Search results
Jump to navigation
Jump to search
- {{Short description|Pooled resources for cryptocurrency mining}} ...rnell.edu/~ie53/publications/btcProcFC.pdf Majority is not Enough: Bitcoin Mining is Vulnerable] {{webarchive|url=https://web.archive.org/web/20161203222953/ ...14 KB (2,244 words) - 07:18, 7 January 2025
- ...surface mining|surface excavation]] problems.<ref name=Hoek88/> An update of the criterion was presented in 2002 that included improvements in the corre ...l that the Hoek–Brown criterion gave design engineers was a quantification of the relation between the stress state and Bieniawski's [[Rock Structure Rat ...5 KB (706 words) - 00:39, 4 September 2021
- |newspaper=Australian Mining ...lead often occur together and large remaining zinc deposits contain levels of lead that exceed what can be economically extracted through other technique ...4 KB (589 words) - 05:34, 5 June 2024
- |standard= [[History of measurement|old weights and measures]] |unit of= [[length]] ...8 KB (1,043 words) - 10:21, 27 May 2022
- ...ref> encouraging companies to consider [[intellectual property]] as a part of their strategy.<ref>Kevin G. Rivette, David Kline, "Discovering new value i ...Information 25, n°. 3 (September 2003): 211-221.</ref> it is the "science of analysing patent information to discover relationships and trends that woul ...15 KB (2,061 words) - 16:01, 22 August 2024
- ...=http://www.theaustralian.com.au/politics/full-statement-and-detail-of-new-mining-tax/story-e6frgczf-1225887000521|access-date=2 July 2010|newspaper=[[The Au ...ww.abc.net.au/news/2011-11-23/mining-tax-passes-lower-house/3687770 |title=Mining tax bills pass Lower House |access-date=17 January 2012 |date=23 November 2 ...20 KB (2,818 words) - 21:40, 27 April 2024
- | alma mater = [[University of Tsukuba]] ...n used by major banks and rating companies in Japan. She is considered one of the most well-known experts to develop bankruptcy prediction models in Japa ...13 KB (1,663 words) - 19:17, 2 March 2024
- ...her=Springer|date=2013}}</ref> It is used to check if the actual execution of a [[business process]], as recorded in the event log, conforms to the model ...chase order]]s of more than one million euros require two checks. Analysis of the event log will show whether this rule is followed or not. ...11 KB (1,835 words) - 12:52, 29 January 2023
- ...mputer viruses.<ref>Fred Cohen, "Computer Viruses", PhD Thesis, University of Southern California, ASP Press, 1988.</ref> ...roblem must not be mistaken for that of determination within a broad class of programs that a virus is not present. This problem differs in that it does ...8 KB (1,175 words) - 06:41, 15 February 2025
- .../06/05/the-coming-wave |accessdate=16 January 2019 |publisher= }}</ref> As of May 2018 no wave-power devices have ever gone into large-scale production. ==History== ...8 KB (1,327 words) - 17:32, 8 January 2025
- ...iction can also have a temporal aspect, where, given a snapshot of the set of links at time <math>t</math>, the goal is to predict the links at time <mat ...in-protein interactions]] (PPI). It is also used to identify hidden groups of terrorists and criminals in security related applications.<ref name=hasan:s ...19 KB (2,683 words) - 19:07, 10 February 2025
- {{Short description|Method of graph analysis}} '''Differentially private analysis of graphs'''<ref>{{cite journal ...6 KB (857 words) - 05:03, 12 April 2024
- The following is a list of notable [[earthquake]]s or tremors that have been detected within [[South A ...rg/web/20140819090009/http://www.timeslive.co.za/thetimes/2014/08/06/quake-of-shaky-things-to-come |archive-date=19 August 2014 |url-status=live }}</ref> ...17 KB (2,159 words) - 14:32, 2 February 2025
- {{short description|Method of analyzing large data sets}} ...^{I_0\times I_1\times \dots I_c\times \dots I_C}</math>. The proper choice of data organization into ''(C+1)''-way array, and analysis techniques can rev ...7 KB (963 words) - 11:23, 26 October 2023
- ...ion and whether the data is hard copy or computerized, the principal steps of computer resource estimation are: # Creation, standardization and validation of the database. ...18 KB (2,670 words) - 15:57, 17 August 2024
- | timestamping = [[Proof-of-work]] (merged mining)<ref name="merged_mining"/> ...ptocurrency]] originally forked from [[bitcoin]] software. It uses [[proof-of-work]] algorithm. Like bitcoin, it is limited to 21 million coins.<ref ...17 KB (2,356 words) - 23:18, 24 May 2024
- ...tention in the mid-2010s as the algorithm of choice for many winning teams of [[machine learning]] [[Competitive programming|competitions]].<ref name="xg ==History== ...14 KB (1,994 words) - 10:06, 30 January 2025
- ...0/http://control.ee.ethz.ch/~apnoco/Script/15.pdf| url-status=dead}}</ref> of fuzzy logic. == History == ...14 KB (1,912 words) - 18:19, 6 September 2024
- | issuing_authority = [[Central Bank of Brazil]] ...d 15 March 1990. It replaced the [[brazilian cruzado|cruzado]] in the rate of 1000 cruzados = 1 cruzado novo. It had the symbol <math>\mathrm{NCzS}\!\!\! ...7 KB (908 words) - 11:24, 2 November 2024
- {{Short description|Natural lowering of a stream bed deep near bedrock over time}} ...e, discharge variability, and the bedrock channel profile |journal=Journal of Geophysical Research: Earth Surface |volume=110 |issue=F4 |year=2005 |last1 ...14 KB (1,994 words) - 09:40, 17 February 2025