www.fgks.org   »   [go: up one dir, main page]

Jump to content

Search results

  • Thumbnail for AMD
    Advanced Micro Devices, Inc. (AMD) is an American multinational corporation and fabless semiconductor company based in Santa Clara, California, that develops...
    146 KB (15,180 words) - 04:12, 14 June 2024
  • Thumbnail for Linux kernel
    The Linux kernel is a free and open-source,: 4  UNIX-like kernel that is used in many computer systems worldwide. The kernel was created by Linus Torvalds...
    189 KB (17,696 words) - 12:00, 16 June 2024
  • Thumbnail for Flash memory
    Flash memory is an electronic non-volatile computer memory storage medium that can be electrically erased and reprogrammed. The two main types of flash...
    185 KB (16,884 words) - 10:20, 12 June 2024
  • Thumbnail for Mainframe computer
    A mainframe computer, informally called a mainframe or big iron, is a computer used primarily by large organizations for critical applications like bulk...
    33 KB (3,718 words) - 08:30, 21 May 2024
  • Parsing, syntax analysis, or syntactic analysis is the process of analyzing a string of symbols, either in natural language, computer languages or data...
    37 KB (4,856 words) - 16:24, 10 June 2024
  • Thumbnail for Character encoding
    Character encoding is the process of assigning numbers to graphical characters, especially the written characters of human language, allowing them to be...
    30 KB (3,718 words) - 22:38, 24 May 2024
  • An HTML element is a type of HTML (HyperText Markup Language) document component, one of several types of HTML nodes (there are also text nodes, comment...
    114 KB (12,794 words) - 05:00, 13 June 2024
  • Thumbnail for Smart card
    A smart card (SC), chip card, or integrated circuit card (ICC or IC card), is a card used to control access to a resource. It is typically a plastic credit...
    115 KB (12,137 words) - 11:32, 14 May 2024
  • Apache Hadoop ( /həˈduːp/) is a collection of open-source software utilities that facilitates using a network of many computers to solve problems involving...
    49 KB (5,093 words) - 03:30, 18 May 2024
  • Thumbnail for Computer graphics
    Computer graphics deals with generating images and art with the aid of computers. Computer graphics is a core technology in digital photography, film,...
    69 KB (8,761 words) - 21:42, 16 May 2024
  • A media type (formerly known as a MIME type) is a two-part identifier for file formats and format contents transmitted on the Internet. Their purpose is...
    15 KB (1,703 words) - 15:08, 14 June 2024
  • Extensible HyperText Markup Language (XHTML) is part of the family of XML markup languages which mirrors or extends versions of the widely used HyperText...
    59 KB (6,964 words) - 13:00, 13 June 2024
  • Thumbnail for Von Neumann architecture
    The von Neumann architecture—also known as the von Neumann model or Princeton architecture—is a computer architecture based on a 1945 description by John...
    35 KB (4,173 words) - 04:35, 13 June 2024
  • RISC-V (pronounced "risk-five": 1 ) is an open standard instruction set architecture (ISA) based on established reduced instruction set computer (RISC)...
    130 KB (13,557 words) - 07:43, 9 June 2024
  • Thumbnail for NP-completeness
    In computational complexity theory, a problem is NP-complete when: It is a decision problem, meaning that for any input to the problem, the output is either...
    30 KB (3,614 words) - 19:13, 15 June 2024
  • Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed...
    40 KB (4,659 words) - 12:55, 13 May 2024
  • Advanced Audio Coding (AAC) is an audio coding standard for lossy digital audio compression. It was designed to be the successor of the MP3 format and...
    67 KB (7,241 words) - 02:30, 31 May 2024
  • Single-precision floating-point format (sometimes called FP32 or float32) is a computer number format, usually occupying 32 bits in computer memory; it...
    21 KB (3,070 words) - 15:04, 23 May 2024
  • The usage share of an operating system is the percentage of computers that run that operating system (OS). These statistics are estimates as wide scale...
    139 KB (10,737 words) - 20:09, 29 May 2024
  • MPEG-4 is a group of international standards for the compression of digital audio and visual data, multimedia systems, and file storage formats. It was...
    45 KB (2,747 words) - 09:49, 10 June 2024
  • Thumbnail for Bebo
    Bebo (/ˈbiːboʊ/ BEE-boh) was an American social networking website that originally operated from 2005 until its bankruptcy in 2013 and relaunched in February...
    19 KB (2,314 words) - 16:33, 3 June 2024
  • In computer science, a B-tree is a self-balancing tree data structure that maintains sorted data and allows searches, sequential access, insertions, and...
    50 KB (7,042 words) - 13:17, 12 June 2024
  • General-purpose computing on graphics processing units (GPGPU, or less often GPGP) is the use of a graphics processing unit (GPU), which typically handles...
    67 KB (6,689 words) - 10:44, 13 June 2024
  • Resilient File System (ReFS), codenamed "Protogon", is a Microsoft proprietary file system introduced with Windows Server 2012 with the intent of becoming...
    31 KB (3,144 words) - 03:46, 17 May 2024
  • Thumbnail for Memory management unit
    A memory management unit (MMU), sometimes called paged memory management unit (PMMU), is a computer hardware unit that examines all memory references on...
    45 KB (6,671 words) - 10:11, 10 May 2024
  • Computational science, also known as scientific computing, technical computing or scientific computation (SC), is a division of science that uses advanced...
    32 KB (3,373 words) - 18:29, 29 April 2024
  • Thumbnail for Texture mapping
    Texture mapping is a method for mapping a texture on a computer-generated graphic. Texture here can be high frequency detail, surface texture, or color...
    31 KB (3,812 words) - 17:30, 8 June 2024
  • Thumbnail for Analytics
    Analytics is the systematic computational analysis of data or statistics. It is used for the discovery, interpretation, and communication of meaningful...
    33 KB (3,318 words) - 09:32, 10 June 2024
  • Thumbnail for Intel 8080
    The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel. It first appeared in April 1974 and is an extended...
    55 KB (4,423 words) - 03:08, 7 June 2024
  • Zigbee is an IEEE 802.15.4-based specification for a suite of high-level communication protocols used to create personal area networks with small, low-power...
    38 KB (4,736 words) - 14:48, 5 June 2024
  • Thumbnail for Cd (command)
    The cd command, also known as chdir (change directory), is a command-line shell command used to change the current working directory in various operating...
    14 KB (1,431 words) - 15:49, 28 May 2024
  • The Spring Framework is an application framework and inversion of control container for the Java platform. The framework's core features can be used by...
    66 KB (6,672 words) - 12:04, 13 June 2024
  • The actor model in computer science is a mathematical model of concurrent computation that treats an actor as the basic building block of concurrent computation...
    80 KB (7,146 words) - 18:54, 29 May 2024
  • WolframAlpha (/ˈwʊlf.rəm-/ WUULf-rəm-) is an answer engine developed by Wolfram Research. It is offered as an online service that answers factual queries...
    14 KB (1,181 words) - 19:12, 13 June 2024
  • PL/I (Programming Language One, pronounced /piː ɛl wʌn/ and sometimes written PL/1) is a procedural, imperative computer programming language initially...
    96 KB (11,890 words) - 18:09, 16 May 2024
  • Wikimapia (stylized as wikimapia) is a geographic online encyclopedia project. The project implements an interactive "clickable" web map that utilizes...
    15 KB (1,506 words) - 16:01, 13 April 2024
  • In computer science, stream processing (also known as event stream processing, data stream processing, or distributed stream processing) is a programming...
    35 KB (4,575 words) - 14:51, 14 November 2023
  • Thumbnail for Iterative and incremental development
    Iterative and incremental development is any combination of both iterative design (or iterative method) and incremental build model for development. Usage...
    19 KB (2,240 words) - 19:43, 21 May 2024
  • In computing, traceroute and tracert are diagnostic command-line interface commands for displaying possible routes (paths) and transit delays of packets...
