Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

searching for Collision (computer science) 455 found (459 total)

alternate case: collision (computer science)

Hash table (5,859 words) [view diff] no match in snippet view article find links to article

function, which might cause hash collisions where the hash function generates the same index for more than one key. Such collisions are typically accommodated
Hash collision (1,456 words) [view diff] no match in snippet view article find links to article
In computer science, a hash collision or hash clash is when two distinct pieces of data in a hash table share the same hash value. The hash value in this
One-way function (1,858 words) [view diff] no match in snippet view article find links to article
Unsolved problem in computer science: Do one-way functions exist? (more unsolved problems in computer science) In computer science, a one-way function
Delimiter (2,389 words) [view diff] no match in snippet view article find links to article
delimiter, both of which are subject to collision. In the case of comma-separated values files, for example, field collision can occur whenever an author attempts
Cryptographic hash function (6,066 words) [view diff] no match in snippet view article find links to article
that yield the same hash value (a collision) is also unfeasible, a cryptographic hash is expected to have a collision resistance strength of n/2{\displaystyle
RIPEMD (814 words) [view diff] no match in snippet view article find links to article
Rijmen, Vincent (2006). "On the Collision Resistance of RIPEMD-160". Information Security. Lecture Notes in Computer Science. Vol. 4176. pp. 101–116. doi:10
Merkle–Damgård construction (1,941 words) [view diff] no match in snippet view article find links to article
Merkle–Damgård hash function is a method of building collision-resistant cryptographic hash functions from collision-resistant one-way compression functions.: 145 
SHA-1 (5,763 words) [view diff] no match in snippet view article find links to article
Hovav (eds.). The First Collision for Full SHA-1 (PDF). Advances in Cryptology – CRYPTO 2017. Lecture Notes in Computer Science. Vol. 10401. Springer.
Hash function (7,753 words) [view diff] no match in snippet view article find links to article
Limor; Haviv, Yinnon (2013). "Unique permutation hashing". Theoretical Computer Science. 475: 59–65. doi:10.1016/j.tcs.2012.12.047. "CS 3110 Lecture 21: Hash
SHA-2 (4,522 words) [view diff] no match in snippet view article find links to article
"Improving Local Collisions: New Attacks on Reduced SHA-256". Advances in Cryptology – EUROCRYPT 2013. Lecture Notes in Computer Science. Vol. 7881. Springer
Rényi entropy (3,180 words) [view diff] no match in snippet view article find links to article
respect to a particular subgroup of the modular group. In theoretical computer science, the min-entropy is used in the context of randomness extractors. The
Nancy Leveson (511 words) [view diff] no match in snippet view article find links to article
Astronautics at MIT, United States. Leveson gained her degrees (in computer science, mathematics and management) from UCLA, including her PhD in 1980.
Password Hashing Competition (254 words) [view diff] no match in snippet view article find links to article
NIST, expecting an impact on its recommendations. crypt (C) List of computer science awards CAESAR Competition "Password Hashing Competition" Danielle Walker
Centrum Wiskunde & Informatica (1,355 words) [view diff] no match in snippet view article find links to article
Institute for Mathematics and Computer Science") is a research centre in the field of mathematics and theoretical computer science. It is part of the institutes
Multiple dispatch (5,893 words) [view diff] no match in snippet view article find links to article
things */ } Thing; CollisionCase collisionCases[THING_COUNT][THING_COUNT] = { {&collision_AA, &collision_AS}, {&collision_SA, &collision_SS} }; void collide(Thing
String literal (5,639 words) [view diff] no match in snippet view article find links to article
such as escape sequences can be used to avoid the problem of delimiter collision (issues with brackets) and allow the delimiters to be embedded in a string
MD4 (840 words) [view diff] no match in snippet view article find links to article
SHA-2". Advances in Cryptology - ASIACRYPT 2010. Lecture Notes in Computer Science. Vol. 6477. pp. 56–75. doi:10.1007/978-3-642-17373-8_4. hdl:10356/94168
Birthday attack (2,144 words) [view diff] no match in snippet view article find links to article
A birthday attack is a bruteforce collision attack that exploits the mathematics behind the birthday problem in probability theory. This attack can be
Pseudotriangle (2,033 words) [view diff] no match in snippet view article find links to article
sequence of continuous motions. Pseudotriangulations have also been used for collision detection among moving objects and for dynamic graph drawing and shape
Carrier-sense multiple access (1,195 words) [view diff] no match in snippet view article find links to article
Variations on basic CSMA include addition of collision-avoidance (CSMA/CA), collision-detection (CSMA/CD) and collision-resolution techniques. Variations of CSMA
Sprite (computer graphics) (2,247 words) [view diff] no match in snippet view article
Max. texels on line Texture width Texture height Colors Zoom Rotation Collision detection Transparency Source Amstrad Plus ASIC 1990 16 16 ? 16 16 15
Motion planning (3,095 words) [view diff] no match in snippet view article find links to article
State of the Art in Scientific Computing (PDF). Lecture Notes in Computer Science. Vol. 3732. pp. 93–101. CiteSeerX 10.1.1.123.6764. doi:10.1007/11558958_11
SUHA (computer science) (523 words) [view diff] no match in snippet view article
properties and behavior of hash tables in theoretical computer science. Minimizing hashing collisions can be achieved with a uniform hashing function. These
MD5 (4,404 words) [view diff] no match in snippet view article find links to article
Bosselaers gave an early, although limited, result of finding a "pseudo-collision" of the MD5 compression function; that is, two different initialization
Perfect hash function (2,925 words) [view diff] no match in snippet view article find links to article
In computer science, a perfect hash function h for a set S is a hash function that maps distinct elements in S to a set of m integers, with no collisions
Merkle tree (1,769 words) [view diff] no match in snippet view article find links to article
In cryptography and computer science, a hash tree or Merkle tree is a tree in which every "leaf" (node) is labelled with the cryptographic hash of a data
Identifier (1,220 words) [view diff] no match in snippet view article find links to article
uniqueness encounters novel nonuniqueness). Within computer science, this problem is called naming collision. The story of the origination and expansion of
Ming C. Lin (695 words) [view diff] no match in snippet view article find links to article
Department of Computer Science. Prior to moving to Maryland in 2018, Lin was the John R. & Louise S. Parker Distinguished Professor of Computer Science at the
Computer graphics (computer science) (1,279 words) [view diff] no match in snippet view article
Computer graphics is a sub-field of computer science which studies methods for digitally synthesizing and manipulating visual content. Although the term
Binary space partitioning (2,844 words) [view diff] no match in snippet view article find links to article
In computer science, binary space partitioning (BSP) is a method for space partitioning which recursively subdivides a Euclidean space into two convex
Claw-free permutation (582 words) [view diff] no match in snippet view article find links to article
(1988). "Collision free hash functions and public key signature schemes". Advances in Cryptology – EUROCRYPT' 87. Lecture Notes in Computer Science. Vol. 304
Paxos (computer science) (6,946 words) [view diff] no match in snippet view article
message delays from Client to Learner. If the leader detects a collision, it resolves the collision by sending Accept! messages for a new round which are Accepted
Linked timestamping (1,660 words) [view diff] no match in snippet view article find links to article
(2007). Does Secure Time-Stamping Imply Collision-Free Hash Functions?. Lecture Notes in Computer Science. Vol. 4784. pp. 138–150. CiteSeerX 10.1.1
Associative array (2,764 words) [view diff] no match in snippet view article find links to article
In computer science, an associative array, map, symbol table, or dictionary is an abstract data type that stores a collection of (key, value) pairs, such
GameSalad (743 words) [view diff] no match in snippet view article find links to article
behavior-based logic system. GameSalad is used in over 223 schools for teaching computer science concepts, logic based thinking, and problem solving skills without
Andrew J. Hanson (958 words) [view diff] no match in snippet view article find links to article
the two disciplines were rapidly unifying. His subsequent work in computer science focused on computer graphics and visualization of exotic mathematical
Quantum algorithm (4,527 words) [view diff] no match in snippet view article find links to article
lower bounds for the collision and the element distinctness problems". The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings
Computational geometry (2,101 words) [view diff] no match in snippet view article find links to article
Computational geometry is a branch of computer science devoted to the study of algorithms which can be stated in terms of geometry. Some purely geometrical
Name collision (256 words) [view diff] no match in snippet view article find links to article
computer languages, such as for C++. The term "name collision" has been used in computer science for more than three decades, when referring to names
Lock (computer science) (3,500 words) [view diff] no match in snippet view article
In computer science, a lock or mutex (from mutual exclusion) is a synchronization primitive that prevents state from being modified or accessed by multiple
Fingerprint (computing) (1,564 words) [view diff] no match in snippet view article
In computer science, a fingerprinting algorithm is a procedure that maps an arbitrarily large data item (such as a computer file) to a much shorter bit
Universal hashing (4,707 words) [view diff] no match in snippet view article find links to article
numerous applications in computer science (see, for example). If we have an upper bound of ϵ<1{\displaystyle \epsilon <1} on the collision probability, we say
Networking hardware (1,091 words) [view diff] no match in snippet view article find links to article
single collision domain. Repeater hubs also participate in collision detection, forwarding a jam signal to all ports if they detect a collision. Hubs are
Mechatronics (1,856 words) [view diff] no match in snippet view article find links to article
software engineering, and also includes a combination of robotics, computer science, telecommunications, systems, control, and product engineering. As
Navlab (639 words) [view diff] no match in snippet view article find links to article
vehicles developed by teams from The Robotics Institute at the School of Computer Science, Carnegie Mellon University. Later models were produced under a new
Whirlpool (hash function) (1,048 words) [view diff] no match in snippet view article
In computer science and cryptography, Whirlpool (sometimes styled WHIRLPOOL) is a cryptographic hash function. It was designed by Vincent Rijmen (co-creator
Fast syndrome-based hash (2,845 words) [view diff] no match in snippet view article find links to article
Hashes", Progress in Cryptology – INDOCRYPT 2007 (PDF), Lecture Notes in Computer Science, vol. 4859, pp. 1–9, doi:10.1007/978-3-540-77026-8_1, ISBN 978-3-540-77025-1
FORK-256 (780 words) [view diff] no match in snippet view article find links to article
Meet-in-the-Middle Collision Attack Against the New FORK-256". Progress in Cryptology – INDOCRYPT 2007. Lecture Notes in Computer Science. Vol. 4859. Springer
K-independent hashing (1,966 words) [view diff] no match in snippet view article find links to article
In computer science, a family of hash functions is said to be k-independent, k-wise independent or k-universal if selecting a function at random from the
Logo (programming language) (2,450 words) [view diff] no match in snippet view article
and can be used to teach all computer science concepts, as UC Berkeley lecturer Brian Harvey did in his Computer Science Logo Style trilogy. Logo is usually
Hashed array tree (784 words) [view diff] no match in snippet view article find links to article
In computer science, a hashed array tree (HAT) is a dynamic array data-structure published by Edward Sitarski in 1996, maintaining an array of separate
Resource contention (293 words) [view diff] no match in snippet view article find links to article
In computer science, resource contention is a conflict over access to a shared resource such as random access memory, disk storage, cache memory, internal
Dynamic perfect hashing (1,589 words) [view diff] no match in snippet view article find links to article
In computer science, dynamic perfect hashing is a programming technique for resolving collisions in a hash table data structure. While more memory-intensive
Security level (1,360 words) [view diff] no match in snippet view article find links to article
precomputation" (PDF). Advances in Cryptology - ASIACRYPT 2013. Lecture Notes in Computer Science. pp. 321–340. doi:10.1007/978-3-642-42045-0_17. ISBN 978-3-642-42044-3
Namespace (3,352 words) [view diff] no match in snippet view article find links to article
Authority (IANA) number. A namespace name may provide context (scope in computer science) to a name, and the terms are sometimes used interchangeably. However
Collision avoidance (networking) (107 words) [view diff] no match in snippet view article
telecommunication, collision-avoidance methods try to avoid resource contention by attempting to avoid simultaneous attempts to access the same resource. Collision-avoidance
CCS (611 words) [view diff] no match in snippet view article find links to article
superoxide dismutase Chronic Covid Syndrome, long-term medical symptoms Collision cross-section, a parameter in Ion mobility spectrometry Canadian Cue Sport
Open Dynamics Engine (454 words) [view diff] no match in snippet view article find links to article
two main components are a rigid body dynamics simulation engine and a collision detection engine. It is free software licensed both under the BSD license
RF CMOS (1,952 words) [view diff] no match in snippet view article find links to article
sensor) Traffic collision technology — collision avoidance system (CAS), collision detection, Collision Warning and Brake Support, Collision Mitigation Avoidance
Collision attack (2,010 words) [view diff] no match in snippet view article find links to article
cryptography, a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. This is in contrast
Preimage attack (892 words) [view diff] no match in snippet view article find links to article
Second-Preimage Resistance, and Collision Resistance" (PDF). Fast Software Encryption. Lecture Notes in Computer Science. Vol. 3017. Springer-Verlag. pp
MinHash (3,144 words) [view diff] no match in snippet view article find links to article
In computer science and data mining, MinHash (or the min-wise independent permutations locality sensitive hashing scheme) is a technique for quickly estimating
One-key MAC (840 words) [view diff] no match in snippet view article find links to article
"OMAC: One-Key CBC MAC". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 2887. Springer, Berlin, Heidelberg. pp. 129–153. doi:10
T-function (709 words) [view diff] no match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2002. Lecture Notes in Computer Science. Vol. 2523. Springer-Verlag. pp. 470–483. doi:10.1007/3-540-36400-5_34
Coalescence (402 words) [view diff] no match in snippet view article find links to article
Coalescer, device which induces coalescence in a medium Coalescence (computer science), the act of merging adjacent free blocks of memory to fill gaps caused
Race condition (4,356 words) [view diff] no match in snippet view article find links to article
radio. Call collision Concurrency control Deadlock Hazard (logic) Linearizability Racetrack problem Symlink race Synchronization (computer science) Time of
Linear probing (3,593 words) [view diff] no match in snippet view article find links to article
Linear probing is a scheme in computer programming for resolving collisions in hash tables, data structures for maintaining a collection of key–value pairs
Avalanche effect (568 words) [view diff] no match in snippet view article find links to article
of S-boxes". Advances in Cryptology – Crypto '85. Lecture Notes in Computer Science. Vol. 218. New York, NY: Springer-Verlag New York, Inc. pp. 523–534
Dmitry Khovratovich (1,346 words) [view diff] no match in snippet view article find links to article
(2015), "Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64", Fast Software Encryption, Lecture Notes in Computer Science, vol. 8540
Classic Ethernet (587 words) [view diff] no match in snippet view article find links to article
(2000-07-10). "Obscure standard may make you flip for fibre". ProQuest Computer Science Journals. 13 (11). Rogers Publishing Limited. ProQuest 274984076.
