wiby  
Settings



Introduction: Why Lisp?

https://gigamonkeys.com/book/introduction-why-lisp.html

for breeding genetic algorithms to play the game of Go--that I had written early in my career as a Java programmer. Even handicapped by my then rudimentary knowledge of Common Lis

xx80 | Opinionated Guides

https://opguides.info/posts/xx80/

Level Programming 15  Algorithms and More 15½ Data is hard 16  Git, Testing, CI & CD 17  Optimization 18  Graphical Programming 19  Shaders + GpGPU 20  (((())(()((()(())))))) 21 
The year is 198x. #I stare at my amber terminal. Hexadecimal fills my screen and my mind has become lost in the flow of 6502 assembly, as I hand optimize the code flow.I’m

Eavesdropping and Electronic Surveillance Detection - Advanced Electronic Security Company

https://www.bugsweeps.com/info/eavesdropping_detection.html

no open review of the algorithms. These devices are also very expensive, costing around $US 2,000 each. There is also the possibility that the devices are deliberately not secure.
Eavesdropping Detection, TSCM bug sweeps telephone, computer data lines, and bug sweep offices to free them of electronic eavesdropping and wiretaps

Ralph Merkle's Home Page

http://ralphmerkle.com/

cryptographic algorithms will be long, and the time to adopt the resulting standards worldwide will be long, and the time to deploy systems compliant with the adopted standards wi
Ralph C. Merkle's Home Page

Brief History of Character Codes in North America, Europe, and East Asia

http://tronweb.super-nova.co.jp/characcodehist.html

the correct sorting algorithms, for example, can be applied to data in a multilingual environment. Still others are that it does not provide for "user defined characters,&quo

Dissolving Confusion about Consciousness

https://reducing-suffering.org/dissolving-confusion-about-consciousness/

them execute cognitive algorithms that make them act in ways that we call "believing that it feels like something." I'll put it another way: If you hold an implicitly dualist view

The NSA - The Super Secret National Security Agency

https://www.bibliotecapleyades.net/sociopolitica/sociopol_nsa.htm

 -  How Algorithms Rule The World      -  How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations    -&nb

Ye Olde Blogroll - Because blogs are the soul of the web

https://blogroll.org/

updated regularly. No algorithms ever! About the blogroll Submit your blog Filter by topic Art & Design Daily Life Digital Gardens Directories Food & Drink Microblogs Outdoor Life

PHYS771 Lecture 8: Crypto

https://www.scottaaronson.com/democritus/lec8.html

definition, we consider algorithms A that find anything in the preimage of f(x), not just x itself. I claim that the existence of PRG's implies the existence of OWF's. Can anyone

An Exploration in the Space of Mathematics Educations

http://papert.org/articles/AnExplorationintheSpaceofMathematicsEducations.html

and using different algorithms in the systematic or in the random components of behavior. In my experience of similar situations (I have not actually worked with this one), the st

NLnet; All projects

https://nlnet.nl/project/index.html

queue management algorithms on Linux CalDAV Notes NGI0 Commons Fund 2026 Standards-based approach to notetaking levering VJOURNAL Calligra-SVG 2012 Improve fallback mechanisms in

Interfluidity :: Liquidity As Information

https://www.interfluidity.com/posts/1168424241.shtml

there cannot be perfect algorithms for everything, societies will fail if their institutions are so corrupt as to be entirely unable to yield judgments that are at least good enou


Find more...