    14 KB (1,547 words) - 21:34, 16 May 2024
  • Gizmo5 (formerly known as Gizmo Project and SIPphone) was a voice over IP communications network and a proprietary freeware soft phone for that network...
    11 KB (1,103 words) - 19:37, 25 January 2024
  • The Stream Control Transmission Protocol (SCTP) is a computer networking communications protocol in the transport layer of the Internet protocol suite...
    23 KB (2,484 words) - 20:03, 26 April 2024
  • Trusted Computing (TC) is a technology developed and promoted by the Trusted Computing Group. The term is taken from the field of trusted systems and has...
    42 KB (5,183 words) - 18:30, 6 June 2024
  • IBM Watson Media (formerly Ustream and IBM Cloud Video) is an American virtual events platform company which is a division of IBM. Prior to the IBM acquisition...
    8 KB (684 words) - 16:24, 10 June 2023
  • Bluetooth Low Energy (Bluetooth LE, colloquially BLE, formerly marketed as Bluetooth Smart) is a wireless personal area network technology designed and...
    45 KB (4,719 words) - 11:54, 3 June 2024
  • OS X Lion, also known as Mac OS X Lion, (version 10.7) is the eighth major release of macOS, Apple's desktop and server operating system for Mac computers...
    71 KB (6,162 words) - 13:01, 5 June 2024
  • Thumbnail for Distributed hash table
    A distributed hash table (DHT) is a distributed system that provides a lookup service similar to a hash table. Key–value pairs are stored in a DHT, and...
    35 KB (4,123 words) - 04:47, 9 May 2024
  • In cryptography, subliminal channels are covert channels that can be used to communicate secretly in normal looking communication over an insecure channel...
    11 KB (1,515 words) - 15:55, 16 April 2024
  • Thumbnail for Power Mac G5
    The Power Mac G5 is a series of personal computers designed, manufactured, and sold by Apple Computer, Inc. from 2003 to 2006 as part of the Power Mac...
    30 KB (2,586 words) - 01:02, 4 June 2024
  • Internet Small Computer Systems Interface or iSCSI (/aɪˈskʌzi/ eye-SKUZ-ee) is an Internet Protocol-based storage networking standard for linking data...
    26 KB (3,244 words) - 22:38, 25 March 2024
  • Thumbnail for Window manager
    A window manager is system software that controls the placement and appearance of windows within a windowing system in a graphical user interface. Most...
    25 KB (3,096 words) - 09:13, 2 June 2024
  • XPath (XML Path Language) is an expression language designed to support the query or transformation of XML documents. It was defined by the World Wide...
    28 KB (3,136 words) - 08:56, 2 May 2024
  • Infrastructure as a service (IaaS) is a cloud computing service model by means of which computing resources are supplied by a cloud services provider....
    7 KB (747 words) - 13:54, 8 May 2024
  • Thumbnail for OLPC XO
    The OLPC XO (formerly known as $100 Laptop, Children's Machine, 2B1) is a low cost laptop computer intended to be distributed to children in developing...
    56 KB (5,842 words) - 10:37, 12 May 2024
  • MorphOS is an AmigaOS-like computer operating system (OS). It is a mixed proprietary and open source OS produced for the Pegasos PowerPC (PPC) processor...
    26 KB (1,833 words) - 07:35, 9 June 2024
  • In computing, NaN (/næn/), standing for Not a Number, is a particular value of a numeric data type (often a floating-point number) which is undefined as...
    29 KB (3,688 words) - 13:23, 8 May 2024
  • Behavior-driven development (BDD) involves naming software tests using domain language to describe the behavior of the code. BDD involves use of a domain-specific...
    30 KB (3,730 words) - 15:20, 16 April 2024
  • In computer programming, dataflow programming is a programming paradigm that models a program as a directed graph of the data flowing between operations...
    14 KB (1,615 words) - 17:46, 10 March 2024
  • Thumbnail for Java applet
    Java applets are small applications written in the Java programming language, or another programming language that compiles to Java bytecode, and delivered...
    31 KB (3,522 words) - 05:54, 13 May 2024
  • MMX is a single instruction, multiple data (SIMD) instruction set architecture designed by Intel, introduced on January 8, 1997 with its Pentium P5 (microarchitecture)...
    15 KB (1,447 words) - 17:39, 7 June 2024
  • Thumbnail for Spline (mathematics)
    In mathematics, a spline is a function defined piecewise by polynomials. In interpolating problems, spline interpolation is often preferred to polynomial...
    26 KB (4,679 words) - 11:26, 9 April 2024
  • Zstandard is a lossless data compression algorithm developed by Yann Collet at Facebook. Zstd is the corresponding reference implementation in C, released...
    19 KB (1,658 words) - 15:39, 14 June 2024
  • Thrift is an interface definition language and binary communication protocol used for defining and creating services for programming languages. It was...
    12 KB (1,163 words) - 19:01, 23 March 2024
  • SystemVerilog, standardized as IEEE 1800, is a hardware description and hardware verification language used to model, design, simulate, test and implement...
    34 KB (3,976 words) - 20:08, 26 May 2024
  • Question answering (QA) is a computer science discipline within the fields of information retrieval and natural language processing (NLP) that is concerned...
    29 KB (3,394 words) - 11:45, 16 June 2024
  • Thumbnail for Ultimatum game
    The ultimatum game is a game that has become a popular instrument of economic experiments. An early description is by Nobel laureate John Harsanyi in 1961...
    39 KB (4,727 words) - 12:43, 1 June 2024
  • An instruction set architecture (ISA) is an abstract model of a computer, also referred to as computer architecture. A realization of an ISA is called...
    33 KB (1,795 words) - 21:05, 28 May 2024
  • In computing, a linear-feedback shift register (LFSR) is a shift register whose input bit is a linear function of its previous state. The most commonly...
    37 KB (4,672 words) - 22:11, 31 March 2024
  • This list is divided into proprietary or free software, and open source software, with several comparison tables of different product and vendor characteristics...
    59 KB (1,414 words) - 03:46, 23 May 2024
  • Oracle APEX (also known as APEX) is an enterprise low-code application development platform from Oracle Corporation. APEX is used for developing and deploying...
    16 KB (1,621 words) - 19:32, 30 April 2024
  • In automata theory, a finite-state machine is called a deterministic finite automaton (DFA), if each of its transitions is uniquely determined by its source...
    30 KB (4,495 words) - 13:00, 30 May 2024
  • In computer science, a dynamic programming language is a class of high-level programming languages which at runtime execute many common programming behaviours...
    15 KB (1,714 words) - 21:28, 21 May 2024
  • Thumbnail for 2017 Macron e-mail leaks
    The 2017 Macron e-mail leaks were leaks of more than 20,000 e-mails related to the campaign of Emmanuel Macron during the 2017 French presidential elections...
    25 KB (2,505 words) - 04:25, 16 April 2024
  • Nearest neighbor search (NNS), as a form of proximity search, is the optimization problem of finding the point in a given set that is closest (or most...
    27 KB (3,339 words) - 04:02, 4 March 2024
  • Samsung SCH-U520 is a phone released on December 7, 2006 by the former U.S. wireless operator Alltel Wireless. The phone was the first phone to support...
    6 KB (573 words) - 10:36, 7 March 2023
  • In cryptography, Camellia is a symmetric key block cipher with a block size of 128 bits and key sizes of 128, 192 and 256 bits. It was jointly developed...
    18 KB (1,768 words) - 18:34, 29 October 2023
  • BitComet (originally named SimpleBT client from versions 0.11 to 0.37) is a cross-protocol BitTorrent, HTTP and FTP client written in C++ for Microsoft...
    16 KB (1,497 words) - 09:13, 5 December 2023
  • Thumbnail for IBM 7090
    The IBM 7090 is a second-generation transistorized version of the earlier IBM 709 vacuum tube mainframe computer that was designed for "large-scale scientific...
    24 KB (2,719 words) - 18:58, 31 May 2024
  • ActiveX Document (also known as DocObject or DocObj) is a Microsoft technology that allows users to view and edit Microsoft Word, Excel, and PDF documents...
