Jump to content

User:LinguisticMystic/q

From Wikipedia, the free encyclopedia

abductive logic programming abductive reasoning absolute address absolute code abstraction (software engineering) accelerating change access-control entry access attack access method access modifier access provider access time accessor accessor function acoustic model action language action model learning action selection activation function active-set method active learning adaptive algorithm adaptive neuro fuzzy inference system address bar address book address bus administrator admissible heuristic affective computing affine arithmetic agent-oriented programming agent architecture air traffic control algorithm algorithm function object algorithmic efficiency algorithmic information theory algorithmic probability algorithmic trading algorithmically random sequence alignment alt-tech ambient intelligence ambient light sensor amortized analysis amplifier analog computer analytical engine analytics and eq angle bracket annotation answer set programming anticipatory paging antimalware antispoofing antivirus storm anytime algorithm appliance computer application binary interface application firewall application gateway firewall application program application programming interface apprenticeship learning approximate string matching approximation algorithm approximation error arc routing architecture argument passing argumentation framework argv arithmetic logic unit arithmetic operation arithmetic shift arity array out-of-bounds error array processing language artificial immune system artificial intelligence arms race artificial intelligence in government artificial intelligence systems integration asm aspect-oriented language aspect-oriented programming aspect-oriented programming language aspiration window assembly language assignment association rule learning asterisk asymmetric key algorithm asymptotic computational complexity attack model attention mechanism attribute attribute-based access control attributional calculus automata-based programming automata theory automated planning and scheduling automated reasoning automatic data processing machine automatic differentiation automatic teller machine autonegotiation autonomic computing autonomous car autonomous robot autoplay back end back out backend backpropagation through time backtick backup backward chaining bacterial colony optimization bag-of-words model bag-of-words model in computer vision baiting bandwidth throttling bar chart base class base register base station basic feasible solution batch learning batch normalization batch processing system battle of the sexes beam search beap bees algorithm behavior informatics behavior tree belief–desire–intention software model best-first search bias bias–variance tradeoff binary digit binary semaphore biotech birthday paradox bit array bit vector bitmap bitstring bitwise shift black hat hacker blackboard system blackhole routing blackholing blade server block cipher mode of operation blockquote boot boot block boot loader bootloader bootstrap aggregating bootstrap program bootstrapping botmaster bottom-up design bounds checking brain technology branch and price branching factor breakpoint bridge and torch problem broadcast storm control browser budget constraint bug out buggy bulletin board business process automation by default byte byte order mark bytecode cable modem cache algorithm cache hierarchy cache hit cache placement policy cache replacement algorithm cache replacement policy caching callback caller ID spoofing campus area network canonical correlation canonical form capacitor capsule neural network carriage return case-based reasoning case sensitivity casting a value cellular phone centipede game central processing unit cerr certbot cflow character character set chatbot checker checkers child class cipher ciphertext-only attack circular shift circular wait class-based programming class template client-server architecture clip art clipboard clock algorithm cloud robotics cluster analysis clustered file system clustering code point codec coefficient of determination cognitive architecture cognitive computing cognitive science coin change problem cold boot collectd combinatorial game theory combining form command committee machine commonsense knowledge commonsense reasoning communication endpoint compact disc comparison operator compatibility compatible compile compile-time rational arithmetic composition over inheritance compression ratio computational biology computational chemistry computational creativity computational cybernetics computational engineering computational humor computational intelligence computational learning theory computational linguistics computational logic computational mathematics computational neuroscience computational number theory computational physics computational science computational statistics computer-aided design computer-automated design computer algebra system computer architecture computer audition computer emergency response team computer game computer graphics computer hardware computer keyboard computer mouse computer networking computer program computer scientist computer security software computer system computer virus concatenate concatenation concatenative programming concept drift concept programming concrete class concurrency concurrent programming condition variable library conditional random field configuration configure confusion matrix conic optimization conio.h connectionism consensus based optimization consistent heuristic console console cable const-correctness const cast constant reference consteval constrained conditional model constraint logic programming constructed