Search results

Jump to navigation Jump to search
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • ...omic operator''' is a business or other organisation which supplies goods, works or services within the context of market operations. The term is used in [[ ...g any temporary association of undertakings, which offers the execution of works or a work, the supply of products or the provision of services on the marke ...
    4 KB (568 words) - 22:33, 16 February 2025
  • ...r''' (born 1945) is an American mathematician best known for his work in [[information theory]], [[ergodic theory]], and [[Stationary process|stationary process t ...''A Generalization of the Shannon-McMillan Theorem and Its Application to Information Theory''.<ref name=phd>{{MathGenealogy|3927}}</ref><ref>{{cite thesis|url=h ...
    10 KB (1,289 words) - 00:41, 2 May 2024
  • ...ad M. R. Audenaert is a Belgian physicist and civil engineer. He currently works at [[University of Ulm]]. ...|url=http://dx.doi.org/10.1017/9781316848142 |title=The Theory of Quantum Information |date=2018-04-26 |publisher=Cambridge University Press |isbn=978-1-316-8481 ...
    4 KB (569 words) - 10:05, 29 August 2024
  • ...sufficiently distorted. This phenomenon was called the Fundamental Law of Information Recovery by [[Cynthia Dwork|Dwork]] and [[Aaron Roth|Roth]], and formulated ...iple statistical queries.<ref>Irit Dinur and Kobbi Nissim. 2003. Revealing information while preserving privacy. In Proceedings of the twenty-second ACM SIGMOD-SI ...
    3 KB (517 words) - 00:14, 6 January 2023
  • ...f Evidence and Internal Conflict for Support Functions |journal=Journal of Information Science |volume=38 |issue=2 |date=April 1986}} ...|last=Yager |first=R. R. |last2=Liu |first2=L. |year=2008 |series=Classic works of the Dempster–Shafer theory of belief functions |title=Studies in fuzzine ...
    1 KB (176 words) - 18:32, 13 May 2019
  • ...n of the lifted function: <math>f'~x</math>. Intuitively, flattening thus works by replacing all function applications with applications of the correspondi ...nsional value vector ''V'' containing scalar elements, alongside auxiliary information recording the nested structure, typically in the form of a boolean flag vec ...
    3 KB (414 words) - 16:10, 5 October 2024
  • ...analyzed using standard geometrical techniques along with some assumptions about limiting cases. There are two different ways to execute TMA: manual and aut ...method that is specifically designed for a 2leg-1zig scenario. This method works by first estimating the bearing rates during the first <math>BR^1</math> an ...
    3 KB (513 words) - 18:05, 10 December 2021
  • '''Armin Dale Kaiser''' (November 10, 1927 – June 5, 2020)<ref>information from ''American Men and Women of Science'', Thomson Gale 2004</ref> was an ==Selected works== ...
    4 KB (628 words) - 10:26, 26 November 2024
  • ...nformation. Intuitively, for the k sample intervals during which no fresh information is available, the system is controlled by the inner loop which contains a p To check that this works, a re-arrangement can be made as follows: ...
    3 KB (526 words) - 08:25, 1 August 2023
  • ...nus ''Bacillus'', it can form an [[endospore]] a bud that contains genetic information in the chance the bacteria cell dies, later when conditions become more hos ...y form [[tarball (oil)|tarball]]s. In these tarballs the ''B. submarinus'' works with other organisms such as ''[[Chromobacterium violaceum]]'' and ''[[Cand ...
    4 KB (543 words) - 09:21, 20 February 2023
  • ...p-sort-in-python | title=Sleep Sort in Python | date=June 2024 }}</ref> It works by associating a counter with each element to be sorted. Each counter is in There is a lot of discussion about the complexity of this algorithm. Although some believe that the complexity ...
    5 KB (632 words) - 15:00, 20 November 2024
  • The center of each card held the relevant information—typically the name and author of a book, research paper, or journal article Some sets of cards contained all the information required by the user on the card itself, handwritten, typewritten, or on mi ...
    9 KB (1,488 words) - 10:16, 22 June 2024
  • ...s a [[mechanism design|mechanism]] in which the designer does not have any information on the agents' valuations, not even that they are random variables from som This "empirical [[Bayesian-optimal mechanism#Myerson|Myerson mechanism]]" works in some cases but not in others. ...
    7 KB (1,038 words) - 16:27, 17 June 2023
  • The '''Catalogue of Endangered Languages''' (ELCat) is a major resource for information on the [[endangered languages]] of the world. It is available to the public ==Language information== ...
    9 KB (1,259 words) - 20:24, 12 February 2024
  • ...y. The idea that some of our rules of inference should depend on empirical information, which may not be forthcoming, is so foreign to the character of logical in ...ulations given here, however, we have downright good reason to be atheists about c, and have good reason to still claim <math>\forall x(x\text{ exists})</ma ...
    8 KB (1,111 words) - 22:18, 28 July 2023
  • In an MDPC code, information bits are organized into an <math>N</math>-dimensional structure, where each while the number of information bits <math>d</math> is given by ...
    4 KB (622 words) - 12:01, 6 February 2025
  • ...; therefore. the system obeys the second law of thermodynamics inasmuch as information is first gained but then erased.]] ...)|entropy]]. When the demon is reset i.e. when the ligand is released, the information is erased, energy is dissipated and entropy increases obeying the [[second ...
    12 KB (1,728 words) - 22:12, 15 January 2024
  • ...d ''e'' form the public key pair {{nowrap|(''e'', ''N'')}}. By making this information public, anyone can [[encrypt]] messages to Bob. The [[decryption]] exponent ...l result in an insecure system in which an attacker can recover all secret information, i.e., break the [[RSA (algorithm)|RSA]] system. This break is based on Wie ...
    12 KB (1,751 words) - 15:49, 21 February 2025
  • ...born June 15, 1959)<ref name="kast" /> is a South Korean mathematician who works as a professor of mathematics at the [[Pohang University of Science and Tec Choie works on various aspects of [[Jacobi form]]s.<ref>{{Cite journal|last1=Choie|firs ...
    8 KB (1,016 words) - 12:32, 7 February 2025
  • | field = [[Computer science]], [[information visualization]] ...indlmann''' is an [[Americans|American]] computer scientist who works on [[information visualization]] and [[medical imaging|image analysis]].<ref>{{cite web|titl ...
    6 KB (789 words) - 21:36, 21 January 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)