    5 KB (568 words) - 20:32, 21 June 2021
  • In mathematical logic, a formula is satisfiable if it is true under some assignment of values to its variables. For example, the formula x + 3 = y {\displaystyle...
    12 KB (1,500 words) - 18:45, 26 November 2022
  • In computing, a persistent data structure or not ephemeral data structure is a data structure that always preserves the previous version of itself when...
    42 KB (6,207 words) - 04:57, 22 April 2024
  • Microsoft Build Engine, or MSBuild, is a set of free and open-source build tools for managed code under the Common Language Infrastructure as well as native...
    12 KB (942 words) - 05:57, 21 December 2023
  • "An Open Letter to Hobbyists" is a 1976 open letter written by Bill Gates, the co-founder of Microsoft, to early personal computer hobbyists, in which...
    30 KB (3,475 words) - 09:14, 2 April 2024
  • Thumbnail for Portable application
    A portable application (portable app), sometimes also called standalone, is a program designed to operate without changing other files or requiring other...
    15 KB (1,672 words) - 18:34, 17 March 2024
  • Thumbnail for XTEA
    In cryptography, XTEA (eXtended TEA) is a block cipher designed to correct weaknesses in TEA. The cipher's designers were David Wheeler and Roger Needham...
    10 KB (1,005 words) - 19:00, 14 April 2024
  • A modified Harvard architecture is a variation of the Harvard computer architecture that, unlike the pure Harvard architecture, allows memory that contains...
    12 KB (1,649 words) - 16:19, 30 December 2023
  • In mathematics and computer programming, exponentiating by squaring is a general method for fast computation of large positive integer powers of a number...
    21 KB (3,379 words) - 09:03, 14 June 2024
  • Resistive random-access memory (ReRAM or RRAM) is a type of non-volatile (NV) random-access (RAM) computer memory that works by changing the resistance...
    52 KB (6,177 words) - 10:12, 10 June 2024
  • Selectable Mode Vocoder (SMV) is variable bitrate speech coding standard used in CDMA2000 networks. SMV provides multiple modes of operation that are selected...
    3 KB (396 words) - 01:29, 8 June 2024
  • In the fields of digital electronics and computer hardware, multi-channel memory architecture is a technology that increases the data transfer rate between...
    23 KB (2,029 words) - 17:47, 25 May 2024
  • In computer science, storage virtualization is "the process of presenting a logical view of the physical storage resources to" a host computer system,...
    26 KB (3,819 words) - 14:42, 11 February 2024
  • The BEAR and LION block ciphers were invented by Ross Anderson and Eli Biham by combining a stream cipher and a cryptographic hash function. The algorithms...
    2 KB (218 words) - 07:15, 27 April 2022
  • Thumbnail for ThinkPad Tablet
    The ThinkPad Tablet is a tablet computer made by Lenovo as part of its series of Android-based tablet devices and is targeted towards business users. Lenovo's...
    17 KB (1,618 words) - 23:16, 8 August 2023
  • Thumbnail for Sleep mode
    Sleep mode (or suspend to RAM) is a low power mode for electronic devices such as computers, televisions, and remote controlled devices. These modes save...
    11 KB (1,468 words) - 02:40, 12 June 2024
  • In computing, Java Web Start (also known as JavaWS, javaws or JAWS) is a deprecated framework developed by Sun Microsystems (now Oracle) that allows users...
    13 KB (1,670 words) - 22:53, 24 February 2024
  • Thumbnail for Pushdown automaton
    In the theory of computation, a branch of theoretical computer science, a pushdown automaton (PDA) is a type of automaton that employs a stack. Pushdown...
    26 KB (4,019 words) - 07:17, 18 April 2024
  • Thumbnail for Georg C. F. Greve
    Georg C. F. Greve (born 10 March 1973 in Helgoland, Germany) is a software developer, physicist, author and currently co-founder and president at Vereign...
    7 KB (698 words) - 20:37, 1 March 2024
  • The following tables compare general and technical information for a number of HTML editors. Please see the individual products' articles for further information...
    36 KB (759 words) - 11:51, 4 May 2024
  • The Microsoft Windows platform specific Cryptographic Application Programming Interface (also known variously as CryptoAPI, Microsoft Cryptography API...
    6 KB (617 words) - 07:45, 19 July 2021
  • A digital identity is data stored on computer systems relating to an individual, organization, application, or device. For individuals, it involves the...
    48 KB (5,686 words) - 16:31, 12 June 2024
  • SdlBasic is a multiplatform interpreter for BASIC, using the SDL libraries. Its interpreter core is based on wxBasic. The interpreter can be very useful...
    4 KB (400 words) - 22:51, 13 April 2024
  • Thumbnail for Dragon 32/64
    The Dragon 32 and Dragon 64 are home computers that were built in the 1980s. The Dragons are very similar to the TRS-80 Color Computer, and were produced...
    19 KB (2,186 words) - 08:08, 7 February 2024
  • Thumbnail for Differentiable neural computer
    In artificial intelligence, a differentiable neural computer (DNC) is a memory augmented neural network architecture (MANN), which is typically (but not...
    14 KB (798 words) - 04:00, 4 May 2024
  • Asynchronous circuit (clockless or self-timed circuit): Lecture 12  : 157–186  is a sequential digital logic circuit that does not use a global clock circuit...
    57 KB (5,984 words) - 22:55, 22 April 2024
  • Thumbnail for Case-based reasoning
    In artificial intelligence and philosophy[verification needed], case-based reasoning (CBR), broadly construed, is the process of solving new problems based...
    17 KB (2,144 words) - 07:23, 7 March 2024
  • Explainable AI (XAI), often overlapping with interpretable AI, or explainable machine learning (XML), either refers to an artificial intelligence (AI)...
    61 KB (6,768 words) - 23:03, 15 June 2024
  • The Transport Layer Security (TLS) protocol provides the ability to secure communications across or inside networks. This comparison of TLS implementations...
    131 KB (4,493 words) - 15:55, 9 May 2024
  • Thumbnail for Mechanical computer
    A mechanical computer is a computer built from mechanical components such as levers and gears rather than electronic components. The most common examples...
    20 KB (1,722 words) - 01:22, 4 May 2024
  • In the field of database design, a multi-model database is a database management system designed to support multiple data models against a single, integrated...
    9 KB (1,011 words) - 03:22, 11 April 2024
  • Hunk is the executable file format of tools and programs of the Amiga Operating System based on Motorola 68000 CPU and other processors of the same family...
    16 KB (2,068 words) - 10:47, 15 November 2023
  • The move-to-front (MTF) transform is an encoding of data (typically a stream of bytes) designed to improve the performance of entropy encoding techniques...
    12 KB (1,562 words) - 11:24, 14 March 2024
  • Thumbnail for Menuconfig
    make menuconfig is one of five similar tools that can configure Linux source, a necessary early step needed to compile the source code. make menuconfig...
    10 KB (696 words) - 01:13, 14 May 2024
  • Web Services Discovery provides access to software systems over the Internet using standard protocols. In the most basic scenario there is a Web Service...
    12 KB (1,389 words) - 02:56, 19 August 2023
  • Thumbnail for Separation of content and presentation
    Separation of content and presentation (or separation of content and style) is the separation of concerns design principle as applied to the authoring...
    4 KB (487 words) - 08:40, 3 June 2024
  • Extreme programming (XP) is an agile software development methodology used to implement software systems. This article details the practices used in this...
    19 KB (2,717 words) - 08:24, 24 March 2024
  • In computer science, an LL parser (Left-to-right, leftmost derivation) is a top-down parser for a restricted context-free language. It parses the input...
    30 KB (4,363 words) - 12:34, 21 March 2024
  • An off-by-one error or off-by-one bug (known by acronyms OBOE, OBO, OB1 and OBOB) is a logic error that involves a number that differs from its intended...
    10 KB (1,428 words) - 00:38, 3 June 2024
  • In computing, Internet Key Exchange (IKE, versioned as IKEv1 and IKEv2) is the protocol used to set up a security association (SA) in the IPsec protocol...
