu... | wikipedia |
wiki_33655_chunk_10 | Wind power in New York | On September 8, 2011, the New York Power Authority, Long Island Power Authority, and Con Edison (the Offshore Wind Collaborative) filed a request with the US Department of the Interior, Bureau of Ocean Energy Management (BOEM) to issue a commercial lease on the outer continental shelf to the New York Power Authority fo... | wikipedia |
wiki_8599_chunk_2 | Future-proof | In future-proof electrical systems, buildings should have "flexible distribution systems to allow communication technologies to expand., Image-related processing software should be flexible, adaptable, and programmable to be able to work with several different potential media in the future as well as to handle increasi... | wikipedia |
wiki_15836_chunk_0 | List of MeSH codes (E04) | The following is a partial list of the "E" codes for Medical Subject Headings (MeSH), as defined by the United States National Library of Medicine (NLM). This list continues the information at List of MeSH codes (E03). Codes following these are found at List of MeSH codes (E05). For other MeSH codes, see List of MeSH c... | wikipedia |
wiki_39880_chunk_3 | Semel Institute for Neuroscience and Human Behavior | Integrative Phenotyping Center for Neuropsychiatry
The institute plans to use a $14.9 million stimulus grant to create "The Integrative Phenotyping Center for Neuropsychiatry", a new interdisciplinary research center focused on the role of genetic and environmental factors in neuropsychiatric and behavioral disorders. ... | wikipedia |
wiki_17285_chunk_14 | Hopcroft–Karp algorithm | Non-bipartite graphs
The same idea of finding a maximal set of shortest augmenting paths works also for finding maximum cardinality matchings in non-bipartite graphs, and for the same reasons the algorithms based on this idea take phases. However, for non-bipartite graphs, the task of finding the augmenting paths with... | wikipedia |
wiki_2803_chunk_7 | Modeling language | Algebraic
Algebraic Modeling Languages (AML) are high-level programming languages for describing and solving high complexity problems for large scale mathematical computation (i.e. large scale optimization type problems). One particular advantage of AMLs like AIMMS, AMPL, GAMS, Mosel, OPL and OptimJ is the similarity... | wikipedia |
wiki_19831_chunk_6 | Artificial intelligence systems integration | Many online communities for A.I. developers exist where tutorials, examples, and forums aim at helping both beginners and experts build intelligent systems (for example the AI Depot, Generation 5). However, few communities have succeeded in making a certain standard or a code of conduct popular to allow the large colle... | wikipedia |
wiki_7943_chunk_9 | Paul Seymour (mathematician) | In the 2010s Seymour worked mainly on χ-boundedness and the Erdős–Hajnal conjecture. In a series of papers with Alex Scott and partly with Chudnovsky, they proved two conjectures of András Gyárfás, that every graph with bounded clique number and sufficiently large chromatic number has an induced cycle of odd length at ... | wikipedia |
wiki_372_chunk_42 | Microcode | Writable Instruction Set Computer
Capacitor Read-only Store
Transformer Read-only Store
A Brief History of Microprogramming
Intel processor microcode security update (fixes the issues when running 32-bit virtual machines in PAE mode)
Notes on Intel Microcode Updates, March 2013, by Ben Hawkes, archived from the or... | wikipedia |
wiki_22565_chunk_17 | History of biochemistry | Since then, biochemistry has advanced, especially since the mid-20th century, with the development of new techniques such as chromatography, X-ray diffraction, NMR spectroscopy, radioisotopic labelling, electron microscopy and molecular dynamics simulations. These techniques allowed for the discovery and detailed analy... | wikipedia |
wiki_31281_chunk_1 | Newcastle University Faculty of Science, Agriculture and Engineering | School of Computing
School of Engineering
School of Mathematics, Statistics and Physics
School of Natural and Environmental Sciences Research and degrees
The faculty offers over sixty undergraduate degrees, postgraduate degrees and research opportunities. Research funding sources include: The Biotechnology and Biol... | wikipedia |
wiki_9975_chunk_4 | N400 (neuroscience) | An example of an experimental task used to study the N400 is a priming paradigm. Subjects are shown a list of words in which a prime word is either associatively related to a target word (e.g. bee and honey), semantically related (e.g. sugar and honey) or a direct repetition (e.g. honey and honey). The N400 amplitude s... | wikipedia |
wiki_71_chunk_20 | Bayesian probability | Indeed, some Bayesians have argued the prior state of knowledge defines the (unique) prior probability-distribution for "regular" statistical problems; cf. well-posed problems. Finding the right method for constructing such "objective" priors (for appropriate classes of regular problems) has been the quest of statistic... | wikipedia |
wiki_17578_chunk_7 | Developmental cognitive neuroscience | Tools and techniques employed
Absolutely critical to being able to understand brain function in children have been neuroimaging techniques, first EEG & ERPs, then fMRI, and more recently NIRS, MEG, & TMS that look at function and MRI, DTI, & MRS that look at structure, connectivity, and metabolism. Before functional n... | wikipedia |
wiki_1521_chunk_58 | Sampling (statistics) | Formulas, tables, and power function charts are well known approaches to determine sample size. Steps for using sample size tables
Postulate the effect size of interest, α, and β.