Trait (computer programming) (2,058 words) [view diff] no match in snippet view article
Conference on Object-Oriented Programming (ECOOP). Lecture Notes in Computer Science. 2743. Springer: 248–274. CiteSeerX 10.1.1.1011.8. doi:10.1007/978-3-540-45070-2_12
Jane Wilhelms (278 words) [view diff] no match in snippet view article find links to article
collision detection in computer animation, and isosurfaces and volume rendering in scientific visualization. She was a professor of computer science at
Binary search tree (3,091 words) [view diff] no match in snippet view article find links to article
In computer science, a binary search tree (BST), also called an ordered or sorted binary tree, is a rooted binary tree data structure with the key of each
Collision detection (4,552 words) [view diff] no match in snippet view article find links to article
Collision detection is the computational problem of detecting an intersection of two or more spatial objects, commonly computer graphics objects. It has
Quantum computing (12,347 words) [view diff] no match in snippet view article find links to article
remain limited. For many years, the fields of quantum mechanics and computer science formed distinct academic communities. Modern quantum theory developed
Reversible cellular automaton (8,943 words) [view diff] no match in snippet view article find links to article
procedure for deciding functionality and sequentiality", Theoretical Computer Science, 292 (1): 45–63, doi:10.1016/S0304-3975(01)00214-6, MR 1964625. Blanchard
Cryptography (10,733 words) [view diff] no match in snippet view article find links to article
cryptography exists at the intersection of the disciplines of mathematics, computer science, information security, electrical engineering, digital signal processing
Indistinguishability obfuscation (2,071 words) [view diff] no match in snippet view article find links to article
previously knew how to construct), but with the notable exception of collision-resistant hash function families. For this reason, it has been referred
Faculty of Electrical Engineering and Computing, University of Zagreb (953 words) [view diff] no match in snippet view article find links to article
Systems Computer Engineering Computational Modelling in Engineering Computer Science Network Science Data Science The Faculty comprises 12 academic departments:
Richard S. Muller (729 words) [view diff] no match in snippet view article find links to article
1933) is an American professor in the Electrical Engineering and Computer Science Department of the University of California at Berkeley. He made contributions
Schnorr signature (1,198 words) [view diff] no match in snippet view article find links to article
Cryptographic Techniques. Proceedings of CRYPTO '86. Lecture Notes in Computer Science. Vol. 263. pp. 186–194. doi:10.1007/3-540-47721-7_12. ISBN 978-3-540-18047-0
RadioGatún (1,551 words) [view diff] no match in snippet view article find links to article
"Analysis of the Collision Resistance of Radio Gatún Using Algebraic Techniques". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 5381
Escape sequence (1,843 words) [view diff] no match in snippet view article find links to article
In computer science, an escape sequence is a combination of characters that has a meaning other than the literal characters contained therein; it is marked
Snefru (240 words) [view diff] no match in snippet view article find links to article
Improved Attacks on Snefru". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 5086. Fast Software Encryption 2008. pp. 444–461. doi:10
Zero-knowledge proof (7,791 words) [view diff] no match in snippet view article find links to article
Advances in Cryptology — CRYPTO' 89 Proceedings (PDF). Lecture Notes in Computer Science. Vol. 435. pp. 628–631. doi:10.1007/0-387-34805-0_60. ISBN 978-0-387-97317-3
Regular expression (8,901 words) [view diff] no match in snippet view article find links to article
validation. Regular expression techniques are developed in theoretical computer science and formal language theory. The concept of regular expressions began
N-hash (213 words) [view diff] no match in snippet view article find links to article
Techniques, Brighton, UK, April 8–11, 1991. Proceedings. Lecture Notes in Computer Science. Vol. 547. pp. 1–16. doi:10.1007/3-540-46416-6_1. ISBN 978-3-540-54620-7
Slade Centre for Electronic Media in Fine Art (211 words) [view diff] no match in snippet view article find links to article
a variety of disciplines, including psychology, architecture, and computer science. Throughout 1998, SCEMFA collaborated with Channel 4 UK to organise
SMASH (hash) (294 words) [view diff] no match in snippet view article
Strategy Called SMASH". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3897. pp. 233–244. doi:10.1007/11693383_16. ISBN 978-3-540-33108-7
Trie (3,392 words) [view diff] no match in snippet view article find links to article
In computer science, a trie (/ˈtraɪ/, /ˈtriː/), also called digital tree or prefix tree, is a type of k-ary search tree, a tree data structure used for
Proof of work (2,758 words) [view diff] no match in snippet view article find links to article
personhood Proof of space Proof of stake Proof of elapsed time Consensus (computer science) ^ On most Unix systems this can be verified with echo -n 1:52:380119:calvin@comics
Dan Boneh (1,150 words) [view diff] no match in snippet view article find links to article
Born in Israel in 1969,[citation needed] Boneh obtained his Ph.D. in computer science from Princeton University in 1996 under the supervision of Richard
Communication protocol (8,203 words) [view diff] no match in snippet view article find links to article
access control. Arrangements have to be made to accommodate the case of collision or contention where two parties respectively simultaneously transmit or
Klara Kedem (169 words) [view diff] no match in snippet view article find links to article
scientist, a professor of computer science at Ben-Gurion University in Beer-Sheva, Israel and an adjunct faculty member in computer science at Cornell University
List of algorithms (7,908 words) [view diff] no match in snippet view article find links to article
(computer science): agreeing on a single value or history among unreliable processors Chandra–Toueg consensus algorithm Paxos algorithm Raft (computer
Galois/Counter Mode (2,939 words) [view diff] no match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2007. Lecture Notes in Computer Science. Vol. 4727. Springer. pp. 227–238. doi:10.1007/978-3-540-74735-2_16
Clock synchronization (1,538 words) [view diff] no match in snippet view article find links to article
Clock synchronization is a topic in computer science and engineering that aims to coordinate otherwise independent clocks. Even when initially set accurately
Very smooth hash (1,918 words) [view diff] no match in snippet view article find links to article
secure means that finding collisions is as difficult as some known hard mathematical problem. Unlike other provably secure collision-resistant hashes, VSH
Scope (computer science) (10,579 words) [view diff] no match in snippet view article
binding), or to nothing at all (it may be unbound). Scope helps prevent name collisions by allowing the same name to refer to different objects – as long as the
Message Authenticator Algorithm (945 words) [view diff] no match in snippet view article find links to article
Cryptographic Techniques (CRYPTO’84), Santa Barbara, CA, USA. Lecture Notes in Computer Science. Vol. 196. Springer. pp. 393–400. doi:10.1007/3-540-39568-7_30. Davies
Cycle detection (4,153 words) [view diff] no match in snippet view article find links to article
In computer science, cycle detection or cycle finding is the algorithmic problem of finding a cycle in a sequence of iterated function values. For any
SHA-3 (5,585 words) [view diff] no match in snippet view article find links to article
Fast Software Encryption. Fast Software Encryption Lecture Notes in Computer Science. Vol. 8424. pp. 241–262. doi:10.1007/978-3-662-43933-3_13. ISBN 978-3-662-43932-6
Satisfiability modulo theories (4,288 words) [view diff] no match in snippet view article find links to article
In computer science and mathematical logic, satisfiability modulo theories (SMT) is the problem of determining whether a mathematical formula is satisfiable
SipHash (1,282 words) [view diff] no match in snippet view article find links to article
SipHash". Selected Areas in Cryptography -- SAC 2014. Lecture Notes in Computer Science. Vol. 8781. pp. 165–182. doi:10.1007/978-3-319-13051-4_10. ISBN 978-3-319-13050-7
UpStage (1,620 words) [view diff] no match in snippet view article find links to article
Douglas Bagnall to realise the vision of cyberformance troupe Avatar Body Collision; the group had been creating live performance on the internet using free
BHT algorithm (373 words) [view diff] no match in snippet view article find links to article
Brassard-Høyer-Tapp algorithm or BHT algorithm is a quantum algorithm that solves the collision problem. In this problem, one is given n and an r-to-1 function f:{1,…
Carlos Saldanha (1,461 words) [view diff] no match in snippet view article find links to article
by the time he was an adult, he initially considered a career in computer science, because he did not think a career in art was a viable option. This
CWC mode (197 words) [view diff] no match in snippet view article find links to article
Authenticated Encryption Mode". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 3017. pp. 408–426. doi:10.1007/978-3-540-25937-4_26. ISBN 9783540259374
Sweep and prune (358 words) [view diff] no match in snippet view article find links to article
phase algorithm used during collision detection to limit the number of pairs of solids that need to be checked for collision, i.e. intersection. This is
Collision resolution (54 words) [view diff] no match in snippet view article find links to article
"Collision resolution" may refer to: Hash table implementations in computer science Collision response in classical mechanics Compare: Collision avoidance
Metaheuristic (3,195 words) [view diff] no match in snippet view article find links to article
In computer science and mathematical optimization, a metaheuristic is a higher-level procedure or heuristic designed to find, generate, tune, or select
Chinese wall (2,417 words) [view diff] no match in snippet view article find links to article
for additional goods and services or for a successor contract. In computer science, the concept of a Chinese wall is used by both the operating system
Hybrid system (1,538 words) [view diff] no match in snippet view article find links to article
"The Theory of Hybrid Automata", 11th Annual Symposium on Logic in Computer Science (LICS), IEEE Computer Society Press, pp. 278–292, archived from the
Strong RSA assumption (228 words) [view diff] no match in snippet view article find links to article
Advances in Cryptology – EUROCRYPT ’97. EUROCRYPT 1997. Lecture Notes in Computer Science, vol 1233. Springer, Berlin, Heidelberg. doi:10.1007/3-540-69053-0_33
List of terms relating to algorithms and data structures (3,134 words) [view diff] no match in snippet view article find links to article
coarsening cocktail shaker sort codeword coding tree collective recursion collision collision resolution scheme Colussi combination comb sort Communicating Sequential
Scheme (programming language) (8,204 words) [view diff] no match in snippet view article
programming languages. Scheme was created during the 1970s at the MIT Computer Science and Artificial Intelligence Laboratory (MIT AI Lab) and released by
List of hash functions (280 words) [view diff] no match in snippet view article find links to article
Information Security and Cryptology - ICISC 2014. Lecture Notes in Computer Science. Vol. 8949. pp. 286–313. doi:10.1007/978-3-319-15943-0_18. ISBN 978-3-319-15942-3
Authenticated encryption (2,085 words) [view diff] no match in snippet view article find links to article
Fast Software Encryption (FSE): 2000 Proceedings. Lecture Notes in Computer Science. Vol. 1978. pp. 284–299. doi:10.1007/3-540-44706-7_20. ISBN 978-3-540-41728-6
Poly1305 (2,359 words) [view diff] no match in snippet view article find links to article
Encryption: 12th international workshop. FSE 2005. Lecture Notes in Computer Science. Paris, France: Springer. doi:10.1007/11502760_3. ISBN 3-540-26541-4
Computer graphics (8,763 words) [view diff] no match in snippet view article find links to article
computer graphics hardware. It is a vast and recently developed area of computer science. The phrase was coined in 1960 by computer graphics researchers Verne
Ideal lattice (5,571 words) [view diff] no match in snippet view article find links to article
Learning with Errors over Rings. In Eurocrypt 2010, Lecture Notes in Computer Science, 2010. Jintai Ding and Richard Lindner. Identifying Ideal Lattices
Rainbow table (3,377 words) [view diff] no match in snippet view article find links to article
Trade-Off". Advances in Cryptology - CRYPTO 2003 (PDF). Lecture Notes in Computer Science. Vol. 2729. Santa Barbara, California, USA: Springer. pp. 617–630.