    19 KB (2,339 words) - 10:35, 1 November 2023
  • Thumbnail for Self (programming language)
    Self is an general-purpose, high-level, object-oriented programming language based on the concept of prototypes. Self began as a dialect of Smalltalk,...
    23 KB (2,932 words) - 07:18, 9 June 2024
  • In computer science, an interval tree is a tree data structure to hold intervals. Specifically, it allows one to efficiently find all intervals that overlap...
    24 KB (3,577 words) - 21:32, 11 June 2024
  • Thumbnail for Federico Faggin
    Federico Faggin (Italian pronunciation: [fedeˈriːko fadˈdʒin], Venetian: [faˈdʒiŋ]; born 1 December 1941) is an Italian-American physicist, engineer, inventor...
    42 KB (4,744 words) - 00:35, 10 June 2024
  • Thumbnail for Libtorrent
    libtorrent is an open-source implementation of the BitTorrent protocol. It is written in and has its main library interface in C++. Its most notable features...
    18 KB (1,981 words) - 09:43, 2 May 2024
  • In computer programming, a nondeterministic algorithm is an algorithm that, even for the same input, can exhibit different behaviors on different runs...
    5 KB (556 words) - 09:21, 24 August 2023
  • Link-state routing protocols are one of the two main classes of routing protocols used in packet switching networks for computer communications, the others...
    17 KB (2,426 words) - 03:32, 16 June 2024
  • Multimodal interaction provides the user with multiple modes of interacting with a system. A multimodal interface provides several distinct tools for input...
    31 KB (4,852 words) - 15:55, 14 March 2024
  • In computer science, a consistency model specifies a contract between the programmer and a system, wherein the system guarantees that if the programmer...
    57 KB (7,619 words) - 04:21, 3 March 2024
  • Event-driven architecture (EDA) is a software architecture paradigm concerning the production and detection of events. An event can be defined as "a significant...
    20 KB (2,510 words) - 00:05, 22 March 2024
  • Open publishing is a term used by Matthew Arnison in March 2001 to describe the online process of creating text, audio and video news by methods that are...
    4 KB (448 words) - 10:35, 26 September 2021
  • Thumbnail for Spaghetti sort
    Spaghetti sort is a linear-time, analog algorithm for sorting a sequence of items, introduced by A. K. Dewdney in his Scientific American column. This...
    3 KB (387 words) - 22:05, 24 April 2024
  • GhostNet (simplified Chinese: 幽灵网; traditional Chinese: 幽靈網; pinyin: YōuLíngWǎng) is the name given by researchers at the Information Warfare Monitor to...
    16 KB (1,541 words) - 17:09, 7 June 2024
  • Semantic interoperability is the ability of computer systems to exchange data with unambiguous, shared meaning. Semantic interoperability is a requirement...
    18 KB (2,475 words) - 04:35, 28 January 2024
  • Win4Lin is a discontinued proprietary software application for Linux which allowed users to run a copy of Windows 9x, Windows 2000 or Windows XP applications...
    8 KB (767 words) - 18:41, 21 March 2024
  • Chipmunk Basic is a freeware interpreter for the BASIC programming language maintained by Ron Nicholson. Chipmunk basic was originally developed for the...
    2 KB (217 words) - 01:11, 22 April 2024
  • The binding properties pattern is combining multiple observers to force properties in different objects to be synchronized or coordinated in some way....
    4 KB (414 words) - 09:30, 8 March 2024
  • In a computer operating system that uses paging for virtual memory management, page replacement algorithms decide which memory pages to page out, sometimes...
    47 KB (6,235 words) - 16:15, 7 January 2024
  • In configuration management, a baseline is an agreed description of the attributes of a product, at a point in time, which serves as a basis for defining...
    7 KB (1,007 words) - 11:38, 12 August 2023
  • 3D video coding is one of the processing stages required to manifest stereoscopic content into a home. There are three techniques which are used to achieve...
    738 bytes (62 words) - 17:31, 12 August 2022
  • Thumbnail for Stat (system call)
    stat() is a Unix system call that returns file attributes about an inode. The semantics of stat() vary between operating systems. As an example, Unix command...
    16 KB (1,900 words) - 10:20, 21 May 2024
  • The NS32000, sometimes known as the 32k, is a series of microprocessors produced by National Semiconductor. The first member of the family came to market...
    33 KB (3,554 words) - 00:12, 3 June 2024
  • CH /ˌsiːˈeɪtʃ/ is a proprietary cross-platform C and C++ interpreter and scripting language environment. It was originally designed by Harry Cheng as a...
    15 KB (1,498 words) - 22:11, 23 April 2024
  • AspectJ is an aspect-oriented programming (AOP) extension for the Java programming language, created at PARC. It is available in Eclipse Foundation open-source...
    13 KB (1,321 words) - 04:05, 21 March 2024
  • Database tuning describes a group of activities used to optimize and homogenize the performance of a database. It usually overlaps with query tuning, but...
    5 KB (652 words) - 12:53, 16 April 2023
  • MUSIC-N refers to a family of computer music programs and programming languages descended from or influenced by MUSIC, a program written by Max Mathews...
    9 KB (1,127 words) - 00:25, 7 March 2023
  • An American flag sort is an efficient, in-place variant of radix sort that distributes items into buckets. Non-comparative sorting algorithms such as radix...
    7 KB (988 words) - 23:16, 2 May 2024
  • Electronic billing or electronic bill payment and presentment, is when a seller such as company, organization, or group sends its bills or invoices over...
    8 KB (1,031 words) - 17:34, 23 March 2024
  • Interactive geometry software (IGS) or dynamic geometry environments (DGEs) are computer programs which allow one to create and then manipulate geometric...
    27 KB (1,718 words) - 20:21, 15 May 2024
  • A property, in some object-oriented programming languages, is a special sort of class member, intermediate in functionality between a field (or data member)...
    17 KB (1,741 words) - 14:24, 24 June 2023
  • Ascender Corporation was a digital typeface foundry and software development company in the Chicago suburb of Elk Grove Village, Illinois. It was founded...
    9 KB (982 words) - 00:41, 9 February 2024
  • The OpenBSD operating system focuses on security and the development of security features.: xxvii  According to author Michael W. Lucas, OpenBSD "is widely...
    30 KB (3,213 words) - 23:29, 8 April 2024
  • An embedded pushdown automaton or EPDA is a computational model for parsing languages generated by tree-adjoining grammars (TAGs). It is similar to the...
    9 KB (1,315 words) - 09:16, 16 December 2023
  • Thumbnail for Dynamic time warping
    In time series analysis, dynamic time warping (DTW) is an algorithm for measuring similarity between two temporal sequences, which may vary in speed. For...
    36 KB (4,325 words) - 09:18, 6 June 2024
  • A federation is a group of computing or network providers agreeing upon standards of operation in a collective fashion. The term may be used when describing...
    4 KB (467 words) - 19:50, 29 August 2021
  • Microsoft BizTalk Server is an inter-organizational middleware system (IOMS) that automates business processes through the use of adapters which are tailored...
    15 KB (1,346 words) - 14:55, 14 June 2024
  • Thumbnail for Data structure diagram
    A data structure diagram (DSD) is the visual representation of a certain kind of data model that contains entities, their relationships, and the constraints...
    4 KB (481 words) - 13:56, 18 December 2023
  • The Evolution of Cooperation is a 1984 book written by political scientist Robert Axelrod that expands upon a paper of the same name written by Axelrod...
    46 KB (4,822 words) - 15:58, 24 May 2024
  • Thumbnail for Message broker
    A message broker (also known as an integration broker or interface engine) is an intermediary computer program module that translates a message from the...
    7 KB (692 words) - 12:14, 23 May 2024
  • Thumbnail for Flicker fixer
    A flicker fixer or scan doubler is a piece of computer hardware that de-interlaces an output video signal. The flicker fixer accomplishes this by adjusting...
