Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...ps://libraries.mit.edu/mithistory/institute/offices/mit-faculty/|title=MIT History - MIT Faculty|website=libraries.mit.edu}}</ref> ...Frederick-H-Bailey-and-Frederick-S-Woods-Plane/bams/1183414982.full Review of ''Plane and Solid Analytic geometry''] via [[Project Euclid]]</ref> ...
    3 KB (426 words) - 21:04, 6 July 2024
  • {{short description|Two properties of polynomial roots}} In [[mathematics]], '''Hudde's rules''' are two [[properties of polynomial roots]] described by [[Johann Hudde]]. ...
    3 KB (399 words) - 07:03, 13 May 2024
  • | work_institution = [[University of Basel]]<br/> [[Swiss Statistical Society]] SSS<br/> Statistical-economic so ...ooks.google.com/books?id=oXjMYIonXTYC&pg=PA605 | title=Writing the History of Mathematics – Its Historical Development | access-date=December 29, 2012 | ...
    7 KB (958 words) - 18:59, 13 December 2024
  • ...er's Star''' is a [[puzzle]] similar to the [[Rubik's Cube]], in the shape of a [[great dodecahedron]]. ==History== ...
    4 KB (574 words) - 00:04, 29 November 2024
  • ...asymptote]]s but lies in the opposite two sectors of the plane compared to the original hyperbola. ...cone has an axis, and the plane section is parallel to the plane formed by the axes. ...
    6 KB (872 words) - 01:04, 27 February 2025
  • ...[HMAC-based one-time password algorithm]] (HOTP), it has been adopted as [[Internet Engineering Task Force]] (IETF) standard {{IETF RFC|6238}}.<ref name="RFC62 ...e of [[Initiative for Open Authentication]] (OATH) and is used in a number of [[two-factor authentication]]<ref name="RFC6238" /> (2FA) systems. ...
    6 KB (759 words) - 22:49, 30 December 2024
  • ...s.google.de/books?id=Clu3BgAAQBAJ&pg=PA51---> | year=1557 }}. Page 238 in the pdf file.</ref>]] ...nglish to use the [[plus and minus signs]].<ref>{{citation|title=A History of Mathematical Notations|first=Florian|last=Cajori|authorlink=Florian Cajori| ...
    4 KB (619 words) - 01:26, 4 November 2023
  • ...17.html |archive-date=31 October 2007 |url-status=dead |journal=Journal of the Cosmic Baseball Association |volume=17 |access-date=20 March 2019}}</ref> ...e primarily measures of their own playing ability, and largely independent of their teammates, batting average is a good metric for an individual player' ...
    5 KB (779 words) - 04:06, 14 July 2023
  • [[Active redundancy]] can be integrated with fault reporting to reduce the down time to a few minutes per year. ==History== ...
    5 KB (674 words) - 14:41, 30 April 2023
  • ...e [[geodesic]] curves and, unlike the lines of [[Euclidean geometry]], are of finite length. The algebra of [[quaternion]]s provides a descriptive geometry of elliptic space in which Clifford parallelism is made explicit. ...
    5 KB (672 words) - 22:56, 24 May 2024
  • ...description|How many ways a positive integer can be represented as the sum of four squares}} {{dablink|For other theorems of Jacobi see [[Jacobi's theorem (disambiguation)]].}} ...
    5 KB (669 words) - 12:28, 5 January 2025
  • {{short description|Property of segments that have the same length and the same direction}} ...ing]]. For example, a segment ''AB'', from point ''A'' to point ''B'', has the [[opposite direction (geometry)|opposite direction]] to segment ''BA''; thu ...
    7 KB (1,032 words) - 06:14, 13 February 2025
  • ==History== ...initial requirement began with military combat systems during World War I. The approach used for survivability was to install thick armor plate to resist ...
    6 KB (789 words) - 14:10, 15 September 2023
  • {{Short description|Auctioning of sponsored search engine results}} ...host]]s. It refers to results from a search engine that are not output by the main search algorithm, but ...
    6 KB (974 words) - 19:56, 15 January 2024
  • {{short description|Constructions of cryptographic primitives that involve lattices}} ...ermore, many lattice-based constructions are considered to be secure under the [[Computational hardness assumption|assumption]] that certain well-studied ...
    24 KB (3,173 words) - 01:44, 18 February 2025
  • ...his still represents a relatively low [[level of security]] in the context of a [[brute force attack]]. ...rms Export Control Act]] until control was transferred to the [[Department of Commerce]] in 1996. ...
    4 KB (567 words) - 13:46, 10 February 2023
  • ...{{cn}} to the lead. If necessary, {{not verified in body}} can be used, or the content removed.--> ...al proof|intermediate steps]]. Due to the extraordinary accuracy and speed of their solutions, mathematicians debated whether Cleo was an individual geni ...
    13 KB (1,763 words) - 01:35, 2 March 2025
  • ...atics book on [[polyomino]]es, the shapes formed by connecting some number of [[unit square]]s edge-to-edge. It was written by [[Solomon Golomb]], and is The Basic Library List Committee of the [[Mathematical Association of America]] has strongly recommended its inclusion in undergraduate mathemati ...
    7 KB (983 words) - 22:02, 25 August 2024
  • {{Short description|Elliptic curve used in Internet cryptography}} ...ary computes the Curve25519 function at very high speed. The library is in the public domain."''</ref><ref>{{cite web |date=5 March 2019 |title=X25519 |ur ...
    21 KB (2,850 words) - 01:51, 13 February 2025
  • {{Short description|Cryptocurrency, whose blockchain operates the .bit TLD}} | timestamping = [[Proof-of-work]] (merged mining)<ref name="merged_mining"/> ...
    17 KB (2,356 words) - 23:18, 24 May 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)