Szerkesztő:LinguisticMystic/cs/outline1
mathematics science computer music internet facebook television snow number architecture calendar telephone google engineering logic computer science artificial intelligence microsoft linux statistics operating system game programming language ethics machine trade web browser video game software teacher refrigerator transistor computer keyboard c animation capacitor birch rational number tool diode java military calculator information technology smartphone number theory semiconductor business python central processing unit computer network transformer c++ computer hardware resistor renewable energy random-access memory database computer program laptop electrical engineering radar computer virus personal computer marketing wind power washing machine finance cryptography ohm's law compiler inductor motherboard manufacturing tablet computer intel intelligence debian integrated circuit numerical analysis server optical fiber computer programming huawei credit card game theory decimal local area network social media system mathematical logic router espionage poker automated teller machine machine learning software engineering machine translation computer file perl cheque microwave microwave oven photoelectric effect application software robotics coulomb's law microprocessor visual perception supercomputer combinatorics source code object-oriented programming light-emitting diode design video game console floppy disk bioinformatics lenovo maxwell's equations applied science malware machine code antivirus software virtual private network sequence sensor solar cell multimedia electrical network ruby dell read-only memory discrete mathematics panasonic password airline loki firewall intellectual property graphical user interface geographic information system graph theory assembly language ammeter wire toshiba computer security web server leadership data structure encryption electric power natural language processing cognitive science code asus motivation auction programmer trojan horse oscilloscope graph voltmeter computer graphics mathematical induction computer engineering search engine optimization magenta boolean algebra logic gate computational linguistics gauss's law logistics git internet meme wide area network kirchhoff's circuit laws word processor interpreter voynich manuscript spreadsheet data mining search engine dishwasher factorization privacy data compression remote sensing augmented reality firmware microcontroller computer worm personal digital assistant information system flash memory desktop computer graphics processing unit regular expression device driver zener diode r security optical character recognition mainframe computer denial-of-service attack project management go solid-state drive spyware database management system faraday's law of induction computer-aided design rectifier caesar cipher kitchen stove high-level programming language closed-circuit television metadata simulation computer architecture computer memory metropolitan area network text editor deep learning history of computing hardware sorting algorithm punched card information science multimeter cyberwarfare speech synthesis parallel computing functional programming digital signature integrated development environment scripting language data type regression analysis thyristor operational amplifier user virtual machine distributed computing genomics genetic algorithm stock market authentication human resource management speech recognition digital rights management computer vision analog computer customer relationship management enterprise resource planning steganography signal processing human–computer interaction software development electronic warfare system software home automation uninterruptible power supply social engineering computational chemistry microcomputer rust software testing data warehouse risk management swift relational database microelectronics library fujitsu embedded system air traffic control telemetry rootkit analog-to-digital converter imperative programming structured programming power supply programmable logic controller workstation agile software development training object dynamic random-access memory low-level programming language digital electronics hash table adware photonics amplifier debugger field-programmable gate array pseudocode knowledge management least squares string reverse engineering projective geometry parsing minicomputer home computer compaq variable rongorongo binary-coded decimal coaching energy level avionics routing supply chain management editing linear regression electronic engineering system administrator p–n junction cluster analysis consumer protection digital currency computer multitasking theory of computation control theory academic discipline automata theory optoelectronics clothes dryer laser diode electronic oscillator sales digital signal processing digital signal processor power factor recruitment it ohmmeter symmetric-key algorithm factor analysis utility software music sequencer static random-access memory systems engineering extreme programming telephony inheritance novell macro reinforcement learning debugging lean manufacturing tree security guard evaluation office suite schottky diode supervised learning file sharing decision theory access control public key certificate history of video games computer simulation memristor switched-mode power supply scrum procedural programming real-time operating system facial recognition system cipher service-oriented architecture snakes and ladders honeywell logic programming vigenère cipher avaya power electronics computational physics sampling multi-factor authentication waterfall model image processing quantum computing raytheon central heating coding theory computer-aided manufacturing computational complexity theory mesh networking exciton voltage regulator authorization principal component analysis halting problem researcher total quality management quantum cryptography text mining bayesian network kalman filter perceptron change management computer scientist analytical engine kinect man-in-the-middle attack support vector machine pattern recognition declarative programming quantization folding@home greedy algorithm abstraction non-volatile memory packet analyzer conditional commerce exploit application-specific integrated circuit one-time pad spintronics presentation program wattmeter decision tree control flow statistical classification language model microarchitecture nortel consumer electronics mercurial esoteric programming language multi-user dungeon search algorithm network security public key infrastructure estimation quality assurance linker intrusion detection system first-order logic unsupervised learning assembler crystal oscillator charge carrier timer glottochronology olivetti generic programming julia software maintenance military exercise software architecture phase-locked loop thin-film transistor teamwork spectrum analyzer evolutionary algorithm software development process management information system magnetic-core memory convolutional neural network software-defined radio verilog accounting software electronic band structure concurrency complexity history of artificial intelligence x.509 color space k-means clustering preprocessor manager make metaprogramming recursion use case constructor differential amplifier electronic data processing robotic vacuum cleaner image compression atmel aspect-oriented programming aliasing electronic voting hardware description language darlington transistor sequential logic very-large-scale