Public-key cryptography Updated 2025-07-16
It allows you to do two things:
Training and inference Updated 2025-07-16
This is the first thing you have to know about supervised learning:Both of those already have hardware acceleration available as of the 2010s.
- training is when you learn model parameters from input. This literally means learning the best value we can for a bunch of number input numbers of the model. This can easily be on the hundreds of thousands.
- inference is when we take a trained model (i.e. with the parameters determined), and apply it to new inputs
Utah Updated 2025-07-16
Variational formulation of a partial differential equation Updated 2025-07-16
Connected component Updated 2025-07-16
When a disconnected space is made up of several smaller connected spaces, then each smaller component is called a "connected component" of the larger space.
See for example the
Convergent series Updated 2025-07-16
Creative Commons license Updated 2025-07-16
Strategic nuclear weapon Updated 2025-07-16
Surely You're Joking, Mr. Feynman chapter Alfred Nobel's Other Mistake Updated 2025-07-16
Key quote that names the chapter:
My friend Matt Sands was once going to write a book to be called Alfred Nobel's Other Mistake.
Surfing with the Alien by Joe Satriani (1987) Updated 2025-07-16
System of linear equations algorithm Updated 2025-07-16
Tactical nuclear weapon Updated 2025-07-16
Army of the shadows (1969) Updated 2025-07-16
One of the most nerve wrecking movies ever made. Until they decide to rescue their colleague from jail, then it just becomes too surreal.
D and L amino acids Updated 2025-07-16
Division ring Updated 2025-07-16
Two ways to see it:
- a ring where inverses exist
- a field where multiplication is not necessarily commutative
Terminal multiplexers are CLI desktop environments Updated 2025-07-16
Autothroph Updated 2025-07-16
Electron rest mass Updated 2025-07-16
The Godfather (1972) Updated 2025-07-16
Splash screen Updated 2025-07-16
There are unlisted articles, also show them or only show them.