    3 KB (430 words) - 21:19, 31 March 2024
  • In numerical analysis, the Kahan summation algorithm, also known as compensated summation, significantly reduces the numerical error in the total obtained...
    27 KB (3,532 words) - 06:58, 9 February 2024
  • Windows Internet Name Service (WINS) is the Microsoft implementation of NetBIOS Name Service (NBNS), a name server and service for NetBIOS computer names...
    2 KB (211 words) - 20:17, 6 January 2023
  • Thumbnail for Software rendering
    Software rendering is the process of generating an image from a model by means of computer software. In the context of computer graphics rendering, software...
    11 KB (1,336 words) - 20:42, 22 January 2024
  • Combustion was a computer program for motion graphics, compositing, and visual effects developed by Discreet Logic, a division on Autodesk, and originally...
    2 KB (162 words) - 00:55, 1 February 2024
  • In economics, dynamic inconsistency or time inconsistency is a situation in which a decision-maker's preferences change over time in such a way that a...
    23 KB (3,104 words) - 12:18, 1 May 2024
  • MiWi is a proprietary wireless protocol supporting peer-to-peer, star network connectivity. It was designed by Microchip Technology. MiWi uses small, low-power...
    8 KB (714 words) - 09:54, 20 May 2024
  • Pascal MicroEngine is a series of microcomputer products manufactured by Western Digital from 1979 through the mid-1980s, designed specifically to run...
    10 KB (1,264 words) - 18:00, 4 February 2024
  • STARAN in the information technology industry might be the first commercially available computer designed around an associative memory. The STARAN computer...
    2 KB (168 words) - 01:04, 28 May 2022
  • Security controls are safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer...
    12 KB (1,404 words) - 11:56, 10 June 2024
  • In computer science and formal methods, a SAT solver is a computer program which aims to solve the Boolean satisfiability problem. On input a formula over...
    29 KB (3,558 words) - 15:26, 22 December 2023
  • Thumbnail for Core War
    Core War is a 1984 programming game created by D. G. Jones and A. K. Dewdney in which two or more battle programs (called "warriors") compete for control...
    20 KB (2,547 words) - 19:59, 17 May 2024
  • Thumbnail for Fat tree
    The fat tree network is a universal network for provably efficient communication. It was invented by Charles E. Leiserson of the Massachusetts Institute...
    7 KB (731 words) - 08:42, 28 August 2023
  • Configurators, also known as choice boards, design systems, toolkits, or co-design platforms, are responsible for guiding the user[who?] through the c...
    9 KB (1,054 words) - 10:55, 24 August 2023
  • Thumbnail for Covox Speech Thing
    The Covox Speech Thing is an external digital-to-analog converter (DAC) that plugs into the parallel printer port of a PC. It converts 8-bit digital sound...
    20 KB (2,121 words) - 04:33, 5 June 2024
  • Thumbnail for Bokode
    A bokode is a type of data tag which holds much more information than a barcode over the same area. They were developed by a team led by Ramesh Raskar...
    3 KB (341 words) - 08:01, 24 March 2023
  • DICT is a dictionary network protocol created by the DICT Development Group in 1997, described by RFC 2229. Its goal is to surpass the Webster protocol...
    11 KB (1,068 words) - 22:08, 3 January 2024
  • Idris is a purely-functional programming language with dependent types, optional lazy evaluation, and features such as a totality checker. Idris may be...
    10 KB (899 words) - 21:24, 3 June 2024
  • Design rule for Camera File system (DCF) is a JEITA specification (number CP-3461) which defines a file system for digital cameras, including the directory...
    11 KB (1,472 words) - 16:07, 29 January 2024
  • In the mathematics of computational complexity theory, computability theory, and decision theory, a search problem is a type of computational problem represented...
    4 KB (534 words) - 01:54, 18 January 2023
  • In software architecture, a messaging pattern is an architectural pattern which describes how two different parts of an application, or different systems...
    11 KB (1,582 words) - 23:59, 5 July 2023
  • In computer science, a logistic model tree (LMT) is a classification model with an associated supervised training algorithm that combines logistic regression...
    2 KB (220 words) - 22:26, 5 May 2023
  • T/Maker (Table Maker) was one of the first spreadsheet programs designed for the personal computer user and released by Peter Roizen in 1979. The application...
    6 KB (558 words) - 03:40, 19 September 2021
  • Java Data Objects (JDO) is a specification of Java object persistence. One of its features is a transparency of the persistence services to the domain...
    6 KB (669 words) - 06:49, 30 October 2023
  • Thumbnail for Frama-C
    Frama-C stands for Framework for Modular Analysis of C programs. Frama-C is a set of interoperable program analyzers for C programs. Frama-C has been developed...
    7 KB (681 words) - 22:51, 28 February 2024
  • Adaxa Suite is a fully integrated[vague] Open Source Enterprise Resource Planning (ERP) Suite. Adaxa Suite has a General Public License GPL/GPL2 license...
    3 KB (352 words) - 06:01, 18 April 2024
  • The SQL/Schemata, or Information and Definition Schemas, part of the SQL standard is defined by ISO/IEC 9075-11:2008. SQL/Schemata defines the information...
    1 KB (139 words) - 15:43, 25 June 2019
  • Thumbnail for Xenu's Link Sleuth
    Xenu, or Xenu's Link Sleuth, is a computer program that checks websites for broken hyperlinks. It is written by Tilman Hausherr and is proprietary software...
    6 KB (594 words) - 08:46, 26 December 2023
  • Database testing usually consists of a layered process, including the user interface (UI) layer, the business layer, the data access layer and the database...
    10 KB (1,303 words) - 19:21, 10 August 2023
  • Service choreography in business computing is a form of service composition in which the interaction protocol between several partner services[clarification...
    18 KB (1,847 words) - 05:34, 22 July 2023
  • Thumbnail for Object code optimizer
    An object code optimizer, sometimes also known as a post pass optimizer or, for small sections of code, peephole optimizer, forms part of a software compiler...
    10 KB (950 words) - 05:42, 7 April 2024
  • In computing, entropy is the randomness collected by an operating system or application for use in cryptography or other uses that require random data...
    22 KB (2,153 words) - 20:16, 12 March 2024
  • Information flow in an information theoretical context is the transfer of information from a variable x {\displaystyle x} to a variable y {\displaystyle...
    15 KB (2,376 words) - 07:14, 19 April 2024
  • First-order equational logic consists of quantifier-free terms of ordinary first-order logic, with equality as the only predicate symbol. The model theory...
    7 KB (835 words) - 12:35, 15 April 2022
  • TCP NAT traversal and TCP hole punching (sometimes NAT punch-through) in computer networking occurs when two hosts behind a network address translation...
    9 KB (1,271 words) - 21:29, 28 December 2023
  • The U-matrix (unified distance matrix) is a representation of a self-organizing map (SOM) where the Euclidean distance between the codebook vectors of...
    2 KB (220 words) - 20:09, 29 September 2023
  • Change impact analysis (IA) or impact analysis is the analysis of changes within a deployed product or application and their potential consequences.[b...
    8 KB (856 words) - 15:05, 31 January 2024
  • Software product management (sometimes also referred to as digital product management, or in the right context just product management) is the discipline...
    11 KB (1,348 words) - 21:38, 11 June 2024
  • ProZ.com is a membership-based website targeting freelance translators. Founded in 1999, it is mainly used for posting and responding to translation job...
    8 KB (743 words) - 14:59, 25 January 2024
  • Helios is a discontinued Unix-like operating system for parallel computers. It was developed and published by Perihelion Software. Its primary architecture...
    11 KB (1,310 words) - 05:46, 13 May 2024
  • "In object-oriented systems with multiple inheritance, some mechanism must be used for resolving conflicts when inheriting different definitions of the...
    11 KB (1,549 words) - 23:32, 9 April 2024
  • Software evolution is the continual development of a piece of software after its initial release to address changing stakeholder and/or market requirements...