Check sample size table
Select the table corresponding to the selected α
Locate the row corresponding to the desired power
Locate the c... | wikipedia |
wiki_30340_chunk_4 | UNSW Faculty of Engineering | MyUniversity is an Australian Government website providing information about Australian universities. As data is collected from different sources, percentages may collate to over 100%. Information is provided university wide, and on select disciplines. Results for all Engineering disciplines are listed below.
Aerosp... | wikipedia |
wiki_19313_chunk_24 | Hadamard code | Let be the codeword in corresponding to message . Let be the generator matrix of . By definition, . From this, . By the construction of , . Therefore, by substitution, . Proof of theorem 1 To prove theorem 1 we will construct a decoding algorithm and prove its correctness. Algorithm
Input: Received word For each :
... | wikipedia |
wiki_31651_chunk_6 | Functional flow block diagram | These diagrams are used both to develop requirements and to identify profitable trade studies. For example, does the spacecraft antenna acquire the tracking and data relay satellite (TDRS) only when the payload data are to be transmitted, or does it track TDRS continually to allow for the reception of emergency command... | wikipedia |
wiki_8121_chunk_15 | Asynchronous circuit | Disadvantages
Area overhead caused by additional logic implementing handshaking. In some cases an asynchronous design may require up to double the resources (area, circuit speed, power consumption) of a synchronous design, due to addition of completion detection and design-for-test circuits.
Compared to a synchronous... | wikipedia |
wiki_14234_chunk_3 | Health ecology | Eco health approaches as currently practiced are participatory, systems-based approaches to understanding and promoting health and wellbeing in the context of social and ecological interactions. What differentiates these approaches from earlier integrative attempts is a firm grounding in complexity theories and post-no... | wikipedia |
wiki_28756_chunk_11 | Computational creativity | Combinatorial creativity
A great deal, perhaps all, of human creativity can be understood as a novel combination of pre-existing ideas or objects. Common strategies for combinatorial creativity include:
Placing a familiar object in an unfamiliar setting (e.g., Marcel Duchamp's Fountain) or an unfamiliar object in a fam... | wikipedia |
wiki_19904_chunk_14 | Paleontological Research Institution | The Teacher-Friendly Guide series
The Teacher-Friendly Guide series published by PRI provides information for grades 6-9 teachers and includes guides for climate change, geology, and evolution in bivalves and maize. Teacher-Friendly Guides to Earth Sciences cover six US regions (the Northeast, Southeast, Midwest, West,... | wikipedia |
wiki_83_chunk_23 | Computational linguistics | Some projects are still trying to solve the problem which first started computational linguistics off as its field in the first place. However, methods have become more refined, and consequently, the results generated by computational linguists have become more enlightening. To improve computer translation, several mod... | wikipedia |
wiki_16241_chunk_11 | Functional completeness | The following are the minimal functionally complete sets of logical connectives with arity ≤ 2: One element {↑}, {↓}.