language container adaptor content delivery network content management system continuous glucose monitor continuous knapsack problem contract assertion control character control structure control theory convert convolutional neural network cookie cooperative bargaining copy assignment operator core router core switch cout covering problem cpp credential credential theft credit card criss-cross algorithm crossover (genetic algorithm) crowdsourcing crypto map cryptographic protocol cryptovirus curriculum learning curve fitting problem custom allocator cyberattack cybercriminal cybernetics cybersecurity cyberspace cyclic redundancy check da Vinci Surgical System data-centric security data-driven programming data acquisition data analyst data at rest data augmentation data buffer data center data circuit-terminating equipment data cleaning data encryption data execution prevention data fusion data integration data masking data mining data model data privacy data processing data science data scientist data security data segment data set data stream data terminal equipment data theft data transfer object data warehouse database database administrator database management system database model database server database system dataflow programming datagram deadlock prevention algorithm debug debug mode debugger debugging decentralised application decentralized decentralized network decision boundary decision support system decision theory declaration declaration of a variable declarative programming declare decltype decryption deductive classifier deencapsulation default logic default parameter defibrillator defragmentation delegation deluser density estimation denylisting deque dereferencing a pointer derived class description logic desktop computer desktop publishing developmental robotics dhcpstarv diagnosis (artificial intelligence) dialog box dialogue system dictator game dictionary comprehension difference engine differential game diffusion model digital computer digital divide digital subscriber line digital trust digital video disc diner's dilemma diode directive directory service disable discovery protocol discrete programming discrete system disjoint-set data structure disjoint set disk encryption theory disk image disk scheduling dispatch table display distributed algorithm distributed computing distributed file system distributed lock manager distributed network djb dmesg documentation dog food dominating set problem donut dot-com company dot notation dot operator double-tagging attack double address operator drag and drop driver drone dynamic epistemic logic dynamic linkage dynamic linking dynamic packet filtering dynamic web page e-commerce e-mail spoofing eBGP eBay eDirectory eager learning earliest eligible virtual deadline first early binding echo state network economic equilibrium economic order quantity edge router effective access time egalitarian item allocation egg timer egress electric vehicle electrical connector electrical crimp electricity electronic design automation elevator algorithm elliptic curve integrated encryption scheme email embedded system embodied agent embodied cognitive science empirical algorithmics empirical risk minimization enable encryption encryption at rest endif endl endpoint ensemble averaging ensemble learning entity-relationship diagram entity-relationship model entry point enumeration error-driven learning error detecting code escape sequence espionage evaluation order evolutionary computation evolutionary computing evolving classification function exception executable executable file execution time exfiltration expectation–maximization algorithm expert system expression-oriented programming language extremal optimization factor analysis failover fair cake-cutting fair division fast-and-frugal trees fault tolerance feature-oriented programming feature engineering feature extraction feature learning feature selection federated learning ferroelectric random access memory fetch–decode–execute cycle field-programmable gate array file sharing file system financial technology finite-state machine fintech firewall evasion first-come, first-served fixed point float floating floating-point data type floating-point environment floating-point unit floating point floppy floppy disk drive fluent (artificial intelligence) foreign key formal grammar formal language forward chaining forward list forward propagation fractional knapsack problem fractional programming frame (artificial intelligence) frame language frame problem framework freestanding implementation frequency analysis friend operator friendly AI friendly artificial intelligence front-end web development front-side bus frontend full stack fully qualified domain name function-level programming function body function call function header function key function signature functional dependency functional programming fundamental type futures studies fuzzer fuzzy clustering fuzzy control system fuzzy logic fuzzy rule game tree gaming gap reduction garbage in, garbage out gated recurrent unit general routing problem generalized assignment problem generative model generic programming genetic operator gift-exchange game gimbal glowworm swarm optimization glucosimeter goto graceful degradation grammar induction graph (discrete mathematics) graph algorithm graph data type graph database graph matching graphical graphical model graphical user interface graphics processing unit greedoid grey hat hacker groupadd hard disk drive hard drive hardware engineer hash hash map hash table hashing heap help heuristic hidden Markov model hierarchical clustering hierarchical protection domains high-performance computing high voltage hill-climbing search hole