Search results
Jump to navigation
Jump to search
- ...used as a [[Replication (computer science)#Database replication|replica]] control method,<ref name="ozsu"> === Quorum-based voting in commit protocols === ...5 KB (733 words) - 12:11, 7 April 2024
- The '''Neuman–Stubblebine protocol''' is a [[computer network]] [[authentication]] [[communications protocol|protocol]] designed ...iang | last5=Chen | title=Two attacks on Neuman-Stubblebine authentication protocols | place=Tainan, Taiwan | year=1994 | doi = 10.1016/0020-0190(95)00177-E | j ...4 KB (629 words) - 04:08, 6 May 2023
- ...he 7th IEEE Computer Security Foundations Workshop'', pages 131–136. IEEE Computer Society Press, 1994.</ref> ....org/citation.cfm?id=77649 A Logic of Authentication]. ACM Transactions on Computer Systems, v. 8, n. 1, Feb. 1990, pp. 18—36 ...4 KB (580 words) - 16:57, 2 June 2022
- ...packets into ATM cells, in this case packets of data containing voice and control information. AAL2 is further separated into two sub-layers that help with t ...eful benefit of ATM, as a general standard for [[Data link layer|Layer 2]] protocols. ATM/AAL2's efficient handling of small packets contrasts with Ethernet's m ...7 KB (1,180 words) - 21:19, 9 June 2023
- ...tle=RFC 6238 – TOTP: Time-Based One-Time Password Algorithm|date=May 2011 |access-date=July 13, 2011|archive-date=July 11, 2011|archive-url=https://web.archi ...pecification to IETF|last=Alexander|first=Madison|work=Open Authentication|access-date=22 February 2010|archive-date=9 April 2013|archive-url=https://web.arc ...6 KB (759 words) - 22:49, 30 December 2024
- {{Short description|Criteria for a usable quantum computer}} ...D.zip| url-status=dead| archive-date=2013-05-10| pages=13–15| language=ru| access-date=2013-03-04}}</ref> and physicist [[Richard Feynman]], in 1982<ref>{{ci ...14 KB (2,014 words) - 22:57, 15 November 2024
- {{Short description|Computer bus protocol}} ...MBA4, defined the AXI4, AXI4-Lite and AXI4-Stream [[Communication protocol|protocols]]. AXI is [[royalty-free]] and its specification is freely available from [ ...24 KB (3,627 words) - 20:12, 10 October 2024
- * [[supervisory control theory]] (SCT) ...vent dynamic system]]s (DEDS)<ref name="Scheuring_Wehlan_1991_DEDS"/> in [[computer network|digital network]] [[communication protocol]]s. ...24 KB (3,039 words) - 09:23, 10 October 2024
- ...tter understanding wireless communication networks in order to predict and control various network performance metrics. The models require using techniques fr ...reless communication, 2005, Cambridge university press.</ref> The multiple access channel is the converse, with several transmitters aiming at sending differ ...59 KB (8,607 words) - 07:51, 16 February 2025
- |bibcode = 1993PhRvL..70.1895B | doi-access = free ...h>n</math>-[[photon]] [[quantum entanglement|entangled states]], sending a control signal to the output mode. Through using <math>n</math> probabilistic gates ...21 KB (3,051 words) - 01:16, 3 June 2024
- ...sing ACES for Color Correction?|date=19 November 2015|publisher=Oscars.org|access-date=2016-12-02}}</ref> ...Chromaticity Coordinates |url=https://docs.acescentral.com/tb/white-point |access-date=2022-07-01 |website=docs.acescentral.com |language=en}}</ref> Most ACE ...21 KB (3,041 words) - 04:54, 15 February 2025
- ...ge|last=Sponås|first=Jon Gunnar|website=blog.nordicsemi.com|language=en-gb|access-date=2020-04-12}}</ref> ...s-12-5-for-older-iphones-with-support-for-covid-19-exposure-notifications/|access-date=2021-01-05|website=9to5Mac|language=en-US}}</ref> On Android, it was a ...73 KB (9,512 words) - 21:06, 12 September 2024
- Racket can use three different [[Garbage collection (computer science)|garbage collectors]]: ...els, semaphores, [[Process (computing)|sub-processes]], and [[Transmission Control Protocol]] (TCP) sockets. ...26 KB (3,661 words) - 00:58, 8 January 2024
- Group testing has many applications, including statistics, biology, computer science, medicine, engineering and cyber security. Modern interest in these |doi-access = free ...69 KB (10,782 words) - 02:43, 12 June 2024
- ...s.caltech.edu/people/kitaev#profile-44119cce-tab |archive-date=2025-03-01 |access-date=2025-03-01 |website=www.cms.caltech.edu}}</ref> ...://www.itp.ac.ru/ru/dissertation-council/thesis/ |archive-date=2025-01-10 |access-date=2023-08-29 |website=www.itp.ac.ru |language=ru}}</ref> ...37 KB (4,818 words) - 16:04, 1 March 2025
- ...tweb.com/hardfork/2019/05/28/iota-blockchain-cryptocurrency-decentralized/|access-date=2020-01-17|website=Hard Fork {{!}} The Next Web|language=en-us|archive ...en-warum-dominik-schiener-die-kryptowaehrung-iota-entwickelt-90023851.html|access-date=2021-01-02|website=Frankfurter Rundschau|language=de|archive-date=2 Ma ...48 KB (6,045 words) - 01:34, 19 February 2025
- ...Anthony E.|title=Lasers|url=https://archive.org/details/lasers0000sieg|url-access=registration|year=1986|publisher=University Science Books|isbn=978-0-935702 ...perates in a similar way to diffraction gratings, but can be controlled by computer to dynamically generate a wide range of OAM states. ...32 KB (4,586 words) - 22:47, 21 January 2025
- {{Short description|Infection control technique by keeping a distance from each other}} ...v=2002.07572 |pmid=32269067 |pmc=7164388 |bibcode=2020Sci...368..742M |doi-access=free |issn = 0036-8075}} ("...initial exponential growth expected for an u ...100 KB (12,540 words) - 04:11, 26 February 2025
- ...se routines can be more complex in nature and executed faster on a quantum computer.<ref name=":5" /> Furthermore, quantum algorithms can be used to analyze [[ ...ssn=0034-4885|bibcode=2018RPPh...81g4001D|hdl=1887/71084|s2cid=3681629|hdl-access=free}}</ref> ...89 KB (12,392 words) - 16:22, 26 February 2025
- ...sprocket]] and connected white and transparent gears (right). These gears control the movement of the second, minute and hour hands.]] ...tones up to at least 28 kHz when their level exceeds about 100 dB SPL.|doi-access=free}}</ref> The data line output from such a quartz resonator goes high an ...51 KB (7,178 words) - 23:02, 2 January 2025