Two elements , , , , , , , , , , , , , , , , ,
Three elements , , , , , There are no minimal functionally complete sets of more than three at most binary logical connectives. In order to keep the lists... | wikipedia |
wiki_5422_chunk_28 | Envelope (mathematics) | Partial differential equations
Envelopes can be used to construct more complicated solutions of first order partial differential equations (PDEs) from simpler ones. Let F(x,u,Du) = 0 be a first order PDE, where x is a variable with values in an open set Ω ⊂ Rn, u is an unknown real-valued function, Du is the gradient... | wikipedia |
wiki_27877_chunk_5 | Morphological dictionary | Sample data from SMOR (German SFST grammar):<Base_Stems>Aachen<NN><base><nativ><Name-Neut_s> <Base_Stems>Aal<NN><base><nativ><NMasc_es_e> <Base_Stems>Aarau<NN><base><nativ><Name-Neut_s> | wikipedia |
wiki_9554_chunk_4 | Heun function | {| class="wikitable"
|+Forms of the Heun Equation
|-
! Form !! Singularities !! Equation
|-
| General
| 0, 1, a, ∞
|
|-
| Confluent
| 0, 1, ∞ (irregular, rank 1)
|
|-
| Doubly Confluent
| 0 (irregular, rank 1), ∞ (irregular, rank 1)
|
|-
| Biconfluent
| 0, ∞ (irregular, rank 2)
|
|-
| Triconfluent
| ∞ (irregular, ... | wikipedia |
wiki_20887_chunk_20 | Wind power forecasting | Statistical models include linear and non-linear models, but also structural and black-box types of models. Structural models rely on the analyst's expertise on the phenomenon of interest while black-box models require little subject-matter knowledge and are constructed from data in a fairly mechanical way. Concerning ... | wikipedia |
wiki_36737_chunk_10 | Computational complexity of matrix multiplication | Henry Cohn, Robert Kleinberg, Balázs Szegedy and Chris Umans put methods such as the Strassen and Coppersmith–Winograd algorithms in an entirely different group-theoretic context, by utilising triples of subsets of finite groups which satisfy a disjointness property called the triple product property (TPP). They also g... | wikipedia |
wiki_38465_chunk_0 | Dubai Statistics Center | Dubai Statistics Center specializes in the construction of a modern and comprehensive statistical system and shall be the only official source for the collection, analysis and publication of statistical information and data in the Emirate of Dubai (UAE) adopting harmonized methodological international standards in the... | wikipedia |
wiki_4480_chunk_9 | Affine plane (incidence geometry) | An alternate view of affine translation planes can be obtained as follows: Let be a -dimensional vector space over a field . A spread of is a set of -dimensional subspaces of that partition the non-zero vectors of . The members of are called the components of the spread and if and are distinct components then . ... | wikipedia |
wiki_2015_chunk_53 | Computer Go | Extensive list of computer Go events
All systems Go by David A. Mechner (1998), discusses the game where professional Go player Janice Kim won a game against program Handtalk after giving a 25-stone handicap.
Kinger, Tim and Mechner, David. An Architecture for Computer Go (1996)
Computer Go and Computer Go Programm... | wikipedia |
wiki_23974_chunk_9 | Convex hull algorithms | Akl–Toussaint heuristic
The following simple heuristic is often used as the first step in implementations of convex hull algorithms to improve their performance. It is based on the efficient convex hull algorithm by Selim Akl and G. T. Toussaint, 1978. The idea is to quickly exclude many points that would not be part ... | wikipedia |
wiki_37693_chunk_2 | Term (logic) | Given a set V of variable symbols, a set C of constant symbols and sets Fn of n-ary function symbols, also called operator symbols, for each natural number n ≥ 1, the set of (unsorted first-order) terms T is recursively defined to be the smallest set with the following properties:
every variable symbol is a term: V ⊆ ... | wikipedia |
wiki_38878_chunk_2 | Physics Instructional Resource Association | PIRA has also generated a subset of this list called the PIRA 200. These 200 demonstrations are the recommended basic collection for any physics department. See also
Scientific demonstration References External links
Official PIRA website
American Association of Physics Teachers web page
AAPT sponsored events Ph... | wikipedia |
wiki_39528_chunk_11 | Post-quantum cryptography | In some versions of Ring-LWE there is a security reduction to the shortest-vector problem (SVP) in a lattice as a lower bound on the security. The SVP is known to be NP-hard. Specific ring-LWE systems that have provable security reductions include a variant of Lyubashevsky's ring-LWE signatures defined in a paper by G... | wikipedia |
wiki_2151_chunk_23 | D (programming language) | Metaprogramming
Metaprogramming is supported through templates, compile-time function execution, tuples, and string mixins. The following examples demonstrate some of D's compile-time features. Templates in D can be written in a more imperative style compared to the C++ functional style for templates. This is a regular... | wikipedia |
wiki_18128_chunk_6 | Symposium on Logic in Computer Science | 2013
Leo Bachmair, Harald Ganzinger, Uwe Waldmann, "Set constraints are the monadic class"
André Joyal, Mogens Nielson, Glynn Winskel, "Bisimulation and open maps"
Benjamin C. Pierce, Davide Sangiorgi, "Typing and subtyping for mobile processes" 2014
Martin Hofmann, Thomas Streicher, "The groupoid model refutes uniqu... | wikipedia |
wiki_36747_chunk_16 | Associació d'Usuaris de Java de Catalunya | The second "Jornades Java Catalanes" was celebrated at the "Sala de Congressos del Parc d'Innovació La Salle", located at the university campus of the given university, in 14th and 15 April in 2005. The sponsors of this event were: Bea Systems
Borland
Caixa Penedès
Data.ti
Oracle Corporation
Steria
Sun MicroSystems The... | wikipedia |
wiki_28494_chunk_5 | Sawtooth Software | In addition to producing products, Sawtooth Software has also hosted a research conference every 18 months in the United States since 1987. The conference is not a sales event, and speakers with contrary opinions or competing products attend and present. References External links
Sawtooth Software Homepage Companies ba... | wikipedia |
wiki_19298_chunk_7 | 1950–51 United States network television schedule | CBSReturning SeriesThe Alan Young Show
Arthur Godfrey and His Friends
Arthur Godfrey's Talent Scouts
Beat the Clock
Big Top
CBS Television News
Celebrity Time
The Faye Emerson Show
Ford Theater
The Fred Waring Show
The Garry Moore Show
The Gene Autry Show
The Goldbergs
Joey Faye's Frolics
The Ken Murray Show
Mama
Man A... | wikipedia |
wiki_21457_chunk_2 | Atmospheric chemistry observational databases | Airborne observations
Aircraft observations. Many aircraft campaigns have been conducted as part of the Suborbital Science Program and by the Earth Science Project Office an overview of these campaigns is available. The data can be accessed from the Earth Science Project Office archives.
