wiby  
Settings



Breaking a Visual CAPTCHA

https://www2.cs.sfu.ca/~mori/research/gimpy/

uses general purpose algorithms that have been designed for generic object recognition. The same basic ideas have been applied to finding people in images, matching handwritten di

paul's portfolio

https://pauloliver.dev/

Ackley puts it, getting computers to 'do stuff by themselves' - is what sparked this project. Although its core is several years old, I've maintained and extended it as a continuo

action guided by humility

http://communism.org/community/BenSeattle/2019/Proyect-FALC-Roche.htm

1.20 - Democratic algorithms:            Software robots that serve our will 1.21 - We need a common democratic public forum 1.22 - Worshipping spont

Interfluidity :: Liquidity As Information

https://www.interfluidity.com/posts/1168424241.shtml

there cannot be perfect algorithms for everything, societies will fail if their institutions are so corrupt as to be entirely unable to yield judgments that are at least good enou

SIGSOFT - ACM Special Interest Group on Software Engineering

http://www.sigsoft.org/dissertations.html

2013 Muddassar Sindhu . Algorithms and Tools for Learning-based Testing of Reactive Systems . Royal Institute of Technology (KTH), Stockholm, Sweden (Apr 16, 2013, advisor: Karl M
Association for Computing Machinery's Special Interest Group on Software Engineering, with awards, events, resources and contacts

LAPACK — Linear Algebra PACKage

https://www.netlib.org/lapack/

by reorganizing the algorithms to use block matrix operations, such as matrix multiplication, in the innermost loops. These block operations can be optimized for each architecture

What is a string? -- definition by The Linux Information Project (LINFO)

https://www.linfo.org/string.html

There are numerous algorithms (i.e., sets of precise, unambiguous rules designed to solve specific problems or perform specific tasks) for processing strings, including for search

Elite Disassembly

https://6502disassembly.com/a2-elite/

explaining the math and algorithms used. Elite Harmless project for the C64. Disassembled sources with some enhancements, ready to build. Elite - The New Kind project for Windows.
Disassembly of Elite for the Apple II

Interview with PGP author Phil Zimmermann

https://www.animatedsoftware.com/hightech/philspgp.htm

none of the encryption algorithms that were available to me as a school kid were going to pose any problems for any major governments. Host: The secret decoder ring and... PZ: ...
Russell D. Hoffman interviews Phil Zimmerman, Author, PGP

wass good

https://yudo.cc/

taking and testing out algorithms? It's basically the perfect machine (Not to mention that I find 1980s laptop design to be quite attractive. HUBBA HUBBA~). Alas, it's still from
i am become blogger, rambler of thoughts

https://www.ietf.org/rfc/rfc2130.txt

https://www.ietf.org/rfc/rfc2130.txt

section covers various algorithms to convert a source text S, encoded in the coded character set CCS(S), to a target text T, encoded in the coded character set CCS(T). Rep(X) is t

C. M. Kosemen - Illustration

http://www.cmkosemen.com/illustration.html

by Jakub Bobrowicz's algorithms. Proteodactylus , an early pterosaur relative. Equops, a long-necked iguanodont with a horse-like face. Ugrodon , an omnivorous archosaur of uncert


Find more...