punch home page homoiconicity host-based firewall host-based intrusion-prevention system hot spot hping human-in-the-loop human–computer interaction hybrid cloud hybrid firewall hybrid intelligent system hyper-heuristic hypergraph hyperparameter hyperparameter optimization hypertext identity and access management if statement ifdown ifup image processing imperative programming imperatív programozási nyelv imperialist competitive algorithm implement implementation include directive independent component analysis indexing into an array indicator of attack inductive programming industrial AI industrial control system inference engine infinite chess infinite recursion information and communications technology information hiding information integration information retrieval information science information security management information system information theory information visualization infosec input buffer input method insertion sort install instant messaging instruction set insulin pump integer array integer literal integrated circuit integrated device electronics intellectual property intelligence amplification intelligence explosion intelligent agent intelligent control intelligent personal assistant interaction designer interface internationalization internet service provider interpolation interpretation (logic) interrupt request interrupt vector table intractability intrinsic motivation (artificial intelligence) invariant subspace problem invoke iotop isolation forest issue tree istream iterative deepening depth-first search iterative deepening search iterative search iterator jQuery jabbering jagged array job scheduling junction tree algorithm k-means clustering k-nearest neighbors algorithm kernel kernel machines kernel method kernel mode kernel module kernel space key-recovery attack key authentication key field key stretching keyboard keyboard shortcut keyword argument knot equivalence problem knowledge-based system knowledge Interchange Format knowledge acquisition knowledge engineering knowledge extraction knowledge representation and reasoning known-key distinguishing attack known-plaintext attack language language-oriented programming language model laptop computer lattice-based cryptography lattice problem layering lazy learning lazy loading learning curve learning to rank least frequently used least recently used lexical scope light-emitting diode line break linear-fractional programming linear discriminant analysis linear programming relaxation linear regression linearizability link aggregation linprog liquid crystal display list comprehension literate programming livelock local area network local convergence local outlier factor local search locale library localhost locality of reference lock out log in log out logic gate logic programming logical expression logical shift loop loose coupling low level memory management macchanger machine listening machine perception machine translation machine vision macof macro magic word magnetoresistive random access memory main() mainframe computer maintainability malicious software malloc mark-and-sweep matching pennies maximal independent set maximum cut maximum flow problem mc mean-field game theory mean shift mechanism design mechatronics medical imaging meet-in-the-middle attack member variable memory bus memory controller memory deallocation memory geometry memory hierarchy memory stick memtransistor merge algorithm message board message passing message queue metabolic network reconstruction and simulation metadata method method overloading microcomputer microelectronics microkernel microprocessor migration minicomputer minimax algorithm mismatch mkdir mkfifo mkfs.vfat mlecchita vikalpa mobile computer mobile device model checking modular connector modulus operation modulus operator modus tollens molecular modelling motherboard mouse mouse pad move assignment operator move semantics multi-paradigm language multi-swarm optimization multicore multilayer perceptron multimodal learning multiple instruction, multiple data multiplexing multiplicative group of integers modulo n mutation (genetic algorithm) mutator function mutator method muxing n-player game naive Bayes classifier naive semantics name mangling name server named graph named requirement natural language generation natural language processing natural language programming neobank nested statement netfilter network administrator network bridge network flow problem network interface controller network motif network perimeter network router network stack network switch network switching subsystem network traffic filtering network traffic logging neural Turing machine neural machine translation neural network neural radiance field neuro-fuzzy neuro-symbolic AI neurocybernetics neuromorphic engineering new int newline node (computer science) non-negative matrix factorization non-repudiation non-structured programming non-uniform memory access non-volatile memory non-volatile random access memory nondeterministic nondeterministic programming nonlinear conjugate gradient method nonrepudiation not frequently used page replacement algorithm nouvelle AI nuclear medicine null-terminated byte string null-terminated character sequence null-terminated multibyte string null-terminated wide string null terminator nullability numeric library numerical analysis numerical integration oVirt obfuscation object-oriented object aggregation object composition object identifier obsolescence off-by-one error offline learning one-armed router online algorithm online analytical processing online machine learning onsemi ontology learning op5 Monitor open-source software openSUSE operand operating system operational amplifier operator