CommonJS
CommonJS was a project with the goal to establish conventions on module ecosystem for JavaScript outside of the web browser. The primary reason for its creation was a major lack of commonly accepted form of JavaScript scripts module units which c ...
CSS-in-JS
CSS-in-JS is a styling technique where JavaScript is used to style components. When this JavaScript is parsed, CSS is generated and attached into the DOM. It allows you to abstract CSS to the component level itself, using JavaScript to describe s ...
JavaScript engine
A JavaScript engine is a computer program that executes JavaScript code. The first JavaScript engines were mere interpreters, but all relevant modern engines utilize just-in-time compilation for improved performance. JavaScript engines are typica ...
Isomorphic JavaScript
Isomorphic JavaScript works in the context of a single-page application SPA. In a typical SPA, most of the application logic, including routing, is encapsulated in a bundled JavaScript file that is sent to the client. Whilst this frees up the ser ...
Userscript
A userscript is a program, usually written in JavaScript, for modifying web pages to augment browsing. On desktop browsers such as Firefox, they are enabled by use of a userscript manager browser extension such as Greasemonkey. The Presto-based O ...
Clitic climbing
Clitic climbing is a phenomenon first identified in Romance languages in which a pronominal object of an embedded infinitive appears attached to the matrix verb. Pronominal objects in Romance languages are typically expressed as clitics. The foll ...
Franco-Italian
Franco-Italian, also known as Franco-Venetian or Franco-Lombard, was a literary language used in parts of northern Italy, from the mid-13th century to the end of the 14th century. It was employed by writers including Brunetto Latini and Rustichel ...
Judy array
In computer science, a Judy array is a data structure implementing a type of associative array with high performance and low memory usage. Unlike most other key-value stores, Judy arrays use no hashing, leverage compression on their keys, and can ...
2–3 tree
In computer science, a 2–3 tree is a tree data structure, where every node with children has either two children and one data element or three children and two data elements. According to Knuth, "a B-tree of order 3 is a 2-3 tree." Nodes on the o ...
2–3–4 tree
In computer science, a 2–3–4 tree is a self-balancing data structure that is commonly used to implement dictionaries. The numbers mean a tree where every node with children has either two, three, or four child nodes: a 2-node has one data element ...
Bx-tree
The base structure of the B x -tree is a B+ tree in which the internal nodes serve as a directory, each containing a pointer to its right sibling. In the earlier version of the B x -tree, the leaf nodes contained the moving-object locations being ...
Binary tree
In computer science, a binary tree is a tree data structure in which each node has at most two children, which are referred to as the left child and the right child. A recursive definition using just set theory notions is that a binary tree is a ...
Interleave lower bound
In the theory of optimal binary search trees, the interleave lower bound is a lower bound on the number of operations required by a binary search tree to execute a given sequence of accesses. Several variants of this lower bound have been proved. ...
Left-child right-sibling binary tree
Every multi-way or k-ary tree structure studied in computer science admits a representation as a binary tree, which goes by various names including child-sibling representation, left-child, right-sibling binary tree, doubly chained tree or filial ...
Optimal binary search tree
In computer science, an optimal binary search tree, sometimes called a weight-balanced binary tree, is a binary search tree which provides the smallest possible search time for a given sequence of accesses. Optimal BSTs are generally divided into ...
T-tree
In computer science a T-tree is a type of binary tree data structure that is used by main-memory databases, such as Datablitz, EXtremeDB, MySQL Cluster, Oracle TimesTen and MobileLite. A T-tree is a balanced index tree data structure optimized fo ...
Tango tree
A tango tree is a type of binary search tree proposed by Erik D. Demaine, Dion Harmon, John Iacono, and Mihai Patrașcu in 2004. It is named after Buenos Aires, of which the tango is emblematic. It is an online binary search tree that achieves an ...
Threaded binary tree
In computing, a threaded binary tree is a binary tree variant that facilitates traversal in a particular order. An entire binary sort tree can be easily traversed in order of the main key, but given only a pointer to a node, finding the node whic ...
Tree rotation
In discrete mathematics, tree rotation is an operation on a binary tree that changes the structure without interfering with the order of the elements. A tree rotation moves one node up in the tree and one node down. It is used to change the shape ...
WAVL tree
In computer science, a WAVL tree or weak AVL tree is a self-balancing binary search tree. WAVL trees are named after AVL trees, another type of balanced search tree, and are closely related both to AVL trees and red–black trees, which fall into a ...
AA tree
An AA tree in computer science is a form of balanced tree used for storing and retrieving ordered data efficiently. AA trees are named for Arne Andersson, their inventor. AA trees are a variation of the red-black tree, a form of binary search tre ...
Interval tree
In computer science, an interval tree is a tree data structure to hold intervals. Specifically, it allows one to efficiently find all intervals that overlap with any given interval or point. It is often used for windowing queries, for instance, t ...
Weight-balanced tree
In computer science, weight-balanced binary trees are a type of self-balancing binary search trees that can be used to implement dynamic sets, dictionaries and sequences. These trees were introduced by Nievergelt and Reingold in the 1970s as tree ...
Nearest neighbor value interpolation
In mathematics applied to computer graphics, nearest neighbor value interpolation is an advanced method of image interpolation. This method uses the pixel value corresponding to the smallest absolute difference when a set of four known value pixe ...
Tricubic interpolation
In the mathematical subfield numerical analysis, tricubic interpolation is a method for obtaining values at arbitrary points in 3D space of a function defined on a regular grid. The approach involves approximating the function locally by an expre ...
