wiby  
Settings



RFC 8700: Fifty Years of RFCs

https://www.rfc-editor.org/rfc/rfc8700.html

1986 DARPA Gateway Algorithms and Data Structures Task Force" , IETF 1 , January 1986 , < https://www.ietf.org/old/2009/proceedings/prior29/IETF01.pdf > . [ISI-to-AMS] IETF

flipCode - Game Development News & Resources

https://www.flipcode.com/misc/siggraph2002.shtml

and manipulation algorithms on geometric data. Most game 3D animation is currently performed by fitting a skeleton inside a 3D mesh and interpolating the mesh position to fit the

Web Surfing

http://web.cs.wpi.edu/~jshutt/surfing.html

about genetic algorithms (Theoretical Computer Science — Stack Exchange) (09-Dec-15; 14-Jan-21) Collatz conjecture skepticism (John D. Cook, 2019) (18-Sep-19; 15-Feb-21) Pra

Reasons not to use (i.e., be used by) Facebook

http://stallman.org/facebook.html

Facebook developed algorithms to detect teenagers that are in a vulnerable or susceptible state, to target them with ads. Aside from all the ethical reasons not to let Facebook us

Character Model for the World Wide Web 1.0: Fundamentals

https://www.w3.org/TR/charmod/

sorting and searching algorithms SHOULD accommodate text that contains any character in Unicode. Note that this requires, as a minimum, that a collation algorithm does not break d

Zero-Player Games

https://jesperjuul.net/text/zeroplayergames/

which people send in algorithms. AI players not relying on computers have also been developed for Hex (Shannon 1953) and Tic-Tac-Toe (Michie 1961). Figure 2: The Incredible Machin

Sammlung Interessanter Webseiten

https://wwwcip.informatik.uni-erlangen.de/~oj14ozun/links.html

of Path Finding Algorithms Quantum Algorithm Zoo Computer Science Rankings Zu Büchern Introduction to Algorithms (CLRS) The Art of Computer Programming (TAOCP) Introduction to Aut

The QP7 Programming Page: C++ Tutorial [main page]

http://webarchive.me/geocities/SiliconValley/Bay/5707/cppmain.html

Pointers File I/O Algorithms Practical Applications Chapter 3: Classes Object Oriented Programming Constructors and Destructors Encapsulation and Inheritance Multiple Inheritance

Peter Gutmann's Home Page

https://www.cs.auckland.ac.nz/~pgut001/

(PKCS), elliptic curve algorithms, hash and MAC algorithms (MD2, MD4, MD5, SHA-1, SHA-2, RIPEMD-160, the HMAC's), pseudorandom functions, key management, key lifetimes, key distri

Technological slavery

http://digdeeper.love/articles/technological_slavery.xhtml

the beginning - but the algorithms will get better, and will eventually make it impossible to fool them. If this system also connected directly to people's bank accounts, they cou

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

https://cdn.nakamotoinstitute.org/docs/cyphernomicon.txt

right way) - encryption algorithms often hidden, sites hidden - Make no mistake about it, these approaches are often used. And they can add a little to the overall security (using

Laboratory of Computer and Information Science

http://www.cis.hut.fi/

automated learning algorithms are used to discover the relevant informative concepts, components, and their mutual relations from large amounts of data. Adaptivity enables compute


Find more...