MOZAIC observations. The MOZA... | wikipedia |
wiki_37418_chunk_3 | Project Mathematics! | Video module descriptions
A total of nine educational video modules were created between 1988 and 2000. Another two modules, Teachers Workshop and Project MATHEMATICS! Contest, were created in 1991 for teachers and are only available on videotape. The content of the nine educational modules follows below. The Theorem o... | wikipedia |
wiki_33625_chunk_11 | Environmental engineering science | "MIT Course Catalog: Department of Civil and Environmental Engineering." Massachusetts Institute of Technology. <http://web.mit.edu/catalogue/degre.engin.civil.shtml>. 2008-2009 Announcement. Brochure. Berkeley, 2008. Engineering Announcement 2008-2009. University of California, Berkeley. <https://web.archive.org/web/2... | wikipedia |
wiki_28251_chunk_48 | Functional hypothalamic amenorrhea | Psychological assessment
Patients with FHA should be screened for the presence of modifiable Axis I (mood) disorders or modified Axis II (personality) disorders and referred to appropriate psychiatric care where they can receive psychological support, such as CBT. This is especially true when psychological disorders (... | wikipedia |
wiki_4915_chunk_15 | Data modeling | These models are being used in the first stage of information system design during the requirements analysis to describe information needs or the type of information that is to be stored in a database. The data modeling technique can be used to describe any ontology (i.e. an overview and classifications of used terms a... | wikipedia |
wiki_1921_chunk_18 | Permanent (mathematics) | MacMahon's Master Theorem Another way to view permanents is via multivariate generating functions. Let be a square matrix of order n. Consider the multivariate generating function: The coefficient of in is perm(A). As a generalization, for any sequence of n non-negative integers, define:
as the coefficient of inM... | wikipedia |
wiki_1763_chunk_29 | Computer-assisted language learning | The emergence of the World Wide Web (now known simply as "the Web") in the early 1990s marked a significant change in the use of communications technology for all computer users. Email and other forms of electronic communication had been in existence for many years, but the launch of Mosaic, the first graphical Web bro... | wikipedia |
wiki_2158_chunk_23 | Lock (computer science) | Programming languages vary in their support for synchronization:
Ada provides protected objects that have visible protected subprograms or entries as well as rendezvous.