    16 KB (2,041 words) - 22:15, 26 January 2024
  • In computational geometry, the Bentley–Ottmann algorithm is a sweep line algorithm for listing all crossings in a set of line segments, i.e. it finds the...
    24 KB (3,312 words) - 06:50, 11 March 2024
  • Chaff is an algorithm for solving instances of the Boolean satisfiability problem in programming. It was designed by researchers at Princeton University...
    2 KB (170 words) - 23:56, 28 September 2023
  • Fine Artist is a raster graphics editor program created by Microsoft Kids in 1993. Using this program, it is possible to create paintings. The interface...
    3 KB (238 words) - 18:45, 8 June 2024
  • Ehcache (/ˈiːeɪtʃkæʃ/ EE-aytch-kash) is an open source Java distributed cache for general-purpose caching, Java EE and light-weight containers[clarify]...
    3 KB (210 words) - 14:46, 10 October 2023
  • Thumbnail for BitClout
    BitClout is an open source blockchain-based social media platform. On the platform, users can post short-form writings and photos, award money to posts...
    15 KB (1,336 words) - 22:07, 24 February 2024
  • In computer science and operations research, randomized rounding is a widely used approach for designing and analyzing approximation algorithms. Many combinatorial...
    24 KB (4,052 words) - 03:12, 2 December 2023
  • OpenAI Codex is an artificial intelligence model developed by OpenAI. It parses natural language and generates code in response. It powers GitHub Copilot...
    13 KB (1,306 words) - 01:56, 1 April 2024
  • Thumbnail for Roofline model
    The roofline model is an intuitive visual performance model used to provide performance estimates of a given compute kernel or application running on multi-core...
    16 KB (1,700 words) - 01:13, 4 January 2024
  • Thumbnail for Grammar systems theory
    Grammar systems theory is a field of theoretical computer science that studies systems of finite collections of formal grammars generating a formal language...
    5 KB (487 words) - 18:22, 9 January 2023
  • A functional software architecture (FSA) is an architectural model that identifies enterprise functions, interactions and corresponding IT needs. These...
    14 KB (2,004 words) - 23:34, 21 October 2020
  • A semantic grid is an approach to grid computing in which information, computing resources and services are described using the semantic data model. In...
    2 KB (288 words) - 23:12, 10 February 2023
  • In databases, a synonym is an alias or alternate name for a table, view, sequence, or other schema object. They are used mainly to make it easy for users...
    5 KB (762 words) - 17:47, 7 February 2022
  • MAPPER Systems, now known as Business Information Server, BIS, is a fourth-generation programming language originally from Sperry Univac. Now owned by...
    16 KB (2,278 words) - 04:13, 2 April 2024
  • Thumbnail for Nuclear Instrumentation Module
    The Nuclear Instrumentation Module (NIM) standard defines mechanical and electrical specifications for electronics modules used in experimental particle...
    5 KB (427 words) - 22:36, 28 June 2023
  • Thumbnail for Architecture of Windows 9x
    The Windows 9x series of operating systems (e.g. Windows 95, Windows 98) used a monolithic kernel to power the inner components of such operating systems...
    18 KB (2,235 words) - 16:51, 11 June 2024
  • In algebra, a presentation of a monoid (or a presentation of a semigroup) is a description of a monoid (or a semigroup) in terms of a set Σ of generators...
    5 KB (785 words) - 21:24, 18 January 2022
  • In network science, a gradient network is a directed subnetwork of an undirected "substrate" network where each node has an associated scalar potential...
    12 KB (1,512 words) - 05:19, 10 January 2024
  • Middleware analysts are computer software engineers with a specialization in products that connect two different computer systems together. These products...
    10 KB (1,305 words) - 12:21, 4 September 2022
  • Cydoor is a spyware and adware first detected in 2003. The Cydoor software downloads advertisements from the Cydoor servers, to be displayed in the Cydoor-supported...
    4 KB (349 words) - 22:39, 29 April 2024
  • The market for zero-day exploits is commercial activity related to the trafficking of software exploits. Software vulnerabilities and "exploits" are used...
    20 KB (2,883 words) - 19:01, 31 July 2023
  • In cryptography, a key ceremony is a ceremony held to generate or use a cryptographic key. A public example is the signing of the DNS root zone for DNSSEC...
    13 KB (1,507 words) - 14:37, 8 June 2024
  • In mathematics, the Lagrangian theory on fiber bundles is globally formulated in algebraic terms of the variational bicomplex, without appealing to the...
    2 KB (255 words) - 16:02, 21 June 2023
  • Thumbnail for Compunet
    Compunet was a United Kingdom-based interactive service provider,[vague] catering primarily for the Commodore 64 but later for the Amiga and Atari ST....
    9 KB (1,305 words) - 17:17, 5 January 2024
  • Thumbnail for Centripetal Catmull–Rom spline
    In computer graphics, the centripetal Catmull–Rom spline is a variant form of the Catmull–Rom spline, originally formulated by Edwin Catmull and Raphael...
    14 KB (2,179 words) - 14:13, 31 May 2024
  • Zone Routing Protocol, or ZRP is a hybrid wireless networking routing protocol that uses both proactive and reactive routing protocols when sending information...
    4 KB (544 words) - 22:58, 9 May 2023
  • Double boot (also known as cold double boot, double cold boot, double POST, power-on auto reboot, or fake boot) is a feature of the BIOS, and may occur...
    2 KB (221 words) - 08:59, 11 January 2023
  • In cryptocurrencies, an unspent transaction output (UTXO) is a distinctive element in a subset of digital currency models. A UTXO represents a certain...
    10 KB (1,269 words) - 16:50, 9 June 2024
  • ptrace is a system call found in Unix and several Unix-like operating systems. By using ptrace (an abbreviation of "process trace") one process can control...
    12 KB (1,270 words) - 14:50, 8 January 2024
  • The Wiener's attack, named after cryptologist Michael J. Wiener, is a type of cryptographic attack against RSA. The attack uses the continued fraction...
    12 KB (1,792 words) - 15:03, 3 May 2024
  • Xvfb or X virtual framebuffer is a display server implementing the X11 display server protocol. In contrast to other display servers, Xvfb performs all...
    5 KB (475 words) - 04:32, 25 May 2024
  • Thumbnail for Ontology chart
    An ontology chart is a type of chart used in semiotics and software engineering to illustrate an ontology. The nodes of an ontology chart represent universal...
    5 KB (681 words) - 15:45, 7 January 2024
  • Masking threshold within acoustics (a branch of physics that deals with topics such as vibration, sound, ultrasound , and infrasound), refers to a process...
    3 KB (413 words) - 11:35, 9 October 2022
  • In mathematics, the constant problem is the problem of deciding whether a given expression is equal to zero. This problem is also referred to as the identity...
    3 KB (364 words) - 02:18, 5 May 2023
  • Projective texture mapping is a method of texture mapping that allows a textured image to be projected onto a scene as if by a slide projector. Projective...
    4 KB (587 words) - 20:21, 10 November 2022
  • An iSCSI target is a storage resource located on an iSCSI server (more generally, one of potentially many instances of iSCSI storage nodes running on that...
    4 KB (85 words) - 03:13, 11 April 2022
  • Thumbnail for Joyce Weisbecker
    Joyce Weisbecker (born 1958) is an American retired[citation needed] engineer and actuary. She became the first female commercial video game designer in...
    4 KB (338 words) - 05:37, 6 April 2024
  • Language equations are mathematical statements that resemble numerical equations, but the variables assume values of formal languages rather than numbers...
    9 KB (1,127 words) - 17:09, 13 January 2024
  • User-in-the-Loop (UIL) refers to the notion that a technology (e.g., network) can improve a performance objective by engaging its human users (Layer 8)...
    14 KB (2,068 words) - 21:49, 5 February 2023
  • Thumbnail for Hypercube internetwork topology
    In computer networking, hypercube networks are a type of network topology used to connect and route data between multiple processing units or computers...
    5 KB (717 words) - 21:05, 1 April 2024
  • Frame-bursting is a communication protocol feature used at the link layer in communication networks to alter the transmission characteristics in order...