precedence optical character recognition optical fiber optimal substructure optimization optional library oscilloscope ostream output stream operator overlapping subproblems overload resolution overloading packet sniffing page fault frequency page reclamation page stealing parallel algorithm parallel computing parametric search paravirtualization parent class parser partial order reduction partially observable Markov decision process particle swarm optimization pass-by-value passing by reference passing by value passive interface passphrase pathfinding pattern matching pattern recognition payload data peer-to-peer peer-to-peer file sharing penalty method penetration testing pentagram pentesting perceptron perfect information perimeter network permutation cipher personal computer phishing phone tap photoelectric effect platform as a service» plug and play point of sale polyalphabetic substitution polygraphic substitution pop out portable computer portfolio optimization post-quantum cryptography potential game power line digital subscriber line power supply unit pragma once predicate logic predictive analytics prefetching prepend preprocessor command primary key primitive data type princess and monster game principal component analysis principal variation search principle of least authority principle of rationality print printer priority inversion private access specifier private cloud private member function private member variable privilege probabilistic programming probabilistic programming language probably approximately correct learning probably approximately correct learnings process-oriented programming process network synthesis processor processor coupling production system program stack program structure programmatic programmer programming programming language programming paradigm project management proof-of-stake proof-of-work proper generalized decomposition propositional calculus protected access specifier protected member function protected member variable protection ring protein folding protein function prediction protocol data unit protocol overhead protocol stack proximal policy optimization proxy proxy cache proxy firewall pseudocode pseudorandom public access specifier public member function public member variable pulse oximeter punch card push back pwd q-learning qBittorrent quadratic knapsack problem qualification problem quality assurance quantifier (logic) quantum quantum annealing quantum computing quantum cryptography quantum key distribution quantum optimization algorithm quantum supremacy queap query language queue up quintillion r-value rabbit hole racecar radial basis function network radio-frequency identification rail fence cipher rainbow matching random forest random library random replacement random sample consensus randomized algorithm ranges rate-monotonic scheduling reCAPTCHA read-only memory read–eval–print loop real-time real-time operating system real time reasoning system receiver operating characteristic reconnaissance attack reconvergence record rectifier refer reference collapsing referrer spoofing regex library region connection calculus register allocation registered jack regular expression reinterpret cast related-key attack relational database relational database management system relational model relaxation technique release mode relevance vector machine remote sensing remote wiping rename renewable energy repeated game reservoir computing resistance random access memory resource acquisition is initialization resource allocation graph resource contention restriction return statement return value optimization reverse engineering rewriting ribbon risk avoidance rmdir robotic process automation robotics rock paper scissors role-oriented programming roll over rolling release rollover cable root-finding algorithm root bridge attack root bridge hijack root guard rootkit detector round robin round trip route flapping router interface routing routing table rsync ruantum machine learning rule-based machine learning rule-based system run run-length encoding running time runtime dispatch runtime polymorphism satisfiability scalability scheduled system rescue points scheduler scheduling algorithm scientific modeling scoped enumeration screening game script kiddie scripting scripting language scroll scroll bar search algorithm search engine search engine optimization search graph search tree second-order cone programming second chance algorithm secure storage security guard security management segment descriptor selection (genetic algorithm) self-management self-supervised learning semantic-oriented programming semantic network semantic query semantic reasoner semantics (computer science) semi-structured database semicolon semidefinite programming semipredicate problem sensor sensor fusion separate compilation separation logic sequential algorithm server virtualization serverless computing set comprehension sha256sum shell script shift key shogi short circuit shortest job first shortest vector problem side-channel attack sidebar sign in signal processing signaling game similarity learning simplify simulation single-line comment single-page application single-threaded process single instruction, multiple data single sign-on site situation calculus slash sleep mode small stellated dodecahedron smart contract smartglasses smartphone smartwatch snmpd snmptrap snmptrapd snooping snow plow routing problem social media social network software software architect software development software development life cycle software engineer software framework software maintainability software maintenance software metric software stack solar cell solid-state drive solution space solution stack source code