integration recurrent neural network software patent wearable computer modular programming network administrator frequency analysis blowfish queueing theory swarm intelligence dictionary attack combinational logic decision support system ram air conditioner yacc multiset semiconductor device fabrication unisys logistic regression cray syntax statement event-driven programming generative adversarial network message authentication code thin film scytale computational science pair programming associative array merkle tree cryptology script kiddie expression random forest data management interpreted language playfair cipher value analysis of algorithms anonymous function formal methods implementation type theory loss function machine vision virtual keyboard bayesian statistics object database v-model volatile memory very long instruction word handwriting recognition spiral model engadget certificate authority n-gram onion routing programming tool domain-specific language comparator human resource management system cross-validation backpropagation iris recognition internet security plaintext ant colony optimization algorithms k-nearest neighbors algorithm expectation–maximization algorithm payload edge detection nanoelectronics concurrent computing for loop information privacy twofish freezer keras feistel cipher stochastic matrix prototype-based programming image segmentation overfitting depletion region rational unified process reserved word rapid application development activation function software engineer motorola 6800 salt multiprocessing security alarm high frequency internet privacy operator while loop analytics randomized algorithm history of programming languages color model quantum algorithm history of radio software quality compiled language online traffic enforcement camera intrusion prevention system portable computer digital filter long short-term memory deterministic algorithm formal verification mean squared error electronics industry statistical machine translation anomaly detection bond market semiconductor industry genetic programming programmable logic device combinatory logic network management computational neuroscience venona project gradle self-organizing map dendrogram educator altera product lifecycle management software metric distributed control system programming language theory automatic programming birthday attack data security particle swarm optimization surface acoustic wave photovoltaic system computer emergency response team simultaneous localization and mapping document classification association rule learning cross-correlation material requirements planning forward secrecy dynamic programming language electronic design automation software suite processor design data acquisition signal generator switch statement linear discriminant analysis automatic summarization decision tree learning loader hough transform software cracking dimensionality reduction viterbi algorithm lorenz cipher ultra named-entity recognition semiconductor detector history of computer science algorithmic information theory constraint programming question answering configuration management collaborative filtering speech processing avalanche diode cyber spying sybase tabula recta runtime system part-of-speech tagging dartmouth workshop reduction sober cleverbot sea lane fixed-point arithmetic semiconductor memory differential cryptanalysis replay attack case-based reasoning technical support serpent knowledge engineering feedforward neural network obsolescence history of operating systems density of states multi-paradigm programming language hospital information system human error object detection hill cipher hardware register graphical model linear regulator confusion matrix complex programmable logic device multiple sequence alignment ciphertext sorting post-quantum cryptography energy harvesting filter q-learning gamma correction software documentation path dependence scale-invariant feature transform gaussian process history of computing water heating jaccard index dynamic systems development method natural deduction transfer learning network analyzer logic synthesis bag-of-words model molecular electronics computer and network surveillance gate turn-off thyristor list of algorithms gesture recognition algorithmic efficiency m0n0wall scikit-learn separation of concerns literate programming curse of dimensionality list of computer scientists canny edge detector ensemble learning hierarchical clustering parallel algorithm independent component analysis meet-in-the-middle attack bioelectronics feature selection radon transform thermal management build automation mobile computing block soft computing history of television active filter salsa20 software development methodology feature mobile security clock generator password cracking kasiski examination symbolics iris flower data set feature learning c4.5 algorithm ipfirewall item response theory device fingerprint latent semantic analysis markov random field component-based software engineering physical security nearest neighbor search gene prediction generative model grammar checker information visualization hardware virtualization histogram equalization kaggle known-plaintext attack boosting business software user account printed electronics rabin cryptosystem topic model timeline of programming languages electric power conversion mobileye vacuum-tube computer domain knowledge array programming cognitive radio affine cipher evaluation strategy hebbian theory multispectral imaging email filtering feature engineering business analyst hybrid integrated circuit delta-sigma modulation beale ciphers reverse auction eigenface evolution strategy optical storage inductive logic programming key derivation function motor controller stochastic gradient descent kernel density estimation orange stateful firewall template metaprogramming excess-3 lucifer linear classifier content-based image retrieval binary classification gabor filter requirements engineering information engineering evolutionary programming feature extraction dynamic time warping multidimensional scaling bias–variance tradeoff semi-supervised learning correspondence analysis higher-order logic random oracle a5/1 gradient boosting projection keyboard secret sharing planar process optical flow agent-oriented programming online machine learning goal setting probably approximately correct learning autonomic computing kernel method homoiconicity particle filter ciphertext-only attack mutation fitness function list of unsolved problems in computer science temporal difference learning automotive electronics structural equation modeling markov model encryption software electronic circuit simulation commitment scheme artificial immune system local outlier factor buyer chosen-plaintext attack comparison of programming languages timing attack deeplearning4j random sample consensus bootstrap aggregating reactive programming class-based programming linear cryptanalysis perplexity organic electronics tone mapping inverted pendulum answer set programming rubber-hose cryptanalysis conditional random field ferranti listening computer access control crossover software architect rake operations support system transistor computer visual cryptography camellia midrange computer extreme learning machine statistical learning theory chosen-ciphertext attack apriori algorithm application security discriminative model decision table probabilistic context-free grammar computer appliance passphrase vector quantization file deletion formal concept analysis power analysis defensive programming gui