    4 KB (445 words) - 03:47, 17 May 2023
  • Thumbnail for ICMP hole punching
    ICMP hole punching is a technique employed in network address translator (NAT) applications for maintaining Internet Control Message Protocol (ICMP) packet...
    4 KB (513 words) - 14:05, 15 July 2022
  • Following the development of Keynesian economics, applied economics began developing forecasting models based on economic data including national income...
    8 KB (929 words) - 14:08, 14 January 2022
  • In cryptography, a pseudorandom ensemble is a family of variables meeting the following criteria: Let U = { U n } n ∈ N {\displaystyle U=\{U_{n}\}_{n\in...
    845 bytes (98 words) - 11:13, 16 February 2024
  • In proof theory, ludics is an analysis of the principles governing inference rules of mathematical logic. Key features of ludics include notion of compound...
    4 KB (493 words) - 12:07, 29 October 2021
  • Safe semantics is a computer hardware consistency model. It describes one type of guarantee that a data register provides when it is shared by several...
    7 KB (959 words) - 22:58, 27 March 2023
  • The Next Hop Resolution Protocol (NHRP) is an extension of the ATM ARP routing mechanism that is sometimes used to improve the efficiency of routing computer...
    4 KB (401 words) - 17:48, 3 October 2023
  • This is a list of algebraic number theory topics. These topics are basic to the field, either as prototypical examples, or as basic objects of study. Algebraic...
    2 KB (187 words) - 13:07, 20 March 2022
  • Snarf is a term used by computer programmers and the UNIX community meaning to copy a file or data over a network, for any purpose, with additional specialist...
    3 KB (313 words) - 16:57, 9 May 2024
  • Thumbnail for JUNG
    JUNG (the Java Universal Network/Graph Framework) is an open-source graph modeling and visualization framework written in Java, under the BSD license....
    4 KB (267 words) - 23:17, 7 January 2024
  • Neural cliques are network-level memory coding units in the hippocampus. They are functionally organized in a categorical and hierarchical manner. Researchers...
    5 KB (641 words) - 19:18, 31 May 2021
  • Timway (simplified Chinese: 添达; traditional Chinese: 添達; pinyin: Tiān Dá) is a web portal and directory primarily serving Hong Kong. The Timway Hong Kong...
    7 KB (707 words) - 01:37, 10 May 2024
  • Thumbnail for Praxeme
    Praxeme is a methodology for enterprise architecture which provides a structured approach to the design and implementation of an enterprise information...
    12 KB (1,421 words) - 13:26, 20 September 2023
  • Polychotomous key refers to the number of alternatives which a decision point may have in a non-temporal hierarchy of independent variables. The number...
    2 KB (165 words) - 16:53, 17 September 2022
  • Xara Flare Open Vector File Format is a format that was introduced in 1997 by XARA to compete with the Macromedia Flash format. The format was open and...
    1 KB (130 words) - 13:09, 31 January 2023
  • Thumbnail for LL grammar
    In formal language theory, an LL grammar is a context-free grammar that can be parsed by an LL parser, which parses the input from Left to right, and constructs...
    14 KB (1,997 words) - 10:49, 7 December 2023
  • In software engineering, an amelioration pattern is an anti-pattern formed when an existing software design pattern was edited (i.e. rearranged, added...
    1 KB (115 words) - 21:50, 12 February 2024
  • Information space is the set of concepts, and relations among them, held by an information system; it describes the range of possible values or meanings...
    3 KB (326 words) - 16:08, 9 January 2024
  • In algebraic number theory, a reflection theorem or Spiegelungssatz (German for reflection theorem – see Spiegel and Satz) is one of a collection of theorems...
    4 KB (567 words) - 15:13, 29 October 2021
  • A multi-bearer network (MBN) is a network having the capability to carry a data packet via one of several alternative bearers. To be more precise, the...
    4 KB (546 words) - 17:06, 8 June 2024
  • HP nPartitions are hard partition technology in HP's Virtual Server Environment. nPartitions (or nPar) are electrically isolated from other nPar partitions...
    5 KB (737 words) - 21:47, 5 May 2024
  • An Active message (in computing) is a messaging object capable of performing processing on its own. It is a lightweight messaging protocol used to optimize...
    5 KB (612 words) - 01:13, 22 October 2018
  • A load-balanced switch is a switch architecture which guarantees 100% throughput with no central arbitration at all, at the cost of sending each packet...
    7 KB (1,012 words) - 15:09, 14 September 2022
  • The Winston Smith Project (Italian: Progetto Winston Smith, or PWS) is an informational and operational project for the defence of human rights on the...
    15 KB (1,970 words) - 16:35, 5 March 2023
  • Process Control Daemon (PCD) is an open source, light-weight system level process manager/controller for Embedded Linux based projects (such as consumer...
    8 KB (1,094 words) - 16:10, 7 March 2023
  • Authenticated Identity Body or AIB is a method allowing parties in a network to share authenticated identity, thereby increasing the integrity of their...
    2 KB (233 words) - 03:30, 28 April 2024
  • In model checking, a field of computer science, a region is a convex polytope in R d {\displaystyle \mathbb {R} ^{d}} for some dimension d {\displaystyle...
    15 KB (2,734 words) - 20:24, 30 October 2023
  • Design Space Exploration (DSE) refers to systematic analysis and pruning of unwanted design points based on parameters of interest. While the term DSE...
    4 KB (524 words) - 10:07, 14 February 2023
  • Regular semantics is a computer hardware consistency model. It describes a type of guarantee provided by a processor register that is shared by several...
    5 KB (825 words) - 16:30, 25 April 2024
  • A file format is a procedure to encode information for storage in a computer file. The databank format is an ASCII file format for time series econometric...
    2 KB (216 words) - 20:16, 31 July 2020
  • The Deadline Scheduler is an I/O scheduler, or disk scheduler, for the Linux kernel. It was written in 2002 by Jens Axboe. The main purpose of the Deadline...
    8 KB (1,102 words) - 22:09, 12 May 2024
  • A System Deployment Image (aka SDI) is a file format used primarily with Microsoft products to contain an arbitrary disk image, including boot sector information...
    4 KB (492 words) - 08:54, 30 May 2024
  • AutoMan is a series of software implementations used both for job scheduling and console operations automation for z/OS. These implementations range from...
    4 KB (461 words) - 06:33, 18 September 2023
  • Semantic analysis is a method for eliciting and representing knowledge about organisations.[vague] Initially the problem must be defined by domain experts...
    1 KB (147 words) - 19:41, 26 October 2020
  • Chih-Wei Huang (黃志偉) is a developer and promoter of free software who lives in Taiwan. He is famous for his work in the VoIP and internationalization and...
    7 KB (722 words) - 18:43, 19 February 2024
  • Utilising the DW/BI system is the final step before business users gain access to the information. The first impression the business community gets is...
    2 KB (207 words) - 11:48, 30 January 2024
  • In object-oriented programming, an indexer allows instances of a particular class or struct to be indexed just like arrays. It is a form of operator overloading...
    3 KB (314 words) - 15:25, 6 February 2023
  • An Interest Flooding Attack (IFA) is a denial-of-service attack in an Information-centric network (or Content-Centric Networking (CCN) or Named Data Networking...
    3 KB (279 words) - 14:11, 5 February 2024
  • Application Lifecycle Framework (ALF) was an Eclipse Foundation project to develop an open framework[vague] for system integration and interoperability...
    2 KB (118 words) - 18:44, 22 April 2024
  • In computer security, the Zardoz list, more formally known as the Security-Digest list, was a famous semi-private full disclosure mailing list run by Neil...
    3 KB (318 words) - 03:34, 29 May 2023
  • SLR grammars are the class of formal grammars accepted by a Simple LR parser. SLR grammars are a superset of all LR(0) grammars and a subset of all LALR(1)...
    4 KB (684 words) - 19:47, 9 March 2022
  • A virtual security appliance is a computer appliance that runs inside virtual environments. It is called an appliance because it is pre-packaged with a...
