How Hacker News ranking really works: scoring, controversy, and penaltieshttp://www.righto.com/2013/11/how-hacker-news-ranking-really-works.html
with different algorithms to improve the graph since it is pretty noisy. On average, about 20% of the articles on the front page have been penalized, while 38% of the articles on
The Digital Michelangelo Projecthttp://accademia.stanford.edu/mich/
together with algorithms developed at Stanford for combining multiple range and color images, allow us to reliably and accurately digitize the external shape and surface character
U of A GAMES Group Home Pagehttp://webdocs.cs.ualberta.ca/~games/
We have developed fast algorithms for Optimal Sequence Alignment for DNA and proteins. Scripting languages We are developing scripting languages for computer role-playing games su
U of A GAMES Group Home Page
My bookmarks - Seirdyhttps://seirdy.one/bookmarks/
of tuning optimization algorithms in the opposite direction to create deliberately harmful results, with the prime example being using medical tools to create bioweapons. Scary ye
Links from around the web, curated and annotated by Seirdy.
Cryptography Amicus Brief 10/96https://archive.epic.org/crypto/export_controls/amicus_brief.html
cryptographic algorithms. See 22 C.F.R. §121.1(XIII)(b)(1). To determine whether the United States Munitions List includes aparticular item (and thus whether the item is subj
6502http://www.crbond.com/6502.html
science topics, methods algorithms and software for the ubiquitous 6502 microprocessor. Much of the material is unique or not readily available elsewhere. The contents of t
Merrett's Databases at McGillhttps://www.cs.mcgill.ca/~tim/
and other spatial data algorithms in Aldat. Temporal data is similarly easily supported. And we have implemented an expert system shell in 200 lines of Aldat code which subsumes t
Home Page - Metamathhttps://us.metamath.org/
itself rather than by algorithms embedded in the verification program. Computer verification programs never get tired and rigorously check every step. There is the risk that a ver
Deep Learning: Computer Vision with Fast / Deep / Recurrent Neural Nets Etc Yields Best Results on Many Benchmarks, and Wins Many Contests (Juhttps://people.idsia.ch/~juergen/vision.html
unsupervised learning algorithms for 20 years . However, our new systems' feature detectors (FDs) do resemble those found by our old unsupervised methods such as Predictability Mi
Jean-Marc Valin — Publicationshttp://jmvalin.ca/publications.html
Audio Localization Algorithms for Artificial Audition on Mobile Robots , Proceedings of IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS) , 2009. J.-M. Va
Making an OS that Doesn't Suckhttp://www.uruk.org/opinions/os.html
the fact that the core algorithms implemented in currently used OSes are generally 30+ years old, and often from a rather common set of semantics. The core APIs for both Windows a
The Gig Economy — Chadnethttps://wiki.chadnet.org/the-gig-economy
tower, there persisted algorithms and registters, state machines and subroutines. In the computational environment of the song, all of those entities existed also. The high priest
The greatest website on the interwebz!
Find more...