VMAC (740 words) [view diff] no match in snippet view article find links to article
Architectures" (PDF). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 4356. Springer-Verlag. pp. 327–341. doi:10.1007/978-3-540-74462-7_23
Birthday problem (6,666 words) [view diff] no match in snippet view article find links to article
(2006). "Birthday Paradox for Multi-collisions". In Rhee M.S., Lee B. (ed.). Lecture Notes in Computer Science, vol 4296. Berlin: Springer. doi:10.1007/11927587_5
Automatic train operation (2,427 words) [view diff] no match in snippet view article find links to article
Formal Methods, Verification and Validation. Practice. Lecture Notes in Computer Science. Vol. 13704. Springer Nature Switzerland. pp. 286–307. doi:10
Equihash (713 words) [view diff] no match in snippet view article find links to article
Birthday Problem", Advances in Cryptology — CRYPTO 2002, Lecture Notes in Computer Science, vol. 2442, Springer Berlin Heidelberg, pp. 288–304, CiteSeerX 10.1
Kurs (docking navigation system) (1,622 words) [view diff] no match in snippet view article
for the collision between Mir and Progress M-34 and the damage to the Spektr module, nearly causing Mir to be abandoned. After the collision and recovery
Graphics software (494 words) [view diff] no match in snippet view article find links to article
v t e Computer science Note: This template roughly follows the 2012 ACM Computing Classification System. Hardware Printed circuit board Peripheral Integrated
List of University of California, Berkeley faculty (15,263 words) [view diff] no match in snippet view article find links to article
Professor of Computer Science David Culler (B.A. 1980) – Professor of Computer Science Richard Fateman – Professor Emeritus of Computer Science Susan L. Graham
Hertz Foundation (1,984 words) [view diff] no match in snippet view article find links to article
at DARPA's Information Innovation Office and Adjunct Professor of Computer Science at Tufts University Alice P. Gast, President, Imperial College of London
Ralph Merkle (1,121 words) [view diff] no match in snippet view article find links to article
Encryption Function". Advances in Cryptology – CRYPTO '87. Lecture Notes in Computer Science. Vol. 293. pp. 369–378. doi:10.1007/3-540-48184-2_32. ISBN 978-3-540-18796-7
Matrix (mathematics) (12,870 words) [view diff] no match in snippet view article
experiments that form the cornerstone of experimental particle physics: Collision reactions such as occur in particle accelerators, where non-interacting
Applications of artificial intelligence (19,863 words) [view diff] no match in snippet view article find links to article
the most difficult problems in computer science. Many of their inventions have been adopted by mainstream computer science and are no longer considered
Elie Bursztein (1,917 words) [view diff] no match in snippet view article find links to article
in 2004, a master’s degree in computer science from Paris Diderot University/ENS in 2005, and a PhD in computer science from École normale supérieure
Search engine indexing (4,766 words) [view diff] no match in snippet view article find links to article
from linguistics, cognitive psychology, mathematics, informatics, and computer science. An alternate name for the process, in the context of search engines
Faculty of Science, University of Zagreb (1,067 words) [view diff] no match in snippet view article find links to article
programmes (2 years study; 120 credits): Applied Mathematics, Chemistry, Computer Science and Mathematics, Ecology and Conservation, Environmental Science, Experimental
Tristan Harris (1,573 words) [view diff] no match in snippet view article find links to article
received his Bachelor degree from Stanford University, where he studied computer science. Harris has appeared in the Netflix documentary The Social Dilemma
Grover's algorithm (4,477 words) [view diff] no match in snippet view article find links to article
Darmstadt, Germany, May 25-28, 2010. Proceedings. Lecture Notes in Computer Science. Vol. 6061. Springer. pp. 73–80. doi:10.1007/978-3-642-12929-2_6. Grover
Separation (559 words) [view diff] no match in snippet view article find links to article
the area of mathematics called topology Separation of concerns, in computer science (and problem-solving in general) Separation of variables, in mathematics
Aubrey Edwards (943 words) [view diff] no match in snippet view article find links to article
Tony Schiavone. Aubert has a background in software engineering and computer science, having previously worked in the video game industry as a producer
Orbiter (simulator) (1,970 words) [view diff] no match in snippet view article
was developed by Martin Schweiger, a senior research fellow in the computer science department at University College London, who felt that space flight
Aircrack-ng (5,020 words) [view diff] no match in snippet view article find links to article
WPA and WPA2/802.11i). 2009 2nd IEEE International Conference on Computer Science and Information Technology. pp. 48–52. doi:10.1109/ICCSIT.2009.5234856
Advanced driver-assistance system (7,705 words) [view diff] no match in snippet view article find links to article
minimizing human error. Safety features are designed to avoid crashes and collisions by offering technologies that alert the driver to problems, implementing
PPP (complexity) (997 words) [view diff] no match in snippet view article
Connections to Cryptography". Proc. of 59th Symposium on Foundations of Computer Science. pp. 148–158. arXiv:1808.06407. doi:10.1109/FOCS.2018.00023.{{cite
Evolutionary algorithm (4,457 words) [view diff] no match in snippet view article find links to article
strategies", Parallel Problem Solving from Nature — PPSN V, Lecture Notes in Computer Science, vol. 1498, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 367–377
George B. Purdy (744 words) [view diff] no match in snippet view article find links to article
University for 11 years, and was appointed the Geier Professor of computer science at the University of Cincinnati in 1986. Purdy had Erdős number one
Treap (3,181 words) [view diff] no match in snippet view article find links to article
In computer science, the treap and the randomized binary search tree are two closely related forms of binary search tree data structures that maintain
Center for Research on Computation and Society (852 words) [view diff] no match in snippet view article find links to article
Harvard University that focuses on interdisciplinary research combining computer science with social sciences. It is based in Harvard John A. Paulson School
One-way compression function (3,850 words) [view diff] no match in snippet view article find links to article
Constructions from PGV. Advances in Cryptology – CRYPTO '02, Lecture Notes in Computer Science, vol. 2442, pp. 320–335, Springer, 2002. See the table on page 3, Davies–Meyer
Vocational-technical school (378 words) [view diff] no match in snippet view article find links to article
networking, computer programming, computer repair, information technology, Computer Science Construction: building maintenance, cabinet making, carpentry, electrical
Cipher security summary (801 words) [view diff] no match in snippet view article find links to article
"Attacking Triple Encryption". Fast Software Encryption. Lecture Notes in Computer Science. Vol. 1372. Springer. pp. 239–253. doi:10.1007/3-540-69710-1_16.
2009 in science (1,974 words) [view diff] no match in snippet view article find links to article
March – Jacob T. Schwartz, American mathematician, and professor of computer science at the New York University Courant Institute of Mathematical Sciences
Wang Xiaoyun (485 words) [view diff] no match in snippet view article find links to article
she and co-authors demonstrated collision attacks against MD5, SHA-0 and other related hash functions (a collision occurs when two distinct messages
Pseudorandom permutation (1,282 words) [view diff] no match in snippet view article find links to article
"The Collision Intractability of MDC-2 in the Ideal-Cipher Model" (PDF). Advances in Cryptology - EUROCRYPT 2007. Lecture Notes in Computer Science. Vol
Private information retrieval (2,163 words) [view diff] no match in snippet view article find links to article
retrieval". Proceedings of the 38th Annual Symposium on Foundations of Computer Science. Miami Beach, Florida, USA: IEEE Computer Society. pp. 364–373. CiteSeerX 10
Jerome R. Cox Jr. (2,078 words) [view diff] no match in snippet view article find links to article
chairman of the Department of Computer Science at Washington University in St. Louis and senior professor emeritus of Computer Science at Washington University
Shakey the robot (1,025 words) [view diff] no match in snippet view article find links to article
on the fields of robotics and artificial intelligence, as well as computer science in general. Some of the more notable results include the development
Cryptocurrency wallet (3,557 words) [view diff] no match in snippet view article find links to article
UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Science Computer Science Curriculum: 48 – via core.ac.uk. Shaik, Cheman
StarLogo (561 words) [view diff] no match in snippet view article find links to article
simulation interface, and splitting the collision primitive into its component halves, with each breed having collision code on its own program page. NetLogo
Biswa Bangla Biswabidyalay (162 words) [view diff] no match in snippet view article find links to article
Assamese, Arabic), Department of science (Botany, Library Science, Computer Science) List of universities in India Visva-Bharati University University
Greenfoot (1,183 words) [view diff] no match in snippet view article find links to article
the 10th annual SIGCSE conference on Innovation and technology in computer science education. ACM. pp. 59–63. doi:10.1145/1067445.1067465. ISBN 1595930248
2D computer graphics (3,728 words) [view diff] no match in snippet view article find links to article
and by techniques specific to them. It may refer to the branch of computer science that comprises such techniques or to the models themselves. 2D computer
Computer network (9,915 words) [view diff] no match in snippet view article find links to article
messaging applications. Computer networking may be considered a branch of computer science, computer engineering, and telecommunications, since it relies on the
Element distinctness problem (884 words) [view diff] no match in snippet view article find links to article
bounds for the collision and the element distinctness problems. Proceedings of the 43rd Symposium on Foundations of Computer Science. pp. 513–519.