The ISO/IEC C standard provides a standard mutual exclusion (locks) API since C11. The current ISO/IEC C++ standard supports threading facilities si... | wikipedia |
wiki_83_chunk_17 | Computational linguistics | Theoretical approaches to the structure of languages have also been developed. These works allow computational linguistics to have a framework within which to work out hypotheses that will further the understanding of the language in a myriad of ways. One of the original theoretical theses on the internalization of gra... | wikipedia |
wiki_3964_chunk_8 | Facilities engineering | Day to Day Operations
Operations Engineer
Ensure a company’s operations are working properly
Inspect operations, equipment and machinery
Plan for maintenance and upgrade machinery
Reduce or protect the company’s product from defects
Specialist Engineer
Running diagnostics and test on specific machinery
Determining t... | wikipedia |
wiki_599_chunk_18 | International Obfuscated C Code Contest | /*
+
+
+
+
[ >i>n[t
*/ #include<stdio.h>
/*2w0,1m2,]_<n+a m+o>r>i>... | wikipedia |
wiki_19545_chunk_10 | Circuit complexity | The k-clique problem is to decide whether a given graph on n vertices has a clique of size k. For any particular choice of the constants n and k, the graph can be encoded in binary using bits, which indicate for each possible edge whether it is present. Then the k-clique problem is formalized as a function such that ... | wikipedia |
wiki_5957_chunk_28 | Robert Taylor (computer scientist) | The New Old Boys From the ARPAnet Extract from 'Tools for Thought' by Howard Rheingold
1984 ACM Software Systems Award citation
1994 ACM Fellow citation
2004 Draper Prize citation 1932 births
2017 deaths
American computer scientists
Digital Equipment Corporation people
Xerox people
Internet pioneers
Scientists at PA... | wikipedia |
wiki_19867_chunk_3 | K correction | The exact nature of the calculation that needs to be applied in order to perform a K correction depends upon the type of filter used to make the observation and the shape of the object's spectrum. If multi-color photometric measurements are available for a given object thus defining its spectral energy distribution (SE... | wikipedia |
wiki_3190_chunk_23 | Computer-aided dispatch | Another problem comes from technologies using differing datums or coordinate systems. For example, suppose your AVL system uses degrees-decimal degrees format. The AVL display for a vehicle at the Heart Butte Post Office in Montana shows a latitude and longitude of 48.28333 N, -112.83583 W. The CAD system uses degrees-... | wikipedia |
wiki_4084_chunk_2 | FSF Free Software Awards | This is annually presented by the Free Software Foundation (FSF) to a person whom it deems to have made a great contribution to the progress and development of free software, through activities that accord with the spirit of free software. Winners
Source: Award for the Advancement of Free Software 1998 Larry Wall
for... | wikipedia |
wiki_4466_chunk_28 | E8 (mathematics) | The 248-dimensional adjoint representation of E8 may be considered in terms of its restricted representation to the first of these subgroups. It transforms under E7×SU(2) as a sum of tensor product representations, which may be labelled as a pair of dimensions as (3,1) + (1,133) + (2,56) (since there is a quotient in t... | wikipedia |
wiki_3498_chunk_19 | Spline (mathematics) | Representations and Names
For a given interval [a,b] and a given extended knot vector on that interval, the splines of degree n form a vector space. Briefly this means that adding any two splines of a given type produces spline of that given type, and multiplying a spline of a given type by any constant produces a spl... | wikipedia |
wiki_6802_chunk_8 | Codex Mendoza | Content
Written on European paper, it contains 71 pages, divided into three sections:
Section I, folios 1r to 17r or 18r, is a history of the Aztec people from 1325 through 1521 — from the founding of Tenochtitlan through the Spanish conquest. It lists the reign of each ruler and the towns conquered by them. It is unc... | wikipedia |
wiki_5352_chunk_3 | Rainflow-counting algorithm | Igor Rychlik gave a mathematical definition for the rainflow counting method, thus enabling closed-form computations from the statistical properties of the load signal. Algorithms There are a number of different algorithms for identifying the rainflow cycles within a sequence. They all find the closed cycles and may be... | wikipedia |
wiki_4663_chunk_29 | Boyer–Moore string-search algorithm | def good_suffix_table(S: str) -> List[int]:
"""
Generates L for S, an array used in the implementation of the strong good suffix rule.
L[i] = k, the largest position in S such that S[i:] (the suffix of S starting at i) matches
a suffix of S[:k] (a substring in S ending at k). Used in Boyer-Moore, L give... | wikipedia |
wiki_30757_chunk_14 | Comparison of programming languages (list comprehension) | Mythryl s = [ 2*i for i in 1..100 where i*i > 3 ]; Multiple generators: pyth = [ (x,y,z) for x in 1..20 for y in x..20 for z in y..20 where x*x + y*y == z*z ]; Nemerle $[x*2 | x in [0 .. 100], x*x > 3] Nim Nim has built-in seq, set, table and object comprehensions on the sugar standard library module: import sugar | wikipedia |
wiki_16584_chunk_29 | National Academy of Engineering | Grand Challenge Scholars Program (GCSP)
In 2010, NAE developed a plan for preparing engineering students at the undergraduate academic degree level to practice in career fields that emerged as a result of the effort to answer the Grand Challenges. The program had five components, namely:
Research experience based up... | wikipedia |
wiki_32301_chunk_8 | Derek Jones (civil servant, born 1927) | Summary of the McKinsey Report, McKinsey & Company, Inc., November 1972.
Edited by Kevin Sinclair, Who's who in Hong Kong, Hong Kong: Asianet Information Services Ltd., 1982.
"Triumph, Failure or Pyrrhic Victory — the Tokyo Round in Perspective", World Economy Volume 10 Issue 3, September 1987.
Who's Who, A & C Blac... | wikipedia |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.