Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Thumbnail for Census
    A census is the procedure of systematically acquiring, recording and calculating population information about the members of a given population. This term...
    53 KB (6,232 words) - 01:52, 25 July 2024
  • Thumbnail for Actuarial science
    Actuarial science is the discipline that applies mathematical and statistical methods to assess risk in insurance, pension, finance, investment and other...
    33 KB (3,833 words) - 23:52, 24 July 2024
  • Thumbnail for Paul Erdős
    Paul Erdős (Hungarian: Erdős Pál [ˈɛrdøːʃ ˈpaːl]; 26 March 1913 – 20 September 1996) was a Hungarian mathematician. He was one of the most prolific mathematicians...
    50 KB (5,325 words) - 05:15, 2 June 2024
  • Thumbnail for Adaptive design (medicine)
    In an adaptive design of a clinical trial, the parameters and conduct of the trial for a candidate drug or vaccine may be changed based on an interim analysis...
    44 KB (4,778 words) - 02:46, 17 July 2024
  • Thumbnail for Randomized experiment
    In science, randomized experiments are the experiments that allow the greatest reliability and validity of statistical estimates of treatment effects....
    15 KB (1,553 words) - 17:42, 5 February 2024
  • SHA-3 (Secure Hash Algorithm 3) is the latest member of the Secure Hash Algorithm family of standards, released by NIST on August 5, 2015. Although part...
    51 KB (5,522 words) - 02:45, 11 July 2024
  • In number theory, a Smith number is a composite number for which, in a given number base, the sum of its digits is equal to the sum of the digits in its...
    6 KB (633 words) - 19:07, 22 October 2023
  • The Clay Mathematics Institute (CMI) is a private, non-profit foundation dedicated to increasing and disseminating mathematical knowledge. Formerly based...
    10 KB (1,009 words) - 09:35, 25 June 2024
  • Thumbnail for Where-to-be-born Index
    The where-to-be-born index (previously called the quality-of-life index, abbreviated QLI) was an index last published by the Economist Intelligence Unit...
    5 KB (543 words) - 20:15, 11 July 2024
  • Look up perplexity in Wiktionary, the free dictionary. In information theory, perplexity is a measure of uncertainty in the value of a sample from a discrete...
    13 KB (1,853 words) - 16:49, 13 July 2024
  • The NIST Dictionary of Algorithms and Data Structures is a reference work maintained by the U.S. National Institute of Standards and Technology. It defines...
    35 KB (3,137 words) - 03:02, 24 July 2024
  • Thumbnail for Clipper chip
    The Clipper chip was a chipset that was developed and promoted by the United States National Security Agency (NSA) as an encryption device that secured...
    18 KB (1,893 words) - 23:22, 28 July 2023
  • Strong cryptography or cryptographically strong are general terms used to designate the cryptographic algorithms that, when used correctly, provide a very...
    22 KB (2,846 words) - 07:57, 27 March 2024
  • In cryptography, PKCS (Public Key Cryptography Standards) are a group of public-key cryptography standards devised and published by RSA Security LLC, starting...
    10 KB (289 words) - 10:46, 24 June 2024
  • An envy-free cake-cutting is a kind of fair cake-cutting. It is a division of a heterogeneous resource ("cake") that satisfies the envy-free criterion...
    43 KB (5,567 words) - 10:45, 25 June 2024
  • Mathematics education in Australia Mathematics education in Australia varies significantly between states and territories, particularly at the upper secondary...
    24 KB (2,810 words) - 06:00, 9 July 2024
  • Math Girls (数学ガール, Sūgaku gāru) is the first in a series of math-themed young adult novels of the same name by Japanese author Hiroshi Yuki. It was published...
    19 KB (1,970 words) - 14:15, 23 June 2024
  • Project Mathematics! (stylized as Project MATHEMATICS!), is a series of educational video modules and accompanying workbooks for teachers, developed at...
    24 KB (2,231 words) - 14:04, 5 July 2024
  • The Cryptographic Message Syntax (CMS) is the IETF's standard for cryptographically protected messages. It can be used by cryptographic schemes and protocols...
    2 KB (281 words) - 18:19, 29 April 2024
  • In cryptography, indistinguishability obfuscation (abbreviated IO or iO) is a type of software obfuscation with the defining property that obfuscating...
    23 KB (2,289 words) - 04:12, 27 July 2024
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)