wiby  
Settings



A Survey of CPU Caches

https://meribold.org/2017/10/20/survey-of-cpu-caches/

of two reasonable algorithms under asymptotic analysis can get quite big because of cache effects. Understanding how CPU caches work helps make good choices for writing fast progr

This FTP site

https://okmij.org/ftp/

without monads; Markov algorithms; R-technology; CK macros; generators vs. lazy evaluation ; IO monad realized in 1965 ; grasping patterns ; the mystery of assignment is syntactic
Main index of okmij.org

RTKernel - Real-Time Multitasking System for DOS

http://www.on-time.com/rtkernel-dos.htm

different scheduling algorithms, the scheduler can be disabled temporarily. Furthermore, task switches at fixed time intervals can be forced using optional time-slicing. Interrupt
RTKernel is a royalty-free real-time multitasking system for DOS. It is compact (about 16k code, 6k data) and provides the programmer with the basic tools needed to develop effici

SM5BSZ Home Page

http://www.sm5bsz.com/

for optimisation of algorithms as well as for comparing different SDR packages. The SDR data file library contains data files with various mixtures of signals and interferences as

Dissolving Confusion about Consciousness

https://reducing-suffering.org/dissolving-confusion-about-consciousness/

them execute cognitive algorithms that make them act in ways that we call "believing that it feels like something." I'll put it another way: If you hold an implicitly dualist view

E-Books Directory - Categorized Links to Free Books

http://www.e-booksdirectory.com/

Lie Groups Evolutionary Algorithms Main categories Arts & Photography Architecture Design & Decorative Arts Drawing Fashion History & Criticism Painting Photography Re
E-Books Directory is a categorized index of freely available online books. It is daily updated with new links to free e-books and short reviews. This directory is maintained regula

POSIX accounts, permission, and security

https://cygwin.com/cygwin-ug-net/ntsec.html

is well-known since the algorithms used to create the Cygwin and SFU keys are no secret), every administrator can access the password of all keys stored this way in the registry.

Unix philosophy description by The Linux Information Project (LINFO)

https://www.linfo.org/unix_philosophy.html

of programs, such as algorithms , and even the kernel (i.e., the core of the operating system). Thus, a Unix-like operating system generally (or at least ideally) consists of a sm

PHYS771 Lecture 8: Crypto

https://www.scottaaronson.com/democritus/lec8.html

definition, we consider algorithms A that find anything in the preimage of f(x), not just x itself. I claim that the existence of PRG's implies the existence of OWF's. Can anyone

Jenny's Lemonroom

https://buntato.neocities.org/

me… me. No social media algorithms, no drama, no shouting matches Just a quiet spot floating somewhere between nostalgia and daydreams. — ✦ — What I like. Art in all its forms Tec
Jenny's Lemonroom — a cozy old‑web inspired space filled with art, pixels, tiny worlds and gentle creativity.

Noel Welsh: About Me

https://noelwelsh.com/landing/about/

that brought bandit algorithms to the world of A/B testing. I've been interested in computers for a long time, particularly the leverage that computers give to people. I followed

JB's Place

http://jbschirtzinger.beiteshelpublications.org/

otherwise by the AI algorithms or API inferences. Likewise, such monitoring would produce meta data about people, which all institutions have proven unable to handle or to be capa


Find more...