protocol and parameter selection
31Τ Ceti B — Datenbanklinks zu Tau Ceti Stern τ Cet …
32Enhanced 911 — Enhanced 9 1 1 or E9 1 1 service is a North American telecommunications based system that automatically associates a physical address with the calling party s telephone number, and routes the call to the most appropriate Public Safety Answering… …
33WaveLAN — is a brand that describes two completely different families of wireless network solutions: Pre IEEE 802.11 WaveLAN, also called Classic WaveLAN IEEE 802.11 compliant WaveLAN, also known as WaveLAN IEEE or ORiNOCO Contents 1 History 2… …
34Autodesk 3ds Max — Version 2010 interface with a rendered Utah teapot D …
35ГОСТ Р ИСО/МЭК 19762-1-2011: Информационные технологии. Технологии автоматической идентификации и сбора данных (АИСД). Гармонизированный словарь. Часть 1. Общие термины в области АИСД — Терминология ГОСТ Р ИСО/МЭК 19762 1 2011: Информационные технологии. Технологии автоматической идентификации и сбора данных (АИСД). Гармонизированный словарь. Часть 1. Общие термины в области АИСД оригинал документа: Accredited Standards… …
Словарь-справочник терминов нормативно-технической документации
36Design of experiments — In general usage, design of experiments (DOE) or experimental design is the design of any information gathering exercises where variation is present, whether under the full control of the experimenter or not. However, in statistics, these terms… …
37Password — For other uses, see Password (disambiguation). A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource (example: an access code is a type of password). The password… …
38Hayes command set — The Hayes command set is a specific command language originally developed for the Hayes Smartmodem 300 baud modem in 1981. The command set consists of a series of short text strings which combine together to produce complete commands for… …
39Blind experiment — A blind or blinded experiment is a scientific experiment where some of the people involved are prevented from knowing certain information that might lead to conscious or subconscious bias on their part, invalidating the results. For example, when …
40McEliece cryptosystem — In cryptography, the McEliece cryptosystem is an asymmetric encryption algorithm developed in 1978 by Robert McEliece.[1] It was the first such scheme to use randomization in the encryption process. The algorithm has never gained much acceptance… …