János Pach (1,297 words) [view diff] no match in snippet view article find links to article
Sciences at New York University (since 1986), Distinguished Professor of Computer Science at City College of New York (1992-2011), and Neilson Professor at Smith
ChaCha20-Poly1305 (1,403 words) [view diff] no match in snippet view article find links to article
Message-Authentication Code", Fast Software Encryption, Lecture Notes in Computer Science, Berlin, Heidelberg: Springer Berlin Heidelberg, vol. 3557, pp. 32–49
James Hendler (1,491 words) [view diff] no match in snippet view article find links to article
Knowledge Discovery and held joint appointments in the Department of Computer Science, the Institute for Advanced Computer Studies and the Institute for
Marc Stevens (cryptology) (279 words) [view diff] no match in snippet view article
known for his work on cryptographic hash collisions and for the creation of the chosen-prefix hash collision tool HashClash as part of his master's degree
OMPL (400 words) [view diff] no match in snippet view article find links to article
planning algorithms, which means there is no environment specification, no collision detection or visualization. This is intentional as the library is designed
Mike Scioscia (2,670 words) [view diff] no match in snippet view article find links to article
however, has claimed he had an even harder plate collision the following season. The one collision that absolutely I got hit harder than anybody else
2010 in Poland (1,482 words) [view diff] no match in snippet view article find links to article
Elblag and totalled 24 636 124.00 PLN. 30 April – The Department of Computer Science of PKP turned off the last operating system in Poland based on a computer
Virtual collective consciousness (1,599 words) [view diff] no match in snippet view article find links to article
Arab world. Various theoretical references ranging from sociology to computer science were mentioned in order to account for the key features that render
MilkyWay@home (2,641 words) [view diff] no match in snippet view article find links to article
collaboration between the Rensselaer Polytechnic Institute's departments of Computer Science and Physics, Applied Physics and Astronomy and is supported by the
Self-driving car (14,134 words) [view diff] no match in snippet view article find links to article
CMU". Proceedings of the 1986 ACM fourteenth annual conference on Computer science - CSC '86. pp. 71–80. doi:10.1145/324634.325197. ISBN 9780897911771
Bloom filter (10,708 words) [view diff] no match in snippet view article find links to article
Symposium (PDF), Lecture Notes in Computer Science, vol. 4168, Springer-Verlag, Lecture Notes in Computer Science 4168, pp. 456–467, doi:10.1007/11841036
B612 Foundation (13,906 words) [view diff] no match in snippet view article find links to article
helped identify dangerous asteroids and other NEOs that pose a risk of collision with Earth. In the absence of substantive planetary defense provided by
List of University of Warwick people (2,734 words) [view diff] no match in snippet view article find links to article
leadership of the Labour Party Sir David Davis (Molecular Science/Computer Science, 1968–1971) – Conservative MP and former Secretary of State for Exiting
Key stretching (1,776 words) [view diff] no match in snippet view article find links to article
Tatsunokuchi, Japan, September 17-19, 1997, Proceedings. Lecture Notes in Computer Science. Vol. 1396. Springer. pp. 121–134. doi:10.1007/BFb0030415. McMillan
Non-interactive zero-knowledge proof (2,636 words) [view diff] no match in snippet view article find links to article
collision resistance to succinct non-interactive arguments of knowledge, and back again". Proceedings of the 3rd Innovations in Theoretical Computer Science
Machine learning (14,171 words) [view diff] no match in snippet view article find links to article
: 708–710, 755  Neural networks research had been abandoned by AI and computer science around the same time. This line, too, was continued outside the AI/CS
Future Circular Collider (5,236 words) [view diff] no match in snippet view article find links to article
for collision types: FCC-hh, for hadron-hadron collisions, including proton-proton and heavy ion collisions, FCC-ee, for electron-positron collisions, and
Biometrics (7,381 words) [view diff] no match in snippet view article find links to article
Biometric authentication (or realistic authentication) is used in computer science as a form of identification and access control. It is also used to
Natural computing (5,127 words) [view diff] no match in snippet view article find links to article
pathways, quorum sensing in bacteria, cell-mediated immunity), as well as computer science applications such as computer graphics, public-key cryptography, approximation
CERN (10,568 words) [view diff] no match in snippet view article find links to article
proton beams with 3.5 TeV of energy per proton, resulting in a 7 TeV collision energy. However, this was just the start of what was needed for the expected
Galaxy Game (2,846 words) [view diff] no match in snippet view article find links to article
processor became faulty. It was restored and placed in the Stanford computer science department in 1997, then moved to the Computer History Museum in 2000
ALOHAnet (3,827 words) [view diff] no match in snippet view article find links to article
ALOHA, improved the efficiency of the protocol by reducing the chance of collision, improving throughput to 36.8%. ALOHAnet became operational in June 1971
Mobile robot (1,567 words) [view diff] no match in snippet view article find links to article
dead reckoning, tactile and proximity sensing, triangulation ranging, collision avoidance, position location and other specific applications. Actuators
GOST (hash function) (2,040 words) [view diff] no match in snippet view article
David (ed.). Advances in Cryptology – CRYPTO 2008. Lecture Notes in Computer Science. Vol. 5157. Germany: Springer Berlin Heidelberg. pp. 162–178. doi:10
Blackstone Valley Regional Vocational Technical High School (602 words) [view diff] no match in snippet view article find links to article
English Literature & Composition, US History, Biology, Calculus, and Computer Science. Only 56% of students took an AP course and took the AP Test but only
Coordinated vulnerability disclosure (893 words) [view diff] no match in snippet view article find links to article
Jeroen (2018-11-19). "Don't shoot the messenger! A criminological and computer science perspective on coordinated vulnerability disclosure" (PDF). Crime Science
Brute-force attack (2,139 words) [view diff] no match in snippet view article find links to article
Dynamic Reverse Engineering", Information Hiding, Lecture Notes in Computer Science, vol. 6958, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 270–284
Double-spending (1,018 words) [view diff] no match in snippet view article find links to article
(SSRN). Accessed 24 December 2017. Mark Ryan. "Digital Cash". School of Computer Science, University of Birmingham. Retrieved 2017-05-27. Jaap-Henk Hoepman
Babylon.js (1,282 words) [view diff] no match in snippet view article find links to article
Laurence. "Digital Pompéi". The National Institute for Research in Computer Science and Control (Inria). Retrieved 2018-09-07. "Sponza Palace". Retrieved
Tabulation hashing (2,744 words) [view diff] no match in snippet view article find links to article
In computer science, tabulation hashing is a method for constructing universal families of hash functions by combining table lookup with exclusive or operations
Here document (4,648 words) [view diff] no match in snippet view article find links to article
whitespace indentation for structure, making it resistant to delimiter collision and capable representing multi-line strings with folded string literals:
Daniel Thalmann (715 words) [view diff] no match in snippet view article find links to article
Certificate in Statistics and Computer Science (1972) both from the University of Geneva, he earned a PhD in Computer Science (1977) also from the University
Claw finding problem (582 words) [view diff] no match in snippet view article find links to article
(November 2009). "Claw Finding Algorithms Using Quantum Walk". Theoretical Computer Science. 410 (50): 5285–5297. arXiv:0708.2584. doi:10.1016/j.tcs.2009.08.030
Here document (4,648 words) [view diff] no match in snippet view article find links to article
whitespace indentation for structure, making it resistant to delimiter collision and capable representing multi-line strings with folded string literals:
Paradox (2,949 words) [view diff] no match in snippet view article find links to article
ultimate passion of the understanding to will the collision, although in one way or another the collision must become its downfall. This, then, is the ultimate
Siconos (484 words) [view diff] no match in snippet view article find links to article
Study of the effects of forces on undeformable bodies Collision detection – Term in computer science Complementarity theory – type of mathematical optimization
Florida Space Institute (849 words) [view diff] no match in snippet view article find links to article
Weidling, R. and Blum, J., 2016. Submillimetre-sized dust aggregate collision and growth properties-Experimental study of a multi-particle system on
Humanoid robot (5,048 words) [view diff] no match in snippet view article find links to article
measurements for robot navigation on inclined surfaces". Procedia Computer Science. Complex adaptive sysytems. 6: 413–418. doi:10.1016/j.procs.2011.08
Straight skeleton (2,179 words) [view diff] no match in snippet view article find links to article
collides with a nonadjacent edge, the polygon is split in two by the collision, and the process continues in each part. The straight skeleton is the
Rabin signature algorithm (1,849 words) [view diff] no match in snippet view article find links to article
(Technical report). Cambridge, MA, United States: MIT Laboratory for Computer Science. TR-212. Bellare, Mihir; Rogaway, Phillip (May 1996). Maurer, Ueli
Oussama Khatib (1,103 words) [view diff] no match in snippet view article find links to article
Oussama Khatib (Arabic: أسامة الخطيب) is a roboticist and a professor of computer science at Stanford University, and a Fellow of the IEEE. He is credited with
Accelerometer (4,677 words) [view diff] no match in snippet view article find links to article
Acquisition and Processing of Gait Parameters – Springer. Lecture Notes in Computer Science. Vol. 6437. pp. 410–421. doi:10.1007/978-3-642-16761-4_36. ISBN 978-3-642-16760-7
Numerical control (3,199 words) [view diff] no match in snippet view article find links to article
Lindgren, Nilo A. (1985), A Century of Electrical Engineering and Computer Science at MIT, MIT Press, ISBN 0-262-23119-0. Herrin, Golden E. "Industry
Multiverse (7,299 words) [view diff] no match in snippet view article find links to article
Scientist's View of Life, the Universe, and Everything. Lecture Notes in Computer Science, pp. 201–208, Springer: IDSIA – Dalle Molle Institute for Artificial
Kounotori 8 (1,066 words) [view diff] no match in snippet view article find links to article
satellite optical communication demonstration co-developed with Sony Computer Science Laboratories [ja] JAXA experiment Hourglass, which will investigate
Random oracle (1,775 words) [view diff] no match in snippet view article find links to article
world". Advances in Cryptology – ASIACRYPT 2011. Lecture Notes in Computer Science. Vol. 7073. Springer. pp. 41–69. arXiv:1008.0931. doi:10.1007/978-3-642-25385-0_3
Deaths in January 1992 (3,125 words) [view diff] no match in snippet view article find links to article
2015). "Happy 109th birthday to Yale alumna Grace Hopper, a pioneer in computer science". YaleNews. Retrieved July 20, 2022. "Virginia Field - Broadway Cast
Cuckoo hashing (2,523 words) [view diff] no match in snippet view article find links to article
Cuckoo hashing is a scheme in computer programming for resolving hash collisions of values of hash functions in a table, with worst-case constant lookup
Block cipher mode of operation (5,840 words) [view diff] no match in snippet view article find links to article
Authentication Modes (PDF). Fast Software Encryption 2001. Lecture Notes in Computer Science. Vol. 2355. Berlin: Springer. pp. 92–108. doi:10.1007/3-540-45473-X_8
Vehicle infrastructure integration (1,767 words) [view diff] no match in snippet view article find links to article
transport engineering, electrical engineering, automotive engineering, and computer science. VII specifically covers road transport, although similar technologies
Computer forensics (2,976 words) [view diff] no match in snippet view article find links to article
investigation into the intrusion and theft. Both areas require knowledge of computer science. Computer forensics are used to convict those involved in physical
Shahrzad Rafati (878 words) [view diff] no match in snippet view article find links to article
Columbia, Canada as a teenager. In 2005, she completed her BSc in computer science at the University of British Columbia. Rafati also studied French at
Geometry processing (3,968 words) [view diff] no match in snippet view article find links to article
is an area of research that uses concepts from applied mathematics, computer science and engineering to design efficient algorithms for the acquisition
Group testing (9,753 words) [view diff] no match in snippet view article find links to article
Group testing has many applications, including statistics, biology, computer science, medicine, engineering and cyber security. Modern interest in these
Grid (spatial index) (903 words) [view diff] no match in snippet view article
consideration. In computer science, one often needs to find out all cells a ray is passing through in a grid (for raytracing or collision detection); this
Amar Gupta (4,481 words) [view diff] no match in snippet view article find links to article
Sciences (IMES), Department of Electrical Engineering & Computer Science, and the Computer Science & Artificial Intelligence Lab (CSAIL) on innovation and
List of unsolved problems in mathematics (19,343 words) [view diff] no match in snippet view article find links to article
come from many areas of mathematics, such as theoretical physics, computer science, algebra, analysis, combinatorics, algebraic, differential, discrete
Robotics (14,147 words) [view diff] no match in snippet view article find links to article
design and construction of the physical structures of robots, while in computer science, robotics focuses on robotic automation algorithms. Other disciplines
DRDO Netra (1,407 words) [view diff] no match in snippet view article find links to article
user-input, and is controlled by an on-board auto-pilot with the help of anti-collision sensors. The user interface offers waypoint navigation, in which the user
Automotive electronics (2,275 words) [view diff] no match in snippet view article find links to article
Belzer, Jack; Holzman, Albert G.; Kent, Allen (1978). Encyclopedia of Computer Science and Technology: Volume 10 - Linear and Matrix Algebra to Microorganisms:
Accumulator (cryptography) (2,795 words) [view diff] no match in snippet view article
Signatures" (PDF). Advances in Cryptology — EUROCRYPT '93. Lecture Notes in Computer Science. Vol. 765. pp. 274–285. doi:10.1007/3-540-48285-7_24. ISBN 978-3-540-57600-6
Lamport signature (1,972 words) [view diff] no match in snippet view article find links to article
operations to find a collision under a classical computing model. According to Grover's algorithm, finding a preimage collision on a single invocation
CBC-MAC (2,748 words) [view diff] no match in snippet view article find links to article
(PDF). Applied Cryptography and Network Security. Lecture Notes in Computer Science. Vol. 5536. Berlin, Heidelberg: Springer Berlin Heidelberg. pp. 53–70
J.J. Garcia-Luna-Aceves (672 words) [view diff] no match in snippet view article find links to article
Computer Engineering. Until 2023, he was the Distinguished Professor of Computer Science and Engineering at University of California at Santa Cruz UCSC, holding
Count sketch (1,392 words) [view diff] no match in snippet view article find links to article
P. "Sketching as a Tool for Numerical Linear Algebra." Theoretical Computer Science 10.1-2 (2014): 1–157. Larsen, Kasper Green, Rasmus Pagh, and Jakub
John von Neumann (23,221 words) [view diff] no match in snippet view article find links to article
hardware design, to theoretical computer science to scientific computing, and to the philosophy of computer science. Von Neumann consulted for the Army's
Superellipsoid (2,148 words) [view diff] no match in snippet view article find links to article
available. This makes it a desirable geometric primitive for robot grasping, collision detection, and motion planning. A handful of notable mathematical figures
General-purpose computing on graphics processing units (6,690 words) [view diff] no match in snippet view article find links to article
with Application to GPU Computing. Ph.D. dissertation, Department of Computer Science, University of Virginia. Dec. 2011. Sean Baxter. Modern gpu Archived
Paula Long (666 words) [view diff] no match in snippet view article find links to article
up in Enfield, Connecticut. She received her bachelor's degree in computer science from Westfield State University in Westfield, Massachusetts. Long began
Fault tolerance (5,085 words) [view diff] no match in snippet view article find links to article
enhancement Resilience (network) Robustness (computer science) Rollback (data management) Self-management (computer science) Crash-only software Adaptive Fault
Radio (14,982 words) [view diff] no match in snippet view article find links to article
(2000). "standard frequency and time signal". Computer Science and Communications Dictionary. Computer Science and Communications Dictionary. Springer. p
NETES Institute of Technology and Science Mirza (1,503 words) [view diff] no match in snippet view article find links to article
of Engineering (BE) and Bachelor of Technology (BTech) courses in computer science and engineering, electrical and electronic engineering, electronics
Bristol-Plymouth Regional Technical School (794 words) [view diff] no match in snippet view article find links to article
Statistics, and the Computer Networking Technology program offers AP Computer Science Principles, both courses for Juniors. Bristol-Plymouth has nineteen
Unconventional computing (4,547 words) [view diff] no match in snippet view article find links to article
computer architecture and the Turing machine, which have dominated computer science for more than half a century". These methods model their computational
Static hashing (449 words) [view diff] no match in snippet view article find links to article
Randomness in Computing, Hashing Unit. United States Naval Academy, Computer Science Department. Michael Fredman; János Komlós; Endre Szemerédi (1984).