source code editor source code management source language space bar sparse dictionary learning sparse matrix spatial-temporal reasoning speech recognition sphere packing spiking neural network spiral optimization algorithm splay tree spoofed URL spreadsheet sqlmap stack stack buffer overflow stacker crane problem stag hunt state (computer science) state space stateful packet inspection stateless stateless firewall state–action–reward–state–action static ARP static IP address static memory allocation static method static multilevel queue static object statistical learning theory statistical relational learning std::accumulate std::acos std::adjacent find std::all of std::any std::any of std::asin std::atomic flag std::atomic ref std::barrier std::basic istream std::basic ostream std::basic regex std::basic string std::basic string view std::cbrt std::cerr std::char traits std::chrono::day std::chrono::milliseconds std::chrono::system clock std::codecvt std::copy std::count std::count if std::distance std::equal std::exception std::expected std::fabs std::filesystem::path std::find std::fixed std::fopen std::forward list std::fstream::close std::fstream::open std::generator std::greater std::hash std::ifstream std::includes std::initializer list std::inner product std::inplace merge std::inplace vector std::integer sequence std::ios std::ios::eof std::ios base std::is sorted std::istream std::istringstream std::jthread std::latch std::lexicographical compare std::list std::locale std::log std::log10 std::make heap std::make pair std::make tuple std::malloc std::map::count std::mbstowcs std::mdspan std::memory order std::merge std::minmax std::mismatch std::next permutation std::none of std::nothrow std::nth element std::nullopt std::optional std::ostream std::partial sort std::partition std::pop heap std::prev permutation std::priority queue::top std::push heap std::rand std::random device std::regex std::regex match std::regex replace std::regex search std::remove std::remove if std::replace std::reverse std::rotate std::search std::set difference std::set intersection std::set symmetric difference std::set union std::setprecision std::shared ptr std::shuffle std::size t std::sort heap std::source location std::span std::stable sort std::string::npos std::string::replace std::stringstream std::stringstream::str std::strlen std::system std::text encoding std::thread::detach std::time std::transform std::type info std::unique std::unique copy std::unordered multimap std::unordered set std::upper bound std::variant std::wifstream std::wstring stdexcept library stochastic game stochastic matrix stochastic semantic analysis stream-based input/output stream cipher attacks stream insertion operator stream operator strictly determined game string string-searching algorithm string algorithms strongly typed language structured programming structured storage stub function subclass subgraph isomorphism problem subinterface subject-matter expert subroutine sudoku superclass supercomputer superintelligence superkey supervisor mode support-vector machine surface area swap partition swappiness switchport symbol table symbolic AI symbolic artificial intelligence symbolic computation symmetric game synchronous dynamic random access memory syntactic sugar syntax synthetic intelligence sysadmin syscall syslog-ng syslog message syslog server system administration system administrator system cloning system daemon systemd-networkd systems analysis systems neuroscience systems science t-distributed stochastic neighbor embedding table tablet tablet computer tacit programming tailgating technological singularity telemetry temporal difference learning tensor network theory terabyte test case tetrahedron text editor theoretical computer science theory of computation thread-local storage three-way comparison thumb drive thumbnail tight coupling time-driven programming time-sharing time-sharing system time bomb token ring toolchain top-level domain topological deep learning total quality management touchpad tracing garbage collection training data set transformer transhumanism transistor transition system transitive transparent firewall transportation theory transposition cipher transshipment problem trap traveler's dilemma traveling purchaser problem treap tree data type tree traversal trie true quantified Boolean formula truncate trunked radio system trunking trustless truth value try-catch blocks tuple two-factor authentication type 9 encryption type cast type signature typed constant uBlock Origin uRPF ultimatum game uname uncanny valley uniform-cost search unique universal memory unordered map library unshielded twisted pair unsigned int update use-after-free use case user user experience user group user interface user space userdel utility library validation data set value-level programming value category variable-length subnet masking variable name vcpkg vector graphics vertex cover problem very-large-scale integration vibecoding video camera video card video game video game console virtual dispatch virtual keyboard virtual reality virtually vision processing unit vision transformer visual programming voice cloning voice recognition volunteer's dilemma vulnerability broker w00w00 w3af war of attrition weak AI weak entity weak typing weakly typed language weapon target assignment problem wearable computer web browser web bug web designer web developer web page web server webserver webshop what you see is what you get white hat whitelist wide area network wild card wind power wireless network interface controller wiretapping word processing word processor working set workstation wrist rest yield() your mileage may vary zero-day attack zero day