Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...re prepared by its community of problem setters or are taken from previous programming contests. SPOJ allows advanced users to organize contests under their own r ...to problems can be submitted in over 40 programming [[programming language|languages]], including esoteric ones, via the Sphere Engine. It is run by the Polish ...
    10 KB (1,390 words) - 10:13, 19 January 2024
  • ...n Willard]] created it in 1990 to simulate programming languages like [[C (programming language)|C]].<ref name="Fredman90">{{cite journal|last1=Fredman|first1=Mic ...rations and [[bitwise operations]] including [[logical shift]]s to be done in [[constant time]] (the precise instruction set assumed by an algorithm or p ...
    4 KB (597 words) - 15:41, 8 November 2024
  • ...t=Thielecke|first=Hayo|date=December 9, 2015|title=Implementing functional languages with abstract machines|url=https://www.cs.bham.ac.uk/~hxt/2015/compilers/co ...niel P.|date=October 1986|title=A Calculus for Assignments in Higher-Order Languages|url=https://legacy.cs.indiana.edu/ftp/techreports/TR202.pdf|archive-url=|ar ...
    16 KB (2,329 words) - 12:56, 9 July 2024
  • {{Short description|Programming language}} ...pages 169-206. Springer, 2011.</ref> is a [[domain-specific language]] for programming and analyzing coordination protocols that compose individual ''processes'' ...
    12 KB (1,753 words) - 02:21, 27 November 2024
  • ...urce_herman_lugo.pdf|title=Open Source Resources for Teaching and Research in Mathematics|author=Russell Herman|author2=Gabriel Lugo|publisher=University ...include facilities for [[Infographic|graphing]] equations and provide a [[programming language]] for the users' own [[Subroutine|procedures]]. ...
    13 KB (1,761 words) - 08:13, 19 February 2025
  • ...portant applications in finding the [[Critical path method|critical path]] in scheduling problems. ...roblem|decision version]] of the longest path problem is also NP-complete. In this decision problem, the input is a graph ''G'' and a number ''k''; the d ...
    22 KB (3,035 words) - 20:57, 12 October 2024
  • ...number of processors (or [[processor core|cores]]). It does so efficiently in terms of execution time, memory usage, and inter-processor communication. ...looks at the queues of the other processors and "steals" their work items. In effect, work stealing distributes the scheduling work over idle processors, ...
    17 KB (2,466 words) - 05:41, 2 December 2024
  • ...e to be tested for equality (implied) and a relevant subroutine to perform in the action column. The name of the subroutine could be replaced by a relati ...If there are several hierarchical levels of control table they may behave in a manner equivalent to [[Hierarchical state machine|UML state machine]]s<re ...
    53 KB (7,919 words) - 01:50, 15 December 2024
  • {{expert needed|mathematics|ex2=computer science|reason=missing key results in free monoids, such as Levi's lemma, Fine and Wilf's theorem, Makanin's algo ...[algorithm]]s and [[Computer programming|coding]]. It led to developments in [[abstract algebra]] and answering open questions. ...
    20 KB (2,945 words) - 13:32, 13 February 2025
  • ...ly more important in [[exploratory search]], in which the users may engage in iterative cycles of goal refinement and exploration of new information (as ...first3=Ruogu|last4=He|first4=Jibo|date=2010-07-01|title=Semantic imitation in social tagging|journal=ACM Transactions on Computer-Human Interaction|langu ...
    22 KB (3,177 words) - 08:18, 27 December 2023
  • | header3 = [[Time complexity]] and {{nowrap|[[space complexity]]}} {{nowrap|in [[big O notation]]}} ...e longest common prefixes (LCPs) between all pairs of consecutive suffixes in a sorted suffix array. ...
    28 KB (4,576 words) - 13:32, 13 June 2024
  • ...direct|National identity cards in China|other uses|National identity cards in China (disambiguation)}} ...nzhèng}}) is an official [[identity document]] for personal identification in the [[People's Republic of China]]. According to the second chapter, tenth ...
    29 KB (3,655 words) - 15:31, 18 February 2025
  • ...oblems |journal=European Journal of Operational Research |date=16 December 2007 |volume=183 |issue=3 |pages=1109–1130 |doi=10.1016/j.ejor.2005.12.047 |issn This problem arises in the area of scheduling, where it models jobs that require a contiguous port ...
    48 KB (7,617 words) - 01:28, 17 December 2024
  • In [[computer science]], a '''suffix automaton''' is an efficient [[data struc In terms of [[automata theory]], a suffix automaton is the [[Minimal automaton ...
    55 KB (8,483 words) - 20:57, 12 December 2024
  • ...into its life cycle. This process simplifies the identification of errors in [[Analytics|data analytics]] workflows, by enabling users to trace issues b .... This can be used in [[Debugger|debugging]] or regenerating lost outputs. In [[database system]]s, this concept is closely related to [[Provenance#Data ...
    42 KB (6,407 words) - 21:32, 18 January 2025
  • ...ean algebra is therefore a formal way of describing [[logical operation]]s in the same way that elementary algebra describes numerical operations. ...d is provided for in all modern [[programming language]]s. It is also used in [[set theory]] and [[statistics]].<ref name="Givant-Halmos_2009"/> ...
    74 KB (11,051 words) - 05:32, 16 January 2025
  • {{Women in society sidebar|science}} This page aims to list inventions and discoveries in which women played a major role. ...
    65 KB (8,935 words) - 15:53, 8 February 2025
  • ...omon |first3=Richard |date=2003-09-18 |title=Proposal to Encode Kharoṣ ṭhī in Plane 1 of ISO/IEC 10646 |url=https://www.unicode.org/L2/L2003/03314-kharos ...ment Register |publisher=Unicode Consortium |at=L2/07-206 (WG2 N3284)|date=2007-07-25}}</ref> || {{sort|-250|<250 BCE}}<ref name=Cajori>{{cite book|last1= ...
    51 KB (6,412 words) - 21:53, 16 February 2025
  • ...reserved while provably limiting what can be inferred about any individual in the dataset. ...cal database which limits the disclosure of private information of records in the database. For example, differentially private algorithms are used by so ...
    40 KB (5,735 words) - 18:35, 7 February 2025
  • ...f quantum computing''' is a list of definitions of terms and concepts used in [[quantum computing]], its sub-disciplines, and related fields. ...mplified error correcting procedures unlike codes which encode information in the [[Space (mathematics)|subspace]] of a Hilbert space.<ref> ...
    47 KB (6,357 words) - 13:44, 8 January 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)