The Digital Michelangelo Projecthttp://accademia.stanford.edu/mich/
together with algorithms developed at Stanford for combining multiple range and color images, allow us to reliably and accurately digitize the external shape and surface character
My bookmarks - Seirdyhttps://seirdy.one/bookmarks/
of tuning optimization algorithms in the opposite direction to create deliberately harmful results, with the prime example being using medical tools to create bioweapons. Scary ye
Links from around the web, curated and annotated by Seirdy.
Cryptography Amicus Brief 10/96https://archive.epic.org/crypto/export_controls/amicus_brief.html
cryptographic algorithms. See 22 C.F.R. ยง121.1(XIII)(b)(1). To determine whether the United States Munitions List includes aparticular item (and thus whether the item is subj
Home Page - Metamathhttps://us.metamath.org/
itself rather than by algorithms embedded in the verification program. Computer verification programs never get tired and rigorously check every step. There is the risk that a ver
Will the real oppressed group please stand up?http://digdeeper.love/articles/oppression.xhtml
features such as opaque algorithms and endless scroll," said Australia's eSafety Commissioner Julie Inman Grant. Learn and grow in what way? As a perfectly obedient, dehumanized c
I write, therefore I amhttp://www.iwriteiam.nl/
give some algorithms for creating finite mazes on a rectangle (or square) of a square grid. There are only two algoritms: Wilson's algorithm and Aldous-Broder algorithm . For anim
The hardware chiptune projecthttp://www.linusakesson.net/hardware/chiptune.php
standard compression algorithms, since we were so low on RAM (i.e. there was no room for the unpacked data). Instead, we devised a solution involving variable bit-length data stru
Deep Learning: Computer Vision with Fast / Deep / Recurrent Neural Nets Etc Yields Best Results on Many Benchmarks, and Wins Many Contests (Juhttps://people.idsia.ch/~juergen/vision.html
unsupervised learning algorithms for 20 years . However, our new systems' feature detectors (FDs) do resemble those found by our old unsupervised methods such as Predictability Mi
Tom Murphy 7's Invincible Web Pagehttp://tom7.org/
, 30 weird chess algorithms , making letters even more lowercase , and hard drives we didn't want or need. Or there's my new, worse way to do machine learning , and my new, improv
Netsukuku - P2P mesh routinghttp://netsukuku.freaknet.org/
number of protocols and algorithms for dynamic routing, but they differ from Netsukuku because they are solely utilized to create small and medium nets. The routers of Internet ar
Mesh routing protocol designed to handle a massive amount of nodes with very low resource consumption.
Mike Tanner Articles about Sport and Recreationhttp://mike-tanner.co.nz/40sport.html
camera. Complex algorithms convert the pattern into a depth field, while a standard video camera picks up colour images. In effect, the Kinect does for less than $100 what complex
Website Repairs, Website Design & Web Hosting | Web Page Maintenance & Updatinghttp://www.webrepairs.com/
of changes in the algorithms of the major search engines to ensure high placement for your site. You'll never see a Yakindo logo/link on sites we've developed as your website isn'
We provide Website Repairs, Website Design & Web Hosting, Web Page Maintenance & Updating
Find more...