Anton Levy (756 words) [view diff] no match in snippet view article find links to article
earned a Bachelor of Science in Commerce with degrees in Finance and Computer Science from the University of Virginia, and a Master of Business Administration
Scaling (geometry) (1,444 words) [view diff] no match in snippet view article
(mathematics) Scale (disambiguation) Scale (ratio) Scale (map) Scale factor (computer science) Scale factor (cosmology) Scales of scale models Scaling in statistical
Inline function (3,153 words) [view diff] no match in snippet view article find links to article
during compiling, which, if the function has external linkage, causes a collision during linking (it violates uniqueness of external symbols). C and C++
Homomorphic signatures for network coding (3,061 words) [view diff] no match in snippet view article find links to article
if it is encrypted by either forging the signature or by producing a collision under the hash function. This will give an attacker access to the packets
Kyle Vogt (817 words) [view diff] no match in snippet view article find links to article
he graduated from Shawnee Mission Northwest High School. He studied computer science and electrical engineering as an undergraduate student at the Massachusetts
Video synopsis (963 words) [view diff] no match in snippet view article find links to article
Further information, published papers and video clips from the School of Computer Science, The Hebrew University of Jerusalem BriefCam company website Includes
Arjen Lenstra (539 words) [view diff] no match in snippet view article find links to article
electronic mail", in Proceedings of Eurocrypt '89, Lecture Notes in Computer Science, Volume 434, pp. 355-371, 1990. A. K. Lenstra, H. W. Lenstra, Jr.,
Vein matching (2,290 words) [view diff] no match in snippet view article find links to article
Authentication", Advances in Visual Information Systems, Lecture Notes in Computer Science, vol. 4781, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 154–164
Dynamical simulation (1,370 words) [view diff] no match in snippet view article find links to article
games. Body movement is calculated using time integration methods. In computer science, a program called a physics engine is used to model the behaviors of
Arjen Lenstra (539 words) [view diff] no match in snippet view article find links to article
electronic mail", in Proceedings of Eurocrypt '89, Lecture Notes in Computer Science, Volume 434, pp. 355-371, 1990. A. K. Lenstra, H. W. Lenstra, Jr.,
Side-channel attack (3,375 words) [view diff] no match in snippet view article find links to article
Goubin and J Patarin, in Proceedings of CHES'99, Lecture Notes in Computer Science Nr 1717, Springer-Verlag Grabher, Philipp; et al. (2007). "Cryptographic
Deaths in July 2006 (7,696 words) [view diff] no match in snippet view article find links to article
Gerhard Fischer (in German) "Joseph Goguen Obituary". Department of Computer Science and Engineering, University of California, San Diego. Archived from
Hashcash (2,644 words) [view diff] no match in snippet view article find links to article
Junk Mail". Advances in Cryptology — CRYPTO' 92. Lecture Notes in Computer Science. Vol. 740. Springer. pp. 139–147. doi:10.1007/3-540-48071-4_10.
IEEE 802.11 (legacy mode) (1,020 words) [view diff] no match in snippet view article
Specifications and Challenges (PDF). World Congress on Engineering and Computer Science. 2014. IEEE Standard for Information Technology- Telecommunications
Deaths in May 2022 (14,663 words) [view diff] no match in snippet view article find links to article
- mówiła (in Polish) Joel Moses, Institute Professor Emeritus and computer science trailblazer, dies at 80 Punjabi singer Sidhu Moose Wala shot dead day
David Boggs (866 words) [view diff] no match in snippet view article find links to article
01. Retrieved April 6, 2011. Stanford University (August 1, 1999). "Computer Science Department alumni newsletter". Archived from the original on September
DRDO Ghatak (1,560 words) [view diff] no match in snippet view article find links to article
data links, fire control radars, identification of friend or foe, and collision avoidance systems, they will be highly intelligent drones", he also added
Painter's algorithm (1,386 words) [view diff] no match in snippet view article find links to article
Shooting, Depth Orders and Hidden Surface Removal. Lecture Notes in Computer Science. Vol. 703. Springer. p. 130. ISBN 9783540570202.. Warnock, John E.
Maurice Ashley (1,601 words) [view diff] no match in snippet view article find links to article
documentary (trailer). Shen, S.M. Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology. Thesis/dissertation. Design
Unmanned aerial vehicle (12,562 words) [view diff] no match in snippet view article find links to article
Cyber-Physical Systems" (PDF). Dept. of Electrical Engineering and Computer Science Vanderbilt University, Nashville. Archived (PDF) from the original
Mode (user interface) (3,172 words) [view diff] no match in snippet view article
interaction Interaction design Modal window Modalities and modes State (computer science) Text mode Usability Glossary: modeless Archived 2007-10-22 at the
Rainbows End (Vinge novel) (1,083 words) [view diff] no match in snippet view article
and Robert Gu's technical advisor Xiu Xiang - former Professor of Computer Science and Fairmont High School pupil Winston Blount - former Dean at UC San
Sami Haddadin (2,136 words) [view diff] no match in snippet view article find links to article
Finland and in Munich. He holds degrees in electrical engineering, computer science and technology management from the Technical University of Munich and
Jaccard index (3,753 words) [view diff] no match in snippet view article find links to article
empty, then J(A,B) = 0. The Jaccard coefficient is widely used in computer science, ecology, genomics, and other sciences, where binary or binarized data
Deaths in April 2015 (11,326 words) [view diff] no match in snippet view article find links to article
Kentucky (2001–2008), liver cancer. Paul Hudak, 62, American professor of computer science, leukemia. Milap Chand Jain, 86, Indian judge and politician, Governor
Latin letters used in mathematics, science, and engineering (3,829 words) [view diff] no match in snippet view article find links to article
Retrieved 2022-03-21. "Hexadecimal - Hexadecimal and character sets - GCSE Computer Science Revision". BBC Bitesize. Retrieved 2022-03-21. "DECIMAL function".
Still life (cellular automaton) (1,139 words) [view diff] no match in snippet view article
and Practice of Constraint Programming - CP 2002. Lecture Notes in Computer Science. Vol. 2470. Springer-Verlag. pp. 89–94. doi:10.1007/3-540-46135-3_27
Deaths in August 2018 (12,106 words) [view diff] no match in snippet view article find links to article
Soviet Crooner and Lawmaker Iosif Kobzon dies Ray Kubala Stanford computer science pioneer Zohar Manna dies at age 79 'ER' Actress Vanessa Marquez Shot
Cyclic cellular automaton (1,224 words) [view diff] no match in snippet view article find links to article
Eduardo (2004). "Dynamic of cyclic automata over Z^2". Theoretical Computer Science. 322 (2): 369–381. doi:10.1016/j.tcs.2004.03.018. hdl:10533/175114
Cyber–physical system (2,200 words) [view diff] no match in snippet view article find links to article
Technologies for Embedded and Ubiquitous Systems. Lecture Notes in Computer Science. Vol. 5860. p. 36. doi:10.1007/978-3-642-10265-3_4. ISBN 978-3-642-10264-6
Algodoo (2,288 words) [view diff] no match in snippet view article find links to article
interactive 2D physics simulator for his master's thesis project in computer science at Umeå University in Umeå, Sweden. This project was released for public
Deaths in July 2020 (16,873 words) [view diff] no match in snippet view article find links to article
singer ("Come Away Melinda"). Ann Syrdal, 74, American psychologist and computer science researcher, developed the first female-sounding voice synthesizer.
Spoofing attack (3,005 words) [view diff] no match in snippet view article find links to article
Based on Automatically Labeled Telephone Speech. Lecture Notes in Computer Science. Vol. 8773. Cham: Springer International Publishing. pp. 475–481. doi:10
Block cellular automaton (2,589 words) [view diff] no match in snippet view article find links to article
reversible block cellular automata", Discrete Mathematics and Theoretical Computer Science, AA: 145–154, archived from the original on 2011-05-15 Wolfram, Stephen
Jannick Rolland (1,591 words) [view diff] no match in snippet view article find links to article
Rolland completed her postdoctoral fellowship in the Department of Computer Science at the University of North Carolina at Chapel Hill, where she focused
Leader election (4,329 words) [view diff] no match in snippet view article find links to article
"Election in Mesh, Cube and Complete Networks", Seminar on Theoretical Computer Science. M. Refai, A. Sharieh and . Alsmmari, 2010, "Leader Election Algorithm
Extendable-output function (394 words) [view diff] no match in snippet view article find links to article
Ciphers" (PDF). Advances in Cryptology – CRYPTO 2020. Lecture Notes in Computer Science. Vol. 12172. Springer International Publishing. pp. 249–278. doi:10
Franz-Erich Wolter (1,646 words) [view diff] no match in snippet view article find links to article
Institute of Man-Machine Communication and is the Dean of Studies in Computer Science at Leibniz University Hannover. He is the founder and actual director
Index of cryptography articles (2,943 words) [view diff] no match in snippet view article find links to article
(cryptography) • Code talker • Codress message • Cold boot attack • Collision attack • Collision resistance • Colossus computer • Combined Cipher Machine • Commitment
N-body problem (8,460 words) [view diff] no match in snippet view article find links to article
1–49. These authors were from the Department of Astronautics and Computer Science, United States Air Force Academy. Their textbook is not filled with
Kamiak High School (1,365 words) [view diff] no match in snippet view article find links to article
English Language and Composition, English Literature and Composition, Computer Science, Biology, Chemistry, Physics C: Mechanics, Physics C: Electricity and
Slade School of Fine Art (1,072 words) [view diff] no match in snippet view article find links to article
a variety of disciplines, including psychology, architecture, and computer science. Throughout 1998, SCEMFA collaborated with Channel 4 UK to organise
Virtual reality (11,881 words) [view diff] no match in snippet view article find links to article
Richards. (New York: Grove Weidenfeld, 1958). Faisal, Aldo (2017). "Computer science: Visionary of virtual reality". Nature. 551 (7680): 298–299. Bibcode:2017Natur
Cognitive ergonomics (2,111 words) [view diff] no match in snippet view article find links to article
Interface Design – Discussion of a Moving Science". Journal of Universal Computer Science. 14 (16): 2614–2629. Division of Neuroergonomics Archived 2011-04-26
Deaths in August 2015 (9,405 words) [view diff] no match in snippet view article find links to article
Elizabethtown College, dies at age 85 Joseph Traub, Who Helped Bring Computer Science to Universities, Dies at 83 Justin Wilson passes away after IndyCar
HAT-trie (707 words) [view diff] no match in snippet view article find links to article
described in an article published in Proc. Thirtieth Australasian Computer Science Conference (ACSC2007), Ballarat Australia. CRPIT, 62. Dobbie, G., Ed
Robert E. Machol (1,271 words) [view diff] no match in snippet view article find links to article
and applied research in systems engineering, operations research, computer science, and electronics under contract to the Department of Defense. Its principal
Wi-Fi (12,941 words) [view diff] no match in snippet view article find links to article
Wireless Networks". Dayton, Ohio: Wright State University Department of Computer Science and Engineering. Archived from the original on 5 March 2010. Retrieved
Information security (22,121 words) [view diff] no match in snippet view article find links to article
of the 23rd Annual ACM Conference on Innovation and Technology in Computer Science Education. ACM. pp. 36–54. doi:10.1145/3293881.3295778. hdl:1822/71620
South Garland High School (1,402 words) [view diff] no match in snippet view article find links to article
These classes include: Biology Calculus AB Chemistry Computer Science A Principles of Computer Science English Language and Composition English Literature
Monte Carlo method (9,816 words) [view diff] no match in snippet view article find links to article
"Parallel Monte-Carlo Tree Search". Computers and Games. Lecture Notes in Computer Science. Vol. 5131. pp. 60–71. CiteSeerX 10.1.1.159.4373. doi:10.1007/978-3-540-87608-3_6
LSH (hash function) (3,102 words) [view diff] no match in snippet view article
Information Security and Cryptology - ICISC 2014. Lecture Notes in Computer Science. Vol. 8949. Springer International Publishing. pp. 286–313. doi:10
Quotient filter (2,664 words) [view diff] no match in snippet view article find links to article
fingerprint—a hard collision—or because even when the keys' fingerprints are distinct they can have the same quotient—a soft collision. If the canonical
Wi-Fi 6 (1,476 words) [view diff] no match in snippet view article find links to article
Specifications and Challenges (PDF). World Congress on Engineering and Computer Science. 2014. IEEE Standard for Information Technology- Telecommunications
Neural network (machine learning) (16,980 words) [view diff] no match in snippet view article
Systems (PDF). The Kluwer International Series in Engineering and Computer Science. Vol. 80. Norwell, MA: Kluwer Academic Publishers. doi:10.1007/978-1-4613-1639-8
Cache-oblivious algorithm (1,822 words) [view diff] no match in snippet view article find links to article
Cache-oblivious algorithms (PDF). Proc. IEEE Symp. on Foundations of Computer Science (FOCS). pp. 285–297. Daniel Sleator, Robert Tarjan. Amortized Efficiency
Quadtree (4,690 words) [view diff] no match in snippet view article find links to article
hidden surface algorithm for computer generated halftone pictures". Computer Science Department, University of Utah. TR 4-15. Schneier, M. (1981). "Two
Revathi Advaithi (1,719 words) [view diff] no match in snippet view article find links to article
inclusion in the workforce, as well as STEM education for girls and computer science education. In past interviews, Advaithi often says that she is inspired
Revathi Advaithi (1,719 words) [view diff] no match in snippet view article find links to article
inclusion in the workforce, as well as STEM education for girls and computer science education. In past interviews, Advaithi often says that she is inspired
Pinto Bean (squirrel) (566 words) [view diff] no match in snippet view article
died in Champaign on October 8, 2022, presumably due to a motor vehicle collision. Pinto Bean has been called a "minor celebrity" and a "grassroots, unofficial
Wi-Fi 6 (1,476 words) [view diff] no match in snippet view article find links to article
Specifications and Challenges (PDF). World Congress on Engineering and Computer Science. 2014. IEEE Standard for Information Technology- Telecommunications
Rapidly exploring random tree (2,651 words) [view diff] no match in snippet view article find links to article
A new tool for path planning" (PDF). Technical Report (TR 98–11). Computer Science Department, Iowa State University. LaValle, Steven M.; Kuffner Jr.
