Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...via router removal, elimination of epidemics or fighting against criminal organizations. ...ork, so it affects each empirical network differently.<ref>Barabási, A.-L. NETWORK SCIENCE, Cambridge University Press 2015</ref> ...
    5 KB (788 words) - 13:14, 6 November 2023
  • '''Time-based one-time password''' ('''TOTP''') is a [[computer algorithm]] that generates a [[one-time password]] (OTP) using the current ...complements the event-based one-time standard HOTP, and it offers end user organizations and enterprises more choice in selecting technologies that best fit their a ...
    6 KB (759 words) - 22:49, 30 December 2024
  • ...ualization and visual data mining," IEEE TRANSACTIONS ON VISUALIZATION AND COMPUTER GRAPHICS 8 (2002): 1--8.</ref> Also called patinformatics,<ref>Anthony J. T | Assignee || Patent assignees are organizations or individuals - the owners of the patent. || The field can offer a ranking ...
    15 KB (2,061 words) - 16:01, 22 August 2024
  • | fields = [[Mathematics]] [[Computer Science]] [[Cryptography]] ...Cite web|url=https://www.cs.qc.cuny.edu/kahrobaei.html|title=Department of Computer Science, Queens College, CUNY|website=www.cs.qc.cuny.edu|access-date=2024-0 ...
    16 KB (2,116 words) - 21:09, 31 December 2024
  • ...dcd33d&pid=1-s2.0-S1877050914007029-main.pdf&_valck=1 | journal = Procedia Computer Science | volume = 32 | pages = 856–861 | doi = 10.1016/j.procs.2014.05.502 ...y) before and after adding perturbations, and apply it to random [[Boolean network]]s (RBNs). They also show that several well known biological networks such ...
    18 KB (2,356 words) - 19:25, 23 February 2025
  • The growing number of computer applications modeling different aspects of railway operations, with differe ...h|first1 = Andrew|publisher = Proc. of the 9th International Conference on Computer in Railways (Comprail IX), WIT Press, Southampton, United Kingdom|year = 20 ...
    24 KB (3,313 words) - 19:44, 19 February 2025
  • ...widespread applications in [[Cognitive science|cognitive sciences]] and [[computer vision]]. These methods have also found successful application in [[natural ...tps://www.sciencedirect.com/science/article/pii/S0885230816302613 |journal=Computer Speech & Language |volume=47 |pages=272–297 |doi=10.1016/j.csl.2017.08.002 ...
    16 KB (2,263 words) - 08:53, 11 December 2024
  • ...nstead of path length.<ref>{{citation|title=The maximum capacity through a network|first=Maurice|last=Pollack|journal=[[Operations Research (journal)|Operatio ...n as the capacity or bandwidth of the path. As well as its applications in network routing, the widest path problem is also an important component of the [[Sc ...
    24 KB (3,491 words) - 20:58, 12 October 2024
  • | structure = [[Substitution–permutation network|SPN]] ...ology – CRYPTO '96|volume = 1109|pages = 252–267|series = Lecture Notes in Computer Science|year = 1996|last1 = Kilian|first1 = Joe|last2 = Rogaway|first2 = Ph ...
    13 KB (1,867 words) - 14:37, 2 May 2024
  • ...' is a technique for training a pair of [[artificial neural network|neural network]] models, one for image understanding and one for text understanding, using ...}}</ref> with a report served directly through OpenAI's [[Content delivery network|CDN]],<ref>https://web.archive.org/web/20210105204011/https://cdn.openai.co ...
    30 KB (4,242 words) - 02:32, 22 February 2025
  • {{other uses|Network (disambiguation)}} {{Network Science}} ...
    70 KB (10,495 words) - 13:05, 15 January 2025
  • ...ssn=1558-156X}}</ref> As the coordinator is a single point of failure, the network is currently{{As of when|date=July 2021}} centralized.<ref name=":197">{{Ci ...TA 2.0, was deployed in late 2020, with the aim of releasing a distributed network that no longer relies on the coordinator for consensus in 2021.<ref name=": ...
    48 KB (6,045 words) - 01:34, 19 February 2025
  • ...rst1=Shiva Prasad |title=2008 49th Annual IEEE Symposium on Foundations of Computer Science |last2=Lee |first2=Homin K. |last3=Nissim |first3=Kobbi |last4=Rask ...odel uses reconstructed data to classify user activity and detect abnormal network behavior. The experimental results demonstrate that the proposed method ach ...
    23 KB (3,351 words) - 12:30, 23 February 2025
  • ...alf of their circulation. Marine [[weather]] forecasts by various weather organizations can be traced back to the [[shipwreck|sinking]] of the [[Royal Charter (shi ...ace winds, [[tide]] levels, and [[sea surface temperature]] are tackled by organizations tasked with forecasting weather over open oceans and seas. Currently, the ...
    40 KB (6,002 words) - 12:40, 22 June 2024
  • ...lt with through case-by-case export license request proceedings brought by computer manufacturers, such as [[IBM]], and by their large corporate customers. ...became a matter of public concern with the introduction of the [[personal computer]]. [[Phil Zimmermann]]'s [[Pretty Good Privacy|PGP]] [[cryptosystem]] and i ...
    37 KB (5,170 words) - 07:12, 18 February 2025
  • ...tructure is of an isolated or coordinated attack structure. The larger the network, the greater chance of opportunities for offensive action to become availab ...cation were introduced in the forms of radio, television, high-performance computer systems and telephones.<ref name=":3" /> Radio communication was one of the ...
    33 KB (4,876 words) - 05:44, 6 December 2024
  • ...of authors, institutions, and countries within the social science research network community |first1=Jevin D. |last1=West |first2=Michael C. |last2=Jensen |fi ...r according to this metric is his or her [[eigenvector centrality]] in the network. ...
    34 KB (4,739 words) - 13:07, 27 January 2025
  • ...nks for displaying or recording the results elsewhere through a monitoring network.{{citation needed|date=February 2022}} ...te [[health care standards]] which have been developed for this purpose by organizations such as [[IEEE]] and [[HL7]]. This newer method of charting patient data re ...
    25 KB (3,446 words) - 01:31, 12 November 2024
  • ...locks. In Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007, EuroSys '07, pages 59–72, New York, NY, USA, 2007. ACM.</ref> ...the 20th Conference on Foundations of Software Technology and Theoretical Computer Science, FST TCS 2000, pages 87–93, London, UK, UK, 2000. Springer-Verlag</ ...
    42 KB (6,407 words) - 21:32, 18 January 2025
  • ...|thumb|500x500px|An animation of the PageRank algorithm running on a small network of pages. The size of the nodes represents the perceived importance of the ...igns a numerical [[weighting]] to each element of a [[hyperlink]]ed [[Set (computer science)|set]] of documents, such as the [[World Wide Web]], with the purpo ...
    71 KB (10,204 words) - 07:06, 25 February 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)