    8 KB (1,131 words) - 04:22, 28 April 2022
  • Hybrid testing is what most frameworks evolve/develop into over time and multiple projects. The most successful automation frameworks generally accommodate...
    2 KB (216 words) - 21:59, 19 January 2024
  • Thumbnail for Monrobot XI
    The Monroe Calculating Machine Mark XI (or Monrobot XI) was a general-purpose stored-program electronic digital computer introduced in 1960 by the Monroe...
    17 KB (2,066 words) - 22:40, 29 April 2024
  • Spring Integration is an open source framework for enterprise application integration using the well-known Enterprise Integration Patterns. It is a lightweight[clarify]...
    2 KB (119 words) - 11:00, 9 April 2024
  • A term graph is a representation of an expression in a formal language as a generalized graph whose vertices are terms[clarify]. Term graphs are a more...
    4 KB (434 words) - 23:14, 8 January 2024
  • CAL (the Cal Actor Language) is a high-level programming language for writing (dataflow) actors, which are stateful operators that transform input streams...
    17 KB (2,538 words) - 05:51, 23 June 2022
  • The confederate effect is the phenomenon of people falsely classifying human intelligence as machine (or artificial) intelligence during Turing tests....
    2 KB (253 words) - 10:25, 27 April 2024
  • AGNITIO S.L. was a voice biometrics technology company, headquartered in Madrid, Spain. Biometric authentication uses unique biological characteristics...
    6 KB (533 words) - 15:07, 12 March 2024
  • Throughout history, architects have often been chosen by setting up an architectural competition and awarding the commission on the basis of the most favoured...
    5 KB (459 words) - 01:42, 9 March 2023
  • E-society, or "electronic society", is a society that consists of one or more e-Communities involved in the areas from e-Government, e-Democracy, and e-Business...
    2 KB (244 words) - 00:16, 23 January 2024
  • In software engineering, the Extract Class refactoring is applied when a class becomes overweight with too many methods and its purpose becomes unclear...
    894 bytes (65 words) - 19:20, 7 September 2019
  • I Write Like is a website created by Russian software programmer Dmitry Chestnykh, founder of software company Coding Robots. The site analyzes users'...
    5 KB (453 words) - 06:29, 19 September 2022
  • CISPR 11 is an international standard analog to European standard EN 55011. This is the standard that is very often referenced in all European EMC standards...
    872 bytes (61 words) - 07:19, 29 February 2020
  • In mathematics, symmetric convolution is a special subset of convolution operations in which the convolution kernel is symmetric across its zero point...
    4 KB (493 words) - 05:44, 31 January 2023
  • In computer science, state space enumeration are methods that consider each reachable program state to determine whether a program satisfies a given property...
    1 KB (149 words) - 07:12, 29 April 2022
  • Restful Objects is a standard covering RESTful interfaces to domain object models. The specification is published under a Creative Commons license. The...
    4 KB (357 words) - 09:51, 7 June 2024
  • In computer programming, a usage message or help message is a brief message displayed by a program that utilizes a command-line interface for execution...
    4 KB (463 words) - 16:27, 5 June 2024
  • Virtual worlds are an example of an early 21st-century post-convergent medium. Virtual worlds present a complex matrix of interdependent relationships...
    2 KB (260 words) - 03:55, 5 December 2021
  • Thumbnail for Noncommutative signal-flow graph
    In automata theory and control theory, branches of mathematics, theoretical computer science and systems engineering, a noncommutative signal-flow graph...
    12 KB (1,654 words) - 22:41, 7 June 2024
  • Thumbnail for Wave Mate Bullet
    The Wave Mate Bullet was a Z80 single-board computer from 1982 which used the CP/M operating system. It was sold in Australia, the United States and Europe...
    2 KB (269 words) - 06:56, 24 February 2024
  • StoredIQ was a company founded for information lifecycle management (ILM) of unstructured data. Founded in 2001 as Deepfile in Austin, Texas by Jeff Erramouspe...
    5 KB (380 words) - 20:03, 26 April 2024
  • JArchitect is a static analysis tool for Java code. This tool supports a large number of code metrics, allows for visualization of dependencies using directed...
    3 KB (245 words) - 11:36, 17 August 2023
  • The Broadcast/Multicast control (BMC) is a sublayer of layer 2 protocol of Radio Interface Protocol Architecture as per BMC-STD. It exists in the user...
    1 KB (187 words) - 11:53, 8 February 2024
  • Environmental memory is the sum of explicit, persistent and structured data of knowledges, models and scientific expertise linked to an environmental observation...
    1 KB (115 words) - 16:36, 23 May 2024
  • In philosophy, a core ontology is a basic and minimal ontology consisting only of the minimal concepts required to understand the other concepts. It must...
    2 KB (277 words) - 04:37, 27 August 2022
  • TextEdit was the name of a collection of application programming interfaces (APIs) in the classic Mac OS for performing text editing. These APIs were originally...
    2 KB (255 words) - 03:04, 20 November 2020
  • OneAPI is a set of application programming interfaces (APIs) supported by the GSM Association that exposes network capabilities[clarify] over the Internet...
    3 KB (410 words) - 01:17, 25 May 2023
  • HDCopy is a disk image application for floppy disks that runs in MS-DOS. It can copy a floppy on the fly, or by using archives with IMG file extension...
    3 KB (273 words) - 14:40, 19 May 2024
  • Thumbnail for OnGreen
    OnGreen is an online social and business platform committed to cleantech technologies.[vague] Entrepreneurs post plans to get connections, feedback and...
    4 KB (307 words) - 19:20, 22 February 2018
  • Nuclear computation is a type of computation which allows threads to either spawn new threads or converge many threads to one. The aim of nuclear computation...
    4 KB (474 words) - 21:36, 16 March 2024
  • A characteristic-based product configurator is a product configurator extension which uses a set of discrete variables, called characteristics (or features)...
    4 KB (461 words) - 07:56, 5 July 2021
  • Negative Branch Reservations is an emerging phenomenon from Eliyahu Goldratt's Theory of Constraints. A Negative Branch Reservation is a cause and effect...
    849 bytes (82 words) - 12:10, 12 October 2019
  • GFIRST is the United States Government Forum of Incident Response and Security Teams. Background: GFIRST was formed because there was a need and desire...
    3 KB (373 words) - 21:05, 17 May 2024
  • Key or hash function should avoid clustering, the mapping of two or more keys to consecutive slots. Such clustering may cause the lookup cost to skyrocket...
    2 KB (102 words) - 17:58, 21 August 2021
  • MexScript is a multi-paradigm computer scripting language used in a number[vague] of game resource archive file handlers.[clarification needed] It was...
    9 KB (906 words) - 07:36, 22 June 2023
  • In telecommunications, Multi-Technology Operations System Interface (MTOSI) is a standard for implementing interfaces between OSSs. Service providers (carriers)...
    5 KB (683 words) - 14:07, 24 August 2022
  • Array-Based Queuing Lock (ABQL) is an advanced lock algorithm that ensures that threads spin on unique memory locations thus ensuring fairness of lock...
    9 KB (1,045 words) - 14:29, 23 April 2024
  • Semantic Interoperability Community of Practice (SICoP) is a group of people who seek to make the Semantic Web operational in their respective settings...
    987 bytes (91 words) - 18:08, 11 January 2021
  • In TRIZ, inventive standards are a set of rules of synthesis and transformation of technical systems directly resulting from laws of evolution of these...
    2 KB (206 words) - 04:41, 1 April 2024
  • In theoretical computer science and formal language theory, the complementation of an automaton[clarify] is the problem of computing an automaton that...
    3 KB (231 words) - 18:38, 6 January 2024
  • An interpreter directive is a computer language construct, that on some systems is better described as an aspect of the system's executable file format...
    4 KB (370 words) - 22:31, 28 March 2023
  • vx-underground also known as VXUG, is an educational website about malware and cybersecurity. It claims to have the largest online repository of malware...
    3 KB (257 words) - 01:22, 10 May 2024