Deaths in September 1999 (3,703 words) [view diff] no match in snippet view article find links to article
aeronautical engineer. W. Richard Stevens, 48, American author of computer science books. Doreen Valiente, 77, English wiccan, pancreatic cancer. Romolo
PH-tree (4,059 words) [view diff] no match in snippet view article find links to article
Big Data Analytics and Knowledge Discovery (PDF). Lecture Notes in Computer Science. Vol. 10440. pp. 164–172. doi:10.1007/978-3-319-64283-3_12. ISBN 978-3-319-64282-6
Theory (4,337 words) [view diff] no match in snippet view article find links to article
anthropogenic global warming (AGW) theories (due to human activity) Computer Science: Automata theory — Queueing theory Cosmology: Big Bang Theory — Cosmic
MMH-Badger MAC (2,982 words) [view diff] no match in snippet view article find links to article
Message Authentication in the Gbit/second rates. Lecture Notes in Computer Science. Vol. 1267. pp. 172–189. doi:10.1007/BFb0052345. ISBN 978-3-540-63247-4
Perceptual hashing (1,425 words) [view diff] no match in snippet view article find links to article
Gollmann, D. (eds.). Secure IT Systems. NordSec 2013. Lecture Notes in Computer Science. Vol. 8208. Berlin, Heidelberg: Springer. doi:10.1007/978-3-642-41488-6_21
Superquadrics (1,307 words) [view diff] no match in snippet view article find links to article
Hassner, Tal (eds.). Computer Vision – ECCV 2022. Lecture Notes in Computer Science. Vol. 13687. Cham: Springer Nature Switzerland. pp. 479–495. arXiv:2203
Bobby Bonilla (2,158 words) [view diff] no match in snippet view article find links to article
Institute of Technology in Old Westbury, New York pursuing a degree in computer science. He was signed by the Pittsburgh Pirates after being spotted by scout
Network topology (5,208 words) [view diff] no match in snippet view article find links to article
OCLC 359673774. Retrieved 2016-03-26. Bradley, Ray (2001). Understanding Computer Science (for Advanced Level): The Study Guide. Cheltenham: Nelson Thornes.
Great Hanshin earthquake (3,101 words) [view diff] no match in snippet view article find links to article
Japanese citizens and foreign students at Kobe University Kansai Area Earthquake information - Sony Computer Science Laboratory Inc. [ja] (ソニーコンピュータサイエンス研究所)
Relative convex hull (1,097 words) [view diff] no match in snippet view article find links to article
(eds.), Digital and Image Geometry: Advanced Lectures, Lecture Notes in Computer Science, vol. 2243, Springer, pp. 365–386, doi:10.1007/3-540-45576-0_22
Isolation (database systems) (2,061 words) [view diff] no match in snippet view article
Systems", Chapter 23, Evolution of Processing Systems, Department of Computer Science, Stony Brook University, retrieved 20 March 2014, http://www.cs.sunysb
Deaths in August 1995 (5,836 words) [view diff] no match in snippet view article find links to article
player and coach. Gerard Salton, 68, German-American professor of Computer Science. Page Smith, 77, American historian, professor, author, and newspaper
List of datasets for machine-learning research (13,264 words) [view diff] no match in snippet view article find links to article
Machine Learning and Knowledge Discovery in Databases. Lecture Notes in Computer Science. Vol. 6913. Berlin, Heidelberg: Springer Berlin Heidelberg. pp. 597–612
Peloton (4,362 words) [view diff] no match in snippet view article find links to article
cycling strategies for two cooperating Riders. International Journal of Computer Science in Sport, 16(2), pp.88-100. Wikimedia Commons has media related to
Diver communications (8,681 words) [view diff] no match in snippet view article find links to article
Quarterly Progress and Status Report. STL-QPSR (Report). Vol. 9. KTH Computer science and communication. pp. 007–017. CiteSeerX 10.1.1.415.541. Salter, Marilyn
IEEE Standards Association (2,504 words) [view diff] no match in snippet view article find links to article
standards PMBOK SWEBOK ITIL IREB OMG Glossaries Artificial intelligence Computer science Electrical and electronics engineering Outlines Outline of software
LP-type problem (4,687 words) [view diff] no match in snippet view article find links to article
Maurer, H. (ed.), New Results and New Trends in Computer Science (PDF), Lecture Notes in Computer Science, vol. 555 (555 ed.), Springer-Verlag, pp. 359–370
Internet of vehicles (720 words) [view diff] no match in snippet view article find links to article
distributed architecture for real-time traffic data analytics". Procedia Computer Science. 130: 480–487. doi:10.1016/j.procs.2018.04.055. Maglaras, Leandros;
Cache timing attack (303 words) [view diff] no match in snippet view article find links to article
Cryptographic Hardware and Embedded Systems - CHES 2006. Lecture Notes in Computer Science. Vol. 4249. Berlin, Heidelberg: Springer. pp. 201–215. doi:10.1007/11894063_16
Technische Hochschule Ingolstadt (2,990 words) [view diff] no match in snippet view article find links to article
five faculties of: Electrical Engineering and Information Technology, Computer Science, Mechanical Engineering, Engineering and Management, and The THI Business
IEEE 802.11 (10,698 words) [view diff] no match in snippet view article find links to article
Specifications and Challenges (PDF). World Congress on Engineering and Computer Science. 2014. IEEE Standard for Information Technology- Telecommunications
Shandong University (9,182 words) [view diff] no match in snippet view article find links to article
Chemistry and Chemical Engineering School of Civil Engineering School of Computer Science and Technology School of Control Science and Engineering School of
Multi-agent pathfinding (3,031 words) [view diff] no match in snippet view article find links to article
an instance of multi-agent planning and consists in the computation of collision-free paths for a group of agents from their location to an assigned target
Ryan Holmes (1,056 words) [view diff] no match in snippet view article find links to article
school and at home. In the mid 1990s, Holmes began taking business and computer science courses at Okanagan College but he eventually dropped out. In 2018
List of computing and IT abbreviations (6,599 words) [view diff] no match in snippet view article find links to article
CRUD—Create, Read, Update and Delete CS—Cable Select CS—Computer Science CSE—Computer Science and Engineering CSI—Common System Interface CSM—Compatibility
Deaths in January 2016 (13,092 words) [view diff] no match in snippet view article find links to article
Minnesota Vikings, Denver Broncos), cancer. Peter Naur, 87, Danish computer science pioneer, Turing Award winner. Georg Nees, 89, German academic and artist
Hardware stress test (1,414 words) [view diff] no match in snippet view article find links to article
SW". Computer Safety, Reliability, and Security. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer. 2788: 289–302. doi:10.1007/978-3-540-39878-3_23
Rendering (computer graphics) (7,533 words) [view diff] no match in snippet view article
v t e Computer science Note: This template roughly follows the 2012 ACM Computing Classification System. Hardware Printed circuit board Peripheral Integrated
Deaths in April 2003 (4,781 words) [view diff] no match in snippet view article find links to article
American computer scientist, advocate for the advancement of women in computer science, brain cancer. Gerald Emmett Carter, 91, Canadian Roman Catholic prelate
Chromosome (genetic algorithm) (2,687 words) [view diff] no match in snippet view article
Real-World Applications of Evolutionary Computing, Lecture Notes in Computer Science, vol. 1803, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 330–341
Duke University (17,386 words) [view diff] no match in snippet view article find links to article
several metamorphic events, including the collision of Carolinia with Laurentia. The Carolinia-Laurentia collision started around 375 Mya, which coincides
Juyang Weng (2,895 words) [view diff] no match in snippet view article find links to article
author, and academic. He is a former professor at the Department of Computer Science and Engineering at Michigan State University and the President of Brain-Mind
October 1959 (5,451 words) [view diff] no match in snippet view article find links to article
Springer-Verlag. pp. 26–28. IBM Archives. Reilly, Edwin D. (2003). Milestones in computer science and information technology. Greenwood Press. pp. 129–130. "Mead Introduces
Video game (15,402 words) [view diff] no match in snippet view article find links to article
low-cost development tools for these platforms. Although departments of computer science have been studying the technical aspects of video games for years,
Outline of chemistry (4,048 words) [view diff] no match in snippet view article find links to article
chemistry – history of the branch of chemistry that uses principles of computer science to assist in solving chemical problems. History of chemo-informatics
Julia (programming language) (7,097 words) [view diff] no match in snippet view article
Kalicharan, Noel (2021). Julia - Bit by Bit. Undergraduate Topics in Computer Science. Springer. doi:10.1007/978-3-030-73936-2. ISBN 978-3-030-73936-2. S2CID 235917112
Vehicular ad hoc network (3,221 words) [view diff] no match in snippet view article find links to article
Embedded Systems for Enhancing Road Monitoring Services". Procedia Computer Science. 52: 389–395. doi:10.1016/j.procs.2015.05.003. Gandhi, Jenish; Jhaveri
Deaths in August 2021 (18,884 words) [view diff] no match in snippet view article find links to article
Aliaksei Mzhachyk, 25, Belarusian Olympic weightlifter (2016), traffic collision. Kihi Ngatai, 91, New Zealand Māori leader, member of the Waitangi Tribunal
Dario Floreano (3,415 words) [view diff] no match in snippet view article find links to article
Ltd, he joined the EPFL in 1996 as group leader in the Department of Computer Science. In 2000, Floreano was first named Assistant Professor, then in 2005
Deaths in February 2019 (13,073 words) [view diff] no match in snippet view article find links to article
ترانه معروف «آیریلیق» دار فانی را وداع گفت (in Persian) In Memoriam: Computer science professor and former department chair Mario Gerla MS ’70, PhD ’73 "Botanical
Automation bias (4,070 words) [view diff] no match in snippet view article find links to article
(PDF). Computer Safety, Reliability, and Security. Lecture Notes in Computer Science. Vol. 5775. Springer Berlin Heidelberg. pp. 18–31. doi:10.1007/978-3-642-04468-7_3
Virtual human (3,006 words) [view diff] no match in snippet view article find links to article
observer. In the early 1980s, Tom Calvert, a professor of kinesiology and computer science at Simon Fraser University, attached potentiometers to a body and used
Short integer solution problem (3,167 words) [view diff] no match in snippet view article find links to article
functions from worst-case complexity assumptions.] Foundations of Computer Science, 2002. Proceedings. The 43rd Annual IEEE Symposium on. IEEE, 2002.
