Search results
Jump to navigation
Jump to search
- A Human Security Model is a security model that focuses on social vulnerability . … <B>Counter-Example(s):</B> National Security ...4 KB (564 words) - 19:21, 5 July 2023
- A Country is a geographical region that is a legal entity . <B>Context:</B> It can (typically) be a Sovereign State . It can ...121 KB (17,330 words) - 02:40, 4 November 2024
- <B>See:</B> Human Security Model , Human Physical Insecurity , Human Emotional Insecurity . ---- ---- References 2011 ( ...2 KB (345 words) - 04:33, 8 May 2024
- A Vulnerability Measure is a system measure of its inability to withstand the effects of a hostile environment . <B>Example(s):</B> ...4 KB (503 words) - 07:03, 8 May 2024
- An International Relations Field is an academic field that studies the complex interactions between states, international organizations, non- ...7 KB (926 words) - 05:08, 30 November 2024
- ( 2001_LearningWithKernels Schölkopf & Smola, 2001 ) ⇒ author::Bernhard Schölkopf , and author::Alexander J. Smola . ( 2001 ). “ http:// ...278 KB (35,806 words) - 18:40, 2 June 2024
- ( 2020_MachineLearningTestingSurveyLan Zhang, Harman et al., 2020 ) ⇒ author::Jie M. Zhang , author::Mark Harman , author::Lei Ma , and ...33 KB (5,035 words) - 18:35, 2 June 2024
- ( 2023_ScalableExtractionofTrainingDat Nasr et al., 2023 ) ⇒ author::Milad Nasr , author::Nicholas Carlini , author::Jonathan Hayase , ...100 KB (15,570 words) - 06:45, 9 February 2024
- ( 2014_DigitalLibraryTechnologiesCompl Fox & Torres, 2014 ) ⇒ author::Edward A. Fox , and author::Ricardo da Silva Torres (editors). ( ...17 KB (2,435 words) - 19:35, 20 December 2023
- ( 2009_AnomalyDetectionASurvey Chandola et al., 2009 ) ⇒ author::Varun Chandola , author::Arindam Banerjee , and author::Vipin Kumar . ...84 KB (11,014 words) - 21:40, 2 December 2023
- A Systems Engineering Practice is an engineering discipline that studies systems engineering task s (which focus on how to design complex ...17 KB (2,242 words) - 08:12, 9 July 2024
- ( 2023_ASurveyonLargeLanguageModelbase Wang, Ma et al., 2023 ) ⇒ author::Lei Wang , author::Chen Ma , author::Xueyang Feng , author:: ...148 KB (19,339 words) - 07:26, 22 August 2024
- ( 1967_ComputationFiniteandInfiniteMac Minsky, 1967 ) ⇒ author::Marvin L. Minsky . ( year::1967 ). “Computation: Finite and Infinite Machines ...143 KB (18,606 words) - 18:40, 2 June 2024
- ( 2022_HolisticEvaluationofLanguageMod Liang, Bommasani et al., 2022 ) ⇒ author::Percy Liang , author::Rishi Bommasani , author::Tony Lee ...323 KB (47,961 words) - 10:00, 3 November 2024
- ( 1999_AnalysisofaVeryLargeWebSearchEn Silverstein et al., 1999 ) ⇒ author::Craig Silverstein , author::Hannes Marais , author::Monika ...77 KB (10,389 words) - 06:36, 8 March 2024
- ( 2009_LaborRegulationsUnionsandSocial Freeman, 2009 ) ⇒ author::Richard B. Freeman . ( year::2009 ). “ http://www.nber.org/papers/w14789.pdf ...18 KB (2,616 words) - 04:32, 8 May 2024
- ( 1999_StratifiedRandomizationforClini Kernan et al., 1999 ) ⇒ author::Walter N Kernan , author::Catherine M Viscoli , author::Robert W ...42 KB (5,994 words) - 04:30, 8 May 2024
- A Software Development Professional is a software practitioner who is an engineer and can perform software development task s ( ...16 KB (2,003 words) - 08:39, 22 January 2025
- ( 2009_IntelligentFileScoringSystemfor Ye et al., 2009 ) ⇒ author::Yanfang Ye , author::Tao Li , author::Qingshan Jiang , author:: ...13 KB (1,661 words) - 07:26, 22 August 2024
- An Actuary is an organizational analyst who can perform actuarial task s. <B>Context:</B> They can be trained in Actuarial Science ...6 KB (775 words) - 01:40, 27 February 2024
- ( 2013_OutlierAnalysis Aggarwal, 2013 ) ⇒ author::Charu C. Aggarwal . ( year::2013 ). “Outlier Analysis.” Springer Publishing Company, ...199 KB (27,359 words) - 07:26, 22 August 2024