CompSci Weekend SuperThread (March 16, 2018)
From logic and math to code. For dummies. Part III. Dependent types
How can I learn to love Math again as a CompSci major?
Are there any good resources that summarize the algebra of asymptotic notation?
Free Webinar - Infrastructure for Usable Machine Learning with Spark Creator and Stanford...
Major Field Test
How to Solve the Anagram Indices Problem
Learning DSA isn't tough now - Community Curated DSA Resources (2018)
Recommendations for online courses?
why isn't Church also considered a founder of computer science?
Improving Bloom filter - can we distinguish elements of a database using less than 2.33275...
Need a program for testing the buoyancy of small boats.
Quick implementation of a decision tree in Python (mostly as study notes)
There are plenty of books on how to implement RDBMS engines. What are some notable text books,...
DAE find "new" processes virus-like?
Do you think mastering induction is essential in becoming better at designing algorithms?
Computing the running max
A clear explanation and implementation about VLAN, hope it works for those who need it
Comparing syntax of different languages
Recurrence Relation help
Huawei Seeds for the Future
AI Humble Bundle: Worth It?
Lockable Binary Trees
My friend and I are producing a podcast about computational chemistry! This week we talk to an...
Simple overview of how Huffman coding works.
Bought a used surface pro 3. How to Make Sure No Viruses and Get Ready for Use?
Is SMS 2-factor auth a good idea?
What are the best DDoS cloud mitigation services/
A.I. is getting cheaper, easier to use - and to manipulate
Advice for a non-profit, please. If a computer is infected, and they access a cloud based encrypted...
Centrally Managed PCs for Home
Why does apple want my credit card info to reset my password?
Strava’s fitness tracker heat map reveals the location of military bases
First ‘Jackpotting’ Attacks Hit U.S. ATMs
Quora and you (x-post: /r/security)
A New Wave Of Bad Ads Is Hijacking Even Top-Tier Websites
Help needed to bypass schools protected chrome books
Find syslog file in Tenable and SIEM
Best free software to use to keep PC secure and info private?
Bitcoin Monero: Cryptojacking Is The Next Big Cyber Threat
Are we likely to see secure microprocessors anytime in the near future?
Are Passwords Protected Using Hash Functions?
Techie here, Help keep YouTube Channel alive? Please :)
Where exactly is the location of a password on windows
Mum got caught in a phishing scam. Are there any particularly useful resources to educate her?
Cybersecurity Today Is Treated Like Accounting Before Enron
The Meltdown Mug: remind your friends to patch their system every time you drink coffee
‘It Can’t Be True.’ Inside the Semiconductor Industry’s Meltdown
Do you think spectre and meltdown were based on NSA exploits leaked by Shadow Brokers?
Warrantless phone, laptop searches at the US border hit record levels
What are some good books on data structures and algorithms for a beginner?
Learning Distributed Word Representations with Neural Network: an implementation of the algorithm...
Fastest algorithm for sorting 64 64-bit numbers?
Sub-path of shortest path are shortest path
A way to prepare for junior level job interviews
Parallel and distributed genetic algorithms
How much will a beginner learn about data structures and algorithms after reading Niklaus Wirth's...
Implementing minimax with alphabeta pruning
Day of week from any date formula
Implementation of Image content-aware fill algorithm(C#)
Algorithms for scheduling tasks/events in a calendar
Autonomous Driving – Car detection with YOLO Algorithm
Are genetic algorithms viable in any way for pathfinding?
Best algorythm for consuming tokens in Compilerbuilding
Genetic Crossover Conundrum
Optimizing DFS cycle detection in a digraph
Designing a crawler to extract all the links from a website (site map)?
Best way to approach this particular algorithm.
Are there any problems that can be solved using topological sort, but not using BFS/DFS?
I just created my first app using five different algorithms
Hash tables beat the common list by a clever compromise
Help with optimum route