Search results
Appearance
- A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with a fixed size of n {\displaystyle n}...48 KB (6,228 words) - 08:01, 25 June 2024
- Continuous integration (CI) is the practice of integrating source code changes frequently and ensuring that the integrated codebase is in a workable state...20 KB (2,101 words) - 19:02, 3 June 2024
- In computer engineering, instruction pipelining is a technique for implementing instruction-level parallelism within a single processor. Pipelining attempts...21 KB (2,571 words) - 01:33, 10 July 2024
- In software, a wildcard character is a kind of placeholder represented by a single character, such as an asterisk (*), which can be interpreted as a number...5 KB (580 words) - 07:55, 10 June 2024
- A secure cryptoprocessor is a dedicated computer-on-a-chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple...18 KB (1,961 words) - 17:29, 3 July 2024
- In computer science, binary space partitioning (BSP) is a method for space partitioning which recursively subdivides a Euclidean space into two convex...24 KB (2,852 words) - 11:18, 3 July 2024
- Sound Juicer is the official CD ripper program of GNOME. It is based on GTK, GStreamer, and libburnia for reading and writing optical discs. It can extract...3 KB (269 words) - 04:32, 2 January 2022
- A testbed (also spelled test bed) is a platform for conducting rigorous, transparent, and replicable testing of scientific theories, computing tools, and...5 KB (497 words) - 00:04, 17 December 2023
- F2FS (Flash-Friendly File System) is a flash file system initially developed by Samsung Electronics for the Linux kernel. The motive for F2FS was to build...18 KB (2,016 words) - 20:26, 9 February 2024
- Finch is an open-source console-based instant messaging client, based on the libpurple library. Libpurple has support for many commonly used instant messaging...2 KB (114 words) - 05:52, 6 June 2024
- In computer science, a composite data type or compound data type is a data type that consists of programming language scalar data types and other composite...1 KB (132 words) - 16:46, 29 July 2024
- Oracle Forms is a software product for creating screens that interact with an Oracle database. It has an IDE that includes an object navigator, property...17 KB (2,112 words) - 20:27, 29 July 2024
- pfsync is a computer protocol used to synchronise firewall states between machines running Packet Filter (PF) for high availability. It is used along with...3 KB (174 words) - 10:02, 28 April 2022
- In computer science, a calling convention is an implementation-level (low-level) scheme for how subroutines or functions receive parameters from their...33 KB (4,158 words) - 22:31, 12 July 2024
- Project Gutenberg Canada, also known as Project Gutenburg of Canada, is a Canadian digital library founded July 1, 2007 by Dr. Mark Akrigg. The website...3 KB (295 words) - 11:42, 16 May 2024
- Firefly, formerly named PC GAMESS, is an ab initio computational chemistry program for Intel-compatible x86, x86-64 processors based on GAMESS (US) sources...5 KB (391 words) - 17:35, 12 July 2023
- The Extensible Computational Chemistry Environment (ECCE, pronounced "etch-ā") provides a sophisticated graphical user interface, scientific visualization...2 KB (190 words) - 23:09, 17 July 2023
- A render farm is a high-performance computer system, e.g. a computer cluster, built to render computer-generated imagery (CGI), typically for film and...5 KB (597 words) - 19:18, 7 September 2023
- Gabedit is a graphical user interface to GAMESS (US), Gaussian, MOLCAS, MOLPRO, MPQC, OpenMopac, PC GAMESS, ORCA and Q-Chem computational chemistry packages...2 KB (105 words) - 07:32, 7 February 2023
- In cryptography, a ciphertext-only attack (COA) or known ciphertext attack is an attack model for cryptanalysis where the attacker is assumed to have access...5 KB (665 words) - 12:17, 5 September 2023