Bogacki–Shampine method
The Bogacki–Shampine method is a method for the numerical solution of ordinary differential equations, that was proposed by Przemyslaw Bogacki and Lawrence F. Shampine in 1989. The Bogacki–Shampine method is a Runge–Kutta method of order three wi ...
Gauss–Legendre method
In numerical analysis and scientific computing, the Gauss–Legendre methods are a family of numerical methods for ordinary differential equations. Gauss–Legendre methods are implicit Runge–Kutta methods. More specifically, they are collocation met ...
Trapezoidal rule (differential equations)
In numerical analysis and scientific computing, the trapezoidal rule is a numerical method to solve ordinary differential equations derived from the trapezoidal rule for computing integrals. The trapezoidal rule is an implicit second-order method ...
Crout matrix decomposition
In linear algebra, the Crout matrix decomposition is an LU decomposition which decomposes a matrix into a lower triangular matrix, an upper triangular matrix and, although not always needed, a permutation matrix. It was developed by Prescott Dura ...
Symbolic Cholesky decomposition
In the mathematical subfield of numerical analysis the symbolic Cholesky decomposition is an algorithm used to determine the non-zero pattern for the L {\displaystyle L} factors of a symmetric sparse matrix when applying the Cholesky decompositio ...
Bluefire Supercomputer
The Bluefire Supercomputer is an IBM supercomputer installed in May 2008 by the National Center for Atmospheric Research. It is used to advance research into severe weather and the future of Earths climate.
IBM Deep Thunder
Deep Thunder is a research project by IBM that aims to improve short-term local weather forecasting through the use of high-performance computing. It is part of IBMs Deep Computing initiative that also produced the Deep Blue chess computer. Deep ...
Mira (supercomputer)
Mira is a petascale Blue Gene/Q supercomputer. As of November 2017, it is listed on TOP500 as the 11th fastest supercomputer in the world, while it debuted June 2012 in 3rd place. It has a performance of 8.59 petaflops and consumes 3.9 MW. The su ...
Yellowstone (supercomputer)
Yellowstone was the inaugural supercomputer at the NCAR-Wyoming Supercomputing Center in Cheyenne, Wyoming. It was installed, tested, and readied for production in the summer of 2012. The Yellowstone supercomputing cluster was decommissioned on D ...
Cheyenne (supercomputer)
The Cheyenne supercomputer at the NCAR-Wyoming Supercomputing Center in Cheyenne, Wyoming began operation as one of the world’s most powerful and energy-efficient computers. Ranked in November 2016 as the 20th most powerful computer in the world ...
Altix
Altix is a line of server computers and supercomputers produced by Silicon Graphics, based on Intel processors. It succeeded the MIPS/IRIX-based Origin 3000 servers.
page 134
|
2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400
|
Slot A |
|
Socket 754 |
|
Socket 939 |
|
Socket A |
Socket AM1 |
|
Socket AM2 |
|
Socket AM2+ |
|
Socket AM3 |
|
Socket AM3+ |
|
Socket AM4 |
Socket FM2+ |
Socket sTRX4 |
|
Socket TR4 |
|
Super Socket 7 |
Advanced Micro Devices mobile sockets |
Advanced Micro Devices server sockets |
Intel Socket G3 |
|
Socket J |
|
Socket T |
|
LGA 1150 |
|
LGA 1155 |
|
LGA 1156 |
|
LGA 1248 |
LGA 1356 |
|
Socket B |
|
Socket R |
|
LGA 2066 |
|
Slot 1 |
|
Socket 1 |
|
Socket 2 |
|
Socket 4 |
|
Socket 6 |
|
Socket 8 |
|
Socket 370 |
|
Socket 423 |
|
Socket 478 |
|
Socket 479 |
|
Socket 495 |
|
Socket 603 |
|
Socket 604 |
Socket B |
|
Socket G1 |
|
Socket G2 |
Socket J |
|
Socket P |
Socket R |
Socket T |
Intel 8061 |
|
Intel MCS-51 |
|
Intel MCS-96 |
Intel MCS-296 |
|
Intel Quark |
|
H8 Family |
Mitsubishi 740 |
R8C |
|
R8C Tiny |
RL78 |
RX microcontroller family |
|
Assembly shell |
Commodore 2031 |
|
Commodore 4040 |
Commodore 8060 |
Commodore 8280 |
AMD Dragon |
HP 520 Notebook |
|
IBM 5x86C |
Intel SHA extensions |
LatticeMico8 |
Lynnfield (microprocessor) |
|
Motorola 68012 |
Nios embedded processor |
Regency Systems R2C |
Sandy Bridge-E |
|
SCELBI |
|
Sharp PC-1401 |
|
Sharp PC-1403 |
|
Sharp PC-1600 |
AMD Spider |
Tandy 10 Business Computer System |
|
Telmac 1800 |
|
Telmac TMC-600 |
|
Thomson computers |
|
Thomson MO5 |
|
Thomson TO7 |
|
Thomson TO8 |
|
TI PLT SHH1 |
TI-7 MathMate |
TI-12 Math Explorer |
TI-32 Math Explorer Plus |
|
TI-55 |
|
TI-80 |
TI-1030 |
TI-1031 |
Microsoft stubs |
|
Commodore 128 |
Thomson TO7/70 |
|
Commodore CBM-II |
Commodore 116 |
|
Commodore Educator 64 |
|
KIM-1 |
no need to download or install
Pino - logical board game which is based on tactics and strategy. In general this is a remix of chess, checkers and corners. The game develops imagination, concentration, teaches how to solve tasks, plan their own actions and of course to think logically. It does not matter how much pieces you have, the main thing is how they are placement!
online intellectual game →