Near-field communication (7,288 words) [view diff] no match in snippet view article find links to article
Cards, Mobile and Ubiquitous Computing Systems (PDF). Lecture Notes in Computer Science. Vol. 4462. Workshop in Information Security Theory and Practices 2007
The Collected Stories of Vernor Vinge (3,043 words) [view diff] no match in snippet view article find links to article
evidence points to Howard Prentice, a 90-something renaissance man doing computer science research for the company. Prentice reveals that he has used the computers
George W. Johnson (academic) (822 words) [view diff] no match in snippet view article
big-time biology, physics, chemistry, so it was going to have to be computer science, information science...I'd like to help this little rudimentary institution
Deaths in October 2022 (14,731 words) [view diff] no match in snippet view article find links to article
Spanish) In Memoriam: Douglass Stott Parker Jr., Professor Emeritus of Computer Science Peter Robinson, creator of the Inspector Banks novels, dies aged 72
List of hazing deaths in the United States (3,486 words) [view diff] no match in snippet view article find links to article
junior Crimson Scholar at New Mexico State University majoring in Computer Science. The university refused to accept any responsibility or make significant
Snapchat (13,052 words) [view diff] no match in snippet view article find links to article
(PDF). Financial Cryptography and Data Security. Lecture Notes in Computer Science. Vol. 8437. pp. 64–76. doi:10.1007/978-3-662-45472-5_5. ISBN 978-3-662-45471-8
Customer relationship management (6,450 words) [view diff] no match in snippet view article find links to article
Technology in Accounting and E-accounting". International Journal of Computer Science and Mobile Computing. 4 (2): 208–215. Retrieved 27 October 2018. Tavana
Pigeonhole principle (3,998 words) [view diff] no match in snippet view article find links to article
2006 Computational Geometry in C, Cambridge Tracts in Theoretical Computer Science, 2nd Edition, Joseph O'Rourke, page 9. Brualdi 2010, p. 70 Brualdi
Radio-frequency identification (12,342 words) [view diff] no match in snippet view article find links to article
(2011-04-01). "Radio frequency identification (RFID) projects for computer science". Journal of Computing Sciences in Colleges. 26 (4): 78–84. ISSN 1937-4771
Charles Babbage (12,207 words) [view diff] no match in snippet view article find links to article
congruence IEEE Computer Society Charles Babbage Award List of pioneers in computer science Terence Whalen (1999). Edgar Allan Poe and the masses: the political
Vanderbilt University (14,726 words) [view diff] no match in snippet view article find links to article
Electronics, housed in the Department of Electrical Engineering and Computer Science, includes the largest academic facility in the world involved in radiation-effects
Larry Smarr (1,073 words) [view diff] no match in snippet view article find links to article
University of Illinois at Urbana-Champaign in 1979. He is a professor of Computer Science and Information Technologies at the University of California, San Diego
Carleton College (6,219 words) [view diff] no match in snippet view article find links to article
popular majors, by 2021 graduates, were: Biology/Biological Science (52) Computer Science (47) Mathematics (34) International Relations and Affairs (34) Research
Berlin Blockade (12,111 words) [view diff] no match in snippet view article find links to article
600 sorties a day for all of Europe. See "The Cognitive Dynamics of Computer Science", John Wiley and Sons, 2006, p. 213 The figure of 225 Skymasters—201
Hungarian notation (2,952 words) [view diff] no match in snippet view article find links to article
narrower way, such as applying only for member variables, helps avoid naming collision. Printed code is more clear to the reader in case of datatypes, type conversions
West Virginia University (10,192 words) [view diff] no match in snippet view article find links to article
Advancement of Biometrics (SSAB). The program, in the Lane Department of Computer Science and Electrical Engineering (LCSEE), provides a firm understanding of
Mount Erebus (5,581 words) [view diff] no match in snippet view article find links to article
expedition proved to be highly successful in terms of robotic and computer science, and was possibly the first expedition by a robotic platform to Antarctica
Forensic science (10,495 words) [view diff] no match in snippet view article find links to article
Science". Fundamental Computing Forensics for Africa. SpringerBriefs in Computer Science. pp. 3–16. doi:10.1007/978-3-319-94499-9_2. ISBN 978-3-319-94498-2
History of science (22,062 words) [view diff] no match in snippet view article find links to article
the two technologies that made the Human Genome Project feasible. Computer science, built upon a foundation of theoretical linguistics, discrete mathematics
Deaths in September 2017 (10,675 words) [view diff] no match in snippet view article find links to article
Maurice Nivat, 79, French computer scientist, co-father of theoretical computer science. Evelyn Scott, 81, Australian Indigenous social activist, Chairwoman
List of paradoxes (7,852 words) [view diff] no match in snippet view article find links to article
Navigation paradox: Increased navigational precision may result in increased collision risk. Newcomb's paradox: How do you play a game against an omniscient
Cellular neural network (10,029 words) [view diff] no match in snippet view article find links to article
In computer science and machine learning, cellular neural networks (CNN) or cellular nonlinear networks (CNN) are a parallel computing paradigm similar
Imam Hossein University (5,689 words) [view diff] no match in snippet view article find links to article
Civil Engineering Department of Electrical Engineering Department of Computer Science Engineering Department of Industrial Engineering Department of Chemical
Royal Medal (440 words) [view diff] no match in snippet view article find links to article
detector to image small catalyst particles." 2000 Timothy Berners-Lee Computer science "In recognition of his invention and subsequent development of the
Håvard Fjær Grip (1,000 words) [view diff] no match in snippet view article find links to article
anti-collision systems for cars. In 2010, Grip started working as an adjunct assistant professor at the School of Electrical Engineering and Computer Science
Thomas Perkins (businessman) (2,043 words) [view diff] no match in snippet view article
Kleiner Perkins. Perkins received a B.S. in electrical engineering and computer science from Massachusetts Institute of Technology (MIT) in 1953. He earned
Silver Spring, Maryland (8,578 words) [view diff] no match in snippet view article find links to article
for its Communication Arts Program and its Science, Mathematics, and Computer Science Magnet Program, the latter of which perennially produces a large number
July 1963 (7,487 words) [view diff] no match in snippet view article find links to article
direct 33 more shorts, ending with Purr-Chance to Dream in 1967. The computer science study of analysis of algorithms was initiated by the publication of
London Ambulance Service (5,672 words) [view diff] no match in snippet view article find links to article
Saltzer (MIT)" (PDF). Advice to systems researchers. Department of Computer Science, University of Texas at Austin. Retrieved 2 December 2010. "BBC: Computer
Unreal Engine (10,781 words) [view diff] no match in snippet view article find links to article
copies for students enrolled in accredited video game development, computer science, art, architecture, simulation, and visualization programs. Epic opened
Talaud Islands Regency (2,036 words) [view diff] no match in snippet view article find links to article
and Technology. There's only one college in the regency, Rajawali Computer Science College which is private. It was established after the MoU between
Abu Zubaydah (9,133 words) [view diff] no match in snippet view article find links to article
demonstrations against the Israelis. Zubaydah is reported to have studied computer science in Mysore, India, prior to his travel to Afghanistan/Pakistan at the
YouTube (31,248 words) [view diff] no match in snippet view article find links to article
the Indiana University of Pennsylvania, and Chen and Karim studied computer science together at the University of Illinois Urbana-Champaign. According
List of York University people (2,026 words) [view diff] no match in snippet view article find links to article
Fine Arts George Tourlakis 2007: Computer Science & Engineering, Science & Engineering John Tsotsos 2008: Computer Science & Engineering, Science & Engineering
Situation awareness (11,190 words) [view diff] no match in snippet view article find links to article
Knowledge in Support of Cyber-Situational Awareness, Lecture Notes in Computer Science, vol. 11062, Cham: Springer, pp. 132–143, doi:10.1007/978-3-319-99247-1_12
Marcin Hoffmann (2,981 words) [view diff] no match in snippet view article find links to article
managerial project) and postgraduate studies in computer science at the AMU Faculty of Mathematics and Computer Science in 2004. Already during his MSc course
Digital forensics (5,707 words) [view diff] no match in snippet view article find links to article
International Journal of Digital Evidence International Journal of Forensic Computer Science Journal of Digital Forensic Practice Small Scale Digital Device Forensic
List of Internet top-level domains (4,795 words) [view diff] no match in snippet view article find links to article
Technical Alternatives and Policy Implications; National Research Council, Computer Science and Telecommunications Board (7 August 2005). Signposts in Cyberspace:
June 1912 (7,002 words) [view diff] no match in snippet view article find links to article
Born: Alan Turing, British mathematician, developer of theoretical computer science, inventor of the Turing machine, the precursor to the modern computer;
Deaths in March 2012 (15,153 words) [view diff] no match in snippet view article find links to article
Bishop of Venado Tuerto (1989–2000). Gerald Estrin, 90, American computer science pioneer. Albert Hadley, 91, American interior decorator, cancer. Bill
Feature hashing (2,993 words) [view diff] no match in snippet view article find links to article
set membership Count–min sketch – Probabilistic data structure in computer science Heaps' law – Heuristic for distinct words in a document Locality-sensitive
Greece (30,489 words) [view diff] no match in snippet view article find links to article
charm quark), Joseph Sifakis (2007 Turing Award, the "Nobel Prize" of Computer Science), Christos Papadimitriou (2002 Knuth Prize, 2012 Gödel Prize), Mihalis
1955 (8,927 words) [view diff] no match in snippet view article find links to article
food writer April 10 – Philip J. Hanlon, American mathematician and computer science, 18th President of Dartmouth College April 11 – Kevin Brady, American
Swarm behaviour (12,846 words) [view diff] no match in snippet view article find links to article
Biological Swarming". Advances In Artificial Life. Lecture Notes in Computer Science. Vol. 2801. pp. 810–820. CiteSeerX 10.1.1.87.8022. doi:10.1007/978-3-540-39432-7_87
August 1900 (4,041 words) [view diff] no match in snippet view article find links to article
Annexes – via Google Books. Reilly, Edwin D. (2003). Milestones in Computer Science and Information Technology. Greenwood Publishing Group. pp. 252–53
Calan Williams (3,257 words) [view diff] no match in snippet view article find links to article
in the Silver Cup. Williams is currently studying the bachelor in Computer science in an online course with Perth-based Edith Cowan University. To amass
Transport Layer Security (17,112 words) [view diff] no match in snippet view article find links to article
Canada, August 12-13, 2010, Revised Selected Papers. Lecture Notes in Computer Science. Vol. 6544. pp. 74–91. doi:10.1007/978-3-642-19574-7_5. ISBN 978-3-642-19573-0
List of fellows of the Australian Academy of Science (7,299 words) [view diff] no match in snippet view article find links to article
Asplund Solar and stellar physics 1970 2015 Peter Leslie Bartlett Computer science and statistics 2015 Christine Anne Beveridge Hormonal control of plant
Oblivious pseudorandom function (3,333 words) [view diff] no match in snippet view article find links to article
function: It is hard to find two inputs with the same output (i.e. it is collision resistant) It is hard to invert (i.e. it is resistant to preimage attacks)
Blichfeldt's theorem (1,910 words) [view diff] no match in snippet view article find links to article
Thorup, Mikkel (ed.), 59th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2018, Paris, France, October 7-9, 2018, IEEE Computer Society
Forensic linguistics (8,486 words) [view diff] no match in snippet view article find links to article
Michaelson (1990) The Qsum Plot. Internal Report CSR-3-90, Department of Computer Science, University of Edinburgh. Ariani, Mohsen Ghasemi; Sajedi, Fatemeh;
Tim Drake (10,025 words) [view diff] no match in snippet view article find links to article
his intelligence improving to a level where he was able excel in computer science and gain a grasp of assorted scientific techniques, including biology
Tim Drake (10,025 words) [view diff] no match in snippet view article find links to article
his intelligence improving to a level where he was able excel in computer science and gain a grasp of assorted scientific techniques, including biology
Oblivious pseudorandom function (3,333 words) [view diff] no match in snippet view article find links to article
function: It is hard to find two inputs with the same output (i.e. it is collision resistant) It is hard to invert (i.e. it is resistant to preimage attacks)
Martin Gardner (9,526 words) [view diff] no match in snippet view article find links to article
of the MAA. The first annual lecture, Recreational Mathematics and Computer Science: Martin Gardner's Influence on Research, was given by Erik Demaine
List of effects (3,442 words) [view diff] no match in snippet view article find links to article
effect (fluid dynamics) Shubnikov–de Haas effect (science) Side effect (computer science) (computer programming) Side effect (disambiguation) Signor–Lipps effect
