Breaking a Visual CAPTCHAhttps://www2.cs.sfu.ca/~mori/research/gimpy/
uses general purpose algorithms that have been designed for generic object recognition. The same basic ideas have been applied to finding people in images, matching handwritten di
paul's portfoliohttps://pauloliver.dev/
Ackley puts it, getting computers to 'do stuff by themselves' - is what sparked this project. Although its core is several years old, I've maintained and extended it as a continuo
action guided by humilityhttp://communism.org/community/BenSeattle/2019/Proyect-FALC-Roche.htm
1.20 - Democratic algorithms: Software robots that serve our will 1.21 - We need a common democratic public forum 1.22 - Worshipping spont
Interfluidity :: Liquidity As Informationhttps://www.interfluidity.com/posts/1168424241.shtml
there cannot be perfect algorithms for everything, societies will fail if their institutions are so corrupt as to be entirely unable to yield judgments that are at least good enou
SIGSOFT - ACM Special Interest Group on Software Engineeringhttp://www.sigsoft.org/dissertations.html
2013 Muddassar Sindhu . Algorithms and Tools for Learning-based Testing of Reactive Systems . Royal Institute of Technology (KTH), Stockholm, Sweden (Apr 16, 2013, advisor: Karl M
Association for Computing Machinery's Special Interest Group on Software Engineering, with awards, events, resources and contacts
LAPACK — Linear Algebra PACKagehttps://www.netlib.org/lapack/
by reorganizing the algorithms to use block matrix operations, such as matrix multiplication, in the innermost loops. These block operations can be optimized for each architecture
What is a string? -- definition by The Linux Information Project (LINFO)https://www.linfo.org/string.html
There are numerous algorithms (i.e., sets of precise, unambiguous rules designed to solve specific problems or perform specific tasks) for processing strings, including for search
Elite Disassemblyhttps://6502disassembly.com/a2-elite/
explaining the math and algorithms used. Elite Harmless project for the C64. Disassembled sources with some enhancements, ready to build. Elite - The New Kind project for Windows.
Disassembly of Elite for the Apple II
Interview with PGP author Phil Zimmermannhttps://www.animatedsoftware.com/hightech/philspgp.htm
none of the encryption algorithms that were available to me as a school kid were going to pose any problems for any major governments. Host: The secret decoder ring and... PZ: ...
Russell D. Hoffman interviews Phil Zimmerman, Author, PGP
wass goodhttps://yudo.cc/
taking and testing out algorithms? It's basically the perfect machine (Not to mention that I find 1980s laptop design to be quite attractive. HUBBA HUBBA~). Alas, it's still from
i am become blogger, rambler of thoughts
https://www.ietf.org/rfc/rfc2130.txthttps://www.ietf.org/rfc/rfc2130.txt
section covers various algorithms to convert a source text S, encoded in the coded character set CCS(S), to a target text T, encoded in the coded character set CCS(T). Rep(X) is t
C. M. Kosemen - Illustrationhttp://www.cmkosemen.com/illustration.html
by Jakub Bobrowicz's algorithms. Proteodactylus , an early pterosaur relative. Equops, a long-necked iguanodont with a horse-like face. Ugrodon , an omnivorous archosaur of uncert
Find more...