CompSci Weekend SuperThread (September 14, 2018)
I heard a professor say "A computer can simulate itself, but that simulation must always run slower...
Is there any way to check the similiarity of two sentences?
Can One Of You Guys Help Me Construct a Logic Circuit From This Table?
New subreddit: r/DigitalPhilosophy
Flattening Combinators: Surviving Without Parentheses -- Okasaki [hn:re/pdf]
How would you approach the problem of fake news detection in real time?
Comp Sci Club Help
Overflow in consistent hashing
Professors/labs/groups that works in authentication/passwords
Physical size of an image located on a hard drive?
Tencent Announces Open AI Platform AI.QQ.COM
Assembly taught using Raspberry PI
Do you want me to connect you to software engineers to teach you to code?
Join AWS Educate for free to receive certifications in cloud computing
Options for Online School for CS
Edit Distance algorithm that allows "block" transpositions? (help a humanities PhD student)
When building a web application (C#), is it better to have more Database columns, or more backend...
Practical uses of a Distributed Hash Table?
SQLite v3.25.0 released. Critical bugs fixed. Enhanced ALTER TABLE.
Computationally Identifying Meaningful Literature in the Wild
To all Pikachus in this sub, now there's a programming language for you all out there too
Fast Full-Text Search in PostgreSQL
Сontinuation: (Artificial life, Open-ended evolution, Universal Darwinism). Help needed to solve...
Visualize splay tree
Edit Distance Tables
Generic question: are update mechanisms a big security issue ?
How to defend and attack single database on server ?
Cheap privacy oriented cell phones
Is there evidence to proof that Windows is spying us ? Are the anti-spy programs works and are they...
Can Windows take data from other OS running on same hardware ?
Moving malicious software to offline environment and how to take file from it being safe ?
Vulnerabilities of IT system due to hardware ?
Anti-malware apps harvested browser history
Authy wont delete device!
Outside managed IT services overextending their control on company?
Caught someone using a RDP on my desktop last night
CE or CS
Security on public network
My family can view my computers tabs on their phone?
A question about VPNs.
Cybersecurity’s insidious new threat: workforce stress
Kovter malware teardown, including "invisible" registry persistence
Are most security vulnerabilities tied to WiFi and other networks?
On the Hunt for FIN7
Pentagon Creates 'Do Not Buy' List of Chinese and Russian Software Providers
Destroying all drives before accessing the deepweb
Nasty Spyware Infects 11 Million Users: What to Do Now
Snoopware installed by 11 million+ iOS, Android, Chrome, and Firefox users
Hackers account for 90% of login attempts at online retailers
Question about brute force attack protection
Mapping every accessible square in a maze from a random starting point and no destination
New subreddit: r/DigitalPhilosophy
Finding all possible pairings (no time complexity restriction)
Minimal set of sets covering all possible interactions?
Problem: multiple choice 0-1 knapsack problem
Damn Cool Algorithms: Levenshtein Automata
Minimum Edit Distance allowing for "block" transpositions?
Akra-Bazzi theorem example
Preliminary Orbit Determination - 2-Body Problem
How to sort a list of functions by growth?
Hey /r/Algorithms, I made a research paper recommender for Computer Science, and I would love for...
Finding graph vertex with minimal distance to n other vertices?
The Aggregate Magic Algorithms
Algorithm explained as IKEA assembly instructions
Coding research paper: Need to think of an efficient algorithm for permutation hashing.
Search minimal distance sample in euclidean space
Algorithms for a complete beginner
Application Of Iterative Depth A* Search Algorithm
How does Excel's AutoFill work for Weekdays, Months and Years?
Comparing execution time of an algorithm in C++ versus theoretical time complexity?
An Introduction to Finite Difference