wiby  
Settings



The Infinity Machine

https://www.chiark.greenend.org.uk/~sgtatham/infinity.html

hash. Even symmetric algorithms with a shared secret key aren't safe - with an appreciable amount of ciphertext and only a vague idea of the nature of the data ("ASCII text" for e

Molecular Expressions: Images from the Microscope

https://micro.magnet.fsu.edu/

many image processing algorithms are extremely powerful, the average user often applies operations to digital images without concern for the underlying principles behind these man
The Molecular Expressions website features hundreds of photomicrographs (photographs through the microscope) of everything from superconductors, gemstones, and high-tech materials

C++ Applications

https://www.stroustrup.com/applications.html

set of state-of-the-art algorithms and theoretical models for electro-magnetic and hadronic physics interactions. GCC GCC now uses C++ as its implementation language [2012-08-14].

Fuck Big Tech: A Privacy Guide

https://fuckbigtech.neocities.org/

Big Tech's predatory algorithms and engagement-bait content. But if you absolutely need to check something on their non-Federated services, do it through Privacy-Friendly Frontend
Big Tech strives to end privacy and make massive surveillance non-optional, you best start believing in cyberpunk dystopias, you are in one.

The Craft of Text Editing

https://www.finseth.com/craft/

among them and the algorithms that implement specific tradeoffs, and provides general guidance to anyone who wants to understand how to implement a text editor or how to perform e

PHYS771 Lecture 7: Randomness

https://www.scottaaronson.com/democritus/lec7.html

known of randomized algorithms that are faster, and whose error probability can easily be made smaller than the probability of an asteroid hitting your computer in mid-calculation

Genetic Programming: Will Bill Gates become Billy Appleseed?

http://www.genetic-programming.com/published/computerbits0696.html

(CAS), and Genetic Algorithms (GA), all methods and techniques used by researchers in disciplines as disparate as biology and history, anthropology and physics. After spending mon

Voyager Spacecraft and Fortran 5

http://www.geonius.com/writing/other/voyager.html

that the SRIF and U-D algorithms that were used in this application have been refined and generalized, and are commercially available in the form of portable Fortran subroutines.
Voyagers NOT programmed in Fortran 5

KA7OEI - Audio comb filter for hum removal

http://www.modulatedlight.org/optical_comms/comb_filter.html

different filtering algorithms providing selections between "ultra narrow" notches to fairly wide notches.  Because the comb filter itself causes some of its own artifacts th

Cool Links! – Qalle’s home page

https://qalle.neocities.org/links

Twiddling Hacks – algorithms/C snippets regarding mathematical/bit operations (e.g. determine if an integer is a power of two) The Daily WTF – software development hum

Antoine Amarilli's website

http://a3nm.net/

in enumeration algorithms , formal languages , circuits , counting problems , dynamic data , computational logic , graph theory , and other topics. I co-authored works which recei
Antoine Amarilli's website

Machine Learning, the UBI System, and Media Incest | Joybuke

https://joybuke.neocities.org/articles/machine-learning-the-ubi-system-and-media-incest/

talking about these algorithms forever, trying to warn normal people that they’re being manipulated by machines into watching ads and having their opinion molded. However, t
If any article I write is going to be worth skipping, this will be the one. Reason why: this will about a contemporary, developing topic. Most people who talk about anything of val


Find more...