List of Marvel Comics characters: T (17,217 words) [view diff] no match in snippet view article find links to article
New York City, Tippy-Toe moves with her. While Doreen enrolls as a computer science student at Empire State University, Tippy-Toe continues to aid Squirrel
Liz Fong-Jones (4,620 words) [view diff] no match in snippet view article find links to article
Institute of Technology's Department of Electrical Engineering and Computer Science with a Bachelor of Science degree in 2014. Fong-Jones started her career
University of Ottawa (9,893 words) [view diff] no match in snippet view article find links to article
student federation president Jock Turcot, who was killed in a traffic collision in 1965. The university has over thirty-five dining outlets. This includes
October 1972 (5,764 words) [view diff] no match in snippet view article find links to article
(Pasadena, California), October 17, 1972, p1 "Banking", in Encyclopedia of Computer Science and Technology, Jack Belzer, Albert G. Holzman and Allen Kent, eds
CPU cache (13,195 words) [view diff] no match in snippet view article find links to article
reduced power consumption. 2009 2nd IEEE International Conference on Computer Science and Information Technology. pp. 551–556. doi:10.1109/ICCSIT.2009.5234663
Unidentified flying object (20,090 words) [view diff] no match in snippet view article find links to article
September 3, 2021. Retrieved January 28, 2022. "UAP & SETI – Chair of Computer Science VIII – Aerospace Information Technology". www.informatik.uni-wuerzburg
Career Center (Winston-Salem, North Carolina) (888 words) [view diff] no match in snippet view article
AB AP Calculus BC AP Chemistry AP Chinese Language and Culture AP Computer Science A AP English Language and Composition AP English Literature and Composition
Royal Canadian Mounted Police (16,108 words) [view diff] no match in snippet view article find links to article
restricted from making physical arrests. CCIs have backgrounds in computer science or financial markets and are involved in specialized investigations
Deaths in February 2021 (20,454 words) [view diff] no match in snippet view article find links to article
vremena (in Croatian) In Memoriam: Walter Savitch, Professor Emeritus in Computer Science and Engineering Well-known Regina philanthropist Jacqui Shumiatcher
List of inventors (12,054 words) [view diff] no match in snippet view article find links to article
pin tumbler lock Shunpei Yamazaki (born 1942), Japan – patents in computer science and solid-state physics, see List of prolific inventors Gazi Yaşargil
Text messaging (16,886 words) [view diff] no match in snippet view article find links to article
Conference on Ubiquitous Intelligence and Computing. Lecture Notes in Computer Science. Vol. 6406. pp. 590–604. doi:10.1007/978-3-642-16355-5_45. hdl:20.500
Through the Wormhole (1,614 words) [view diff] no match in snippet view article find links to article
Los Angeles Daily News. March 30, 2008. "Professor James Marshall | Computer Science | the University of Sheffield". September 21, 2021. "Neuroscientist
Aquilanti–Mundim deformed Arrhenius model (4,900 words) [view diff] no match in snippet view article find links to article
Operational Perishables Quality Control and Logistics, Lecture Notes in Computer Science, Springer International Publishing, pp. 398–421, doi:10.1007/978-3-319-24264-4_28
David Bader (computer scientist) (2,921 words) [view diff] no match in snippet view article
Recognized as Author of Top Influential Paper". Georgia Tech School of Computer Science. Archived from the original on May 31, 2019. Retrieved May 31, 2019
Computer Go (6,502 words) [view diff] no match in snippet view article find links to article
the complexity of Tsume-Go". Computers and Games. Lecture Notes in Computer Science. Vol. 1558. London, UK: Springer-Verlag. pp. 222–231. doi:10.1007/3-540-48957-6_15
DOM clobbering (1,734 words) [view diff] no match in snippet view article find links to article
from occurring. The DOM clobbering vulnerability arises from a naming collision between the JavaScript execution context and HTML elements in the Document
Glossary of aerospace engineering (24,034 words) [view diff] no match in snippet view article find links to article
ISBN 0-07-112939-1 "Systems & Control Engineering FAQ | Electrical Engineering and Computer Science". engineering.case.edu. Case Western Reserve University. 20 November
Deaths in December 2021 (18,072 words) [view diff] no match in snippet view article find links to article
Chris Achilléos 1947-2021 Navy Radar Training Launched a Career in Computer Science Indiana University's Hal Broxmeyer, pioneer of cord blood transplantation
History of self-driving cars (10,840 words) [view diff] no match in snippet view article find links to article
CMU". Proceedings of the 1986 ACM fourteenth annual conference on Computer science - CSC '86. pp. 71–80. doi:10.1145/324634.325197. ISBN 0897911776. S2CID 2308303
Predictive engineering analytics (4,131 words) [view diff] no match in snippet view article find links to article
Using Search". Search Based Software Engineering. Lecture Notes in Computer Science. Vol. 8084. pp. 141–157. doi:10.1007/978-3-642-39742-4_12. ISBN 978-3-642-39741-7
List of TCP and UDP port numbers (12,653 words) [view diff] no match in snippet view article find links to article
Josef (eds.). Intelligent Computer Mathematics. Lecture Notes in Computer Science. Vol. 8543. Cham: Springer International Publishing. pp. 224–235. arXiv:1404
List of Vanderbilt University people (30,913 words) [view diff] no match in snippet view article find links to article
Stanford University Paul Hudak (B.S. 1973) – professor and chair of computer science department, Yale University, best known for involvement in the design
Sam Liccardo (6,573 words) [view diff] no match in snippet view article find links to article
Robert Annis (January 3, 2019). "Bike-Friendly Mayor Hurt in Car-Bike Collision on New Year's Day". bicycling.com. Retrieved July 20, 2020. Wikimedia
Fatigue detection software (3,743 words) [view diff] no match in snippet view article find links to article
"Mobile platform detect and alerts system for driver fatigue". Procedia Computer Science. 62 (2015): 555–564. doi:10.1016/j.procs.2015.08.531. Wijnands, J.S
Virtual reality in primary education (3,535 words) [view diff] no match in snippet view article find links to article
Blended Learning: Aligning Theory with Practices. Lecture Notes in Computer Science. Vol. 9757. pp. 94–102. doi:10.1007/978-3-319-41165-1_9. ISBN 978-3-319-41164-4
Impact of self-driving cars (6,112 words) [view diff] no match in snippet view article find links to article
reduction in traffic collisions and the resulting severe injuries or deaths. United States government estimates suggest 94% of traffic collisions have humans as
Steve Boros (7,535 words) [view diff] no match in snippet view article find links to article
bank. And Boros, 46, a Michigan grad who plans to take classes in computer science during the off-season, is in the forefront of a new wave of enlightened
Death of Chow Tsz-lok (8,417 words) [view diff] no match in snippet view article find links to article
some creating roadblocks. Early 4 November, a 22-year-old second-year computer science undergraduate student at the Hong Kong University of Science and Technology
June 1961 (8,002 words) [view diff] no match in snippet view article find links to article
Infinite Abacus", representing an important development in theoretical computer science. In Ethiopia, Emperor Haile Selassie inaugurated a new 226-metre (741 ft)
Logology (science) (26,733 words) [view diff] no match in snippet view article
venture capitalist, artificial-intelligence (AI) expert with a Ph.D. in computer science from Carnegie Mellon University, and author of the 2018 book, AI Superpowers:
List of The Venture Bros. characters (20,412 words) [view diff] no match in snippet view article find links to article
wave radio show called "The White Room". After earning a doctorate in computer science, White and Billy Quizboy collaborated on a Jeopardy-style game show
Deaths in January 2012 (16,674 words) [view diff] no match in snippet view article find links to article
Away at 93 "Professor David Barron 1935–2012, 'a founding father of computer science'". University of Southampton. Retrieved 2019-04-01. "In memoriam Peg
List of Punahou School alumni (13,498 words) [view diff] no match in snippet view article find links to article
International computational linguist '79 Ronald Loui (Harvard)—professor of computer science at Wash U, patent holder on packet processing hardware, Knowledge Representation
List of solved missing person cases: pre-2000 (15,967 words) [view diff] no match in snippet view article find links to article
Jacqueline Chiong Philippines Not found 1997 Ricky Reel 21 United Kingdom A computer science student at Brunel University, Reel was last seen alive in the early
List of Young Sheldon episodes (7,494 words) [view diff] no match in snippet view article find links to article
stop crying. Returning to the university, he finds someone studying computer science in his room. Not bothering to learn the other student's name, he instead
List of Indian inventions and discoveries (22,802 words) [view diff] no match in snippet view article find links to article
Theory: Complexity Lower Bounds and Pseudorandomness, Progress in Computer Science and Applied Logic, vol. 22, Birkhäuser, p. 35, ISBN 978-3-0348-8037-4
2012 in science (38,828 words) [view diff] no match in snippet view article find links to article
doi:10.1016/j.epsl.2012.04.026. ISSN 0012-821X. Ball, Philip (2012). "Computer science: Algorithmic rapture". Nature. 488 (7412). Springer Science and Business
Meanings of minor planet names: 7001–8000 (445 words) [view diff] no match in snippet view article find links to article
career in celestial mechanics and astronomy for one in mathematics and computer science. JPL · 7636 7638 Gladman 1984 UX Brett J. Gladman (born 1966), a Canadian
2020 in science (27,233 words) [view diff] no match in snippet view article find links to article
(28 August 2020). "Hartree–Fock on a superconducting qubit quantum computer". Science. 369 (6507): 1084–1089. arXiv:2004.04174. Bibcode:2020Sci...369.1084
List of drowning victims (5,852 words) [view diff] no match in snippet view article find links to article
[self-published source?] Klara Dan von Neumann (born 1911), pioneer in computer science, drowned on 10 November 1963 in La Jolla, California. Johnny Burnette
2021 in science (38,834 words) [view diff] no match in snippet view article find links to article
S2CID 239698764. "We have spotted a new kind of supernova triggered by cosmic collisions". New Scientist. 2 September 2021. Retrieved 3 September 2021. "Astronomers
May 1982 (21,172 words) [view diff] no match in snippet view article find links to article
Killinchy, County Down, Northern Ireland. A Unabomber bomb exploded in the computer science department at Vanderbilt University; secretary Janet Smith was injured
List of atheists (surnames A to B) (2,245 words) [view diff] no match in snippet view article
intelligence and artificial life researcher, and director of the MIT Computer Science and Artificial Intelligence Laboratory. "I've been an atheist - I had
Plotting algorithms for the Mandelbrot set (7,014 words) [view diff] no match in snippet view article find links to article
v t e Computer science Note: This template roughly follows the 2012 ACM Computing Classification System. Hardware Printed circuit board Peripheral Integrated
Basil Hiley (11,849 words) [view diff] no match in snippet view article find links to article
Non-Commutative Probability Theory?". Quantum Interaction. Lecture Notes in Computer Science. Vol. 8369. pp. 6–21. arXiv:1408.5697. doi:10.1007/978-3-642-54943-4_2
Krishnendu Chaudhury (1,631 words) [view diff] no match in snippet view article find links to article
Systems, Google, and Flipkart. In 1994, he completed his Ph.D. in computer science in computer vision and image processing from the University of Kentucky
Natural scientific research in Canada (20,478 words) [view diff] no match in snippet view article find links to article
Ottawa, draws on the fields of psychology, philosophy, linguistics and computer science to conduct research into cognition. Other universities, including U
List of Nova episodes (2,282 words) [view diff] no match in snippet view article find links to article
successors. Work being done in Artificial Intelligence (AI), a branch of computer science, only suggest that in the not too distant future, machines will outpace
Kruskal count (5,495 words) [view diff] no match in snippet view article find links to article
Programming, Artificial Intelligence, and Reasoning. Lecture Notes in Computer Science. Vol. 9450. Suva, France: LPAR. pp. 387–401. arXiv:1509.03476. doi:10
List of Equinox episodes (38,982 words) [view diff] no match in snippet view article find links to article
Stalin did not like computer science, and it was largely banned until 1958; the Soviets were always years behind in computer science; the first recognisable
Deaths in March 2023 (16,675 words) [view diff] no match in snippet view article find links to article
Perez dies of stroke; 55 In Memoriam: Dragomir Radev, Professor of Computer Science Morre Gilmara Sanchez, a 1ª voz brasileira da Marin de ‘Os Cavaleiros
July–September 2020 in science (19,713 words) [view diff] no match in snippet view article find links to article
(28 August 2020). "Hartree–Fock on a superconducting qubit quantum computer". Science. 369 (6507): 1084–1089. arXiv:2004.04174. Bibcode:2020Sci...369.1084
2023 deaths in the United States (49,365 words) [view diff] no match in snippet view article find links to article
secretary Hoyle dies at 84 In Memoriam: Dragomir Radev, Professor of Computer Science "Sweet Charles" Sherrell, music director for James Brown, dies at age
2023 Birthday Honours (23,705 words) [view diff] no match in snippet view article find links to article
Electronic Engineering, School of Electronics, Electrical Engineering and Computer Science, Queen's University Belfast. For services to Science and to Engineering
2022 deaths in the United States (January–June) (29,361 words) [view diff] no match in snippet view article
Retrieved 2023-01-03. "Joel Moses, Institute Professor Emeritus and computer science trailblazer, dies at 80". MIT News | Massachusetts Institute of Technology