Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Thumbnail for Paul Erdős
    Paul Erdős (Hungarian: Erdős Pál [ˈɛrdøːʃ ˈpaːl]; 26 March 1913 – 20 September 1996) was a Hungarian mathematician. He was one of the most prolific mathematicians...
    50 KB (5,325 words) - 05:15, 2 June 2024
  • Thumbnail for Actuarial science
    Actuarial science is the discipline that applies mathematical and statistical methods to assess risk in insurance, pension, finance, investment and other...
    33 KB (3,818 words) - 17:53, 21 May 2024
  • Thumbnail for Randomized experiment
    In science, randomized experiments are the experiments that allow the greatest reliability and validity of statistical estimates of treatment effects....
    15 KB (1,553 words) - 17:42, 5 February 2024
  • Thumbnail for Adaptive design (medicine)
    In an adaptive design of a clinical trial, the parameters and conduct of the trial for a candidate drug or vaccine may be changed based on an interim analysis...
    42 KB (4,650 words) - 03:23, 9 June 2024
  • SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part...
    51 KB (5,620 words) - 14:24, 19 April 2024
  • In number theory, a Smith number is a composite number for which, in a given number base, the sum of its digits is equal to the sum of the digits in its...
    6 KB (633 words) - 19:07, 22 October 2023
  • The Clay Mathematics Institute (CMI) is a private, non-profit foundation dedicated to increasing and disseminating mathematical knowledge. Formerly based...
    10 KB (1,009 words) - 03:47, 14 June 2024
  • Thumbnail for Where-to-be-born Index
    The where-to-be-born index (previously called the quality-of-life index, abbreviated QLI) was an index last published by the Economist Intelligence Unit...
    5 KB (523 words) - 00:25, 22 May 2024
  • The NIST Dictionary of Algorithms and Data Structures is a reference work maintained by the U.S. National Institute of Standards and Technology. It defines...
    35 KB (3,134 words) - 05:03, 28 January 2024
  • Look up perplexity in Wiktionary, the free dictionary. In information theory, perplexity is a measure of uncertainty in the value of a sample from a discrete...
    12 KB (1,846 words) - 23:14, 17 May 2024
  • Thumbnail for Clipper chip
    The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured...
    18 KB (1,893 words) - 23:22, 28 July 2023
  • Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
    22 KB (2,846 words) - 07:57, 27 March 2024
  • In cryptography, PKCS (Public Key Cryptography Standards) are a group of public-key cryptography standards devised and published by RSA Security LLC, starting...
    10 KB (289 words) - 15:58, 30 May 2024
  • An envy-free cake-cutting is a kind of fair cake-cutting. It is a division of a heterogeneous resource ("cake") that satisfies the envy-free criterion...
    43 KB (5,544 words) - 19:12, 7 May 2024
  • Mathematics education in Australia varies significantly between states, especially at the upper secondary level. While every school offers a state-based...
    24 KB (2,785 words) - 05:00, 12 May 2024
  • Math Girls (数学ガール, Sūgaku gāru) is the first in a series of math-themed young adult novels of the same name by Japanese author Hiroshi Yuki. It was published...
    19 KB (1,970 words) - 18:31, 3 March 2024
  • Project Mathematics! (stylized as Project MATHEMATICS!), is a series of educational video modules and accompanying workbooks for teachers, developed at...
    24 KB (2,228 words) - 04:23, 3 May 2024
  • The Cryptographic Message Syntax (CMS) is the IETF's standard for cryptographically protected messages. It can be used by cryptographic schemes and protocols...
    2 KB (281 words) - 18:19, 29 April 2024
  • In cryptography, indistinguishability obfuscation (abbreviated IO or iO) is a type of software obfuscation with the defining property that obfuscating...
    20 KB (2,086 words) - 20:01, 21 April 2024
  • SigmaPlot is a proprietary software package for scientific graphing and data analysis. It runs on Microsoft Windows. The software can read multiple formats...
    3 KB (211 words) - 16:31, 16 February 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)