- CompSci Weekend SuperThread (September 15, 2017)
- 1.1 Billion Taxi Rides with Spark 2.2 & 3 Raspberry Pi 3 Model Bs
- I researched the web and came up with this collection of free online courses that will provide you...
- Learn how to implement Hindley-Milner - Vivint's Game of Codes
- Flexible garbage collection proposal: Gradual Memory Management
- Unicore: A new Unikernel project
- Math cheat sheet
- Counting integer points in a convex rational polytope in polynomial time with fixed dimension

- I'm starting to see coin miners in website loads
- AVOIDING THE PRECIPICE – AI Roadmap Institute Blog
- Julia Joins Petaflop Club
- The Worlds First VR Graphing Calculator is now open source
- Using Python to build an AI Twitter bot people trust
- Introduction to GraphQL – A Query Language for APIs
- David MacKay: Information Theory, Pattern Recognition and Neural Networks: 1
- Solving pocket Rubik’s cube (2*2*2) using Z3 and SAT solver
- Algorithm for simplifying expression using auxiliary variables?
- For 64 bit computers, would more 0's than 1's increase performance?
- The Future of Computing Depends on Making It Reversible - IEEE Spectrum
- Researchers have been able to demonstrate the existence of Majorana fermions. These unusual...
- Does the following Encryption Algorithm exist?
- Rust higher-kinded types RFC has been approved
- Hackathons
- Question about applying to grad school for CS Theory
- What practical skills or positions could this modified computer science degree be lacking?
- CompSci Weekend SuperThread (September 08, 2017)

- Quick Question
- Best way to prevent people from hacking my computer?
- Need Recommendations to get set-up with cheap air-gapped laptop
- HELP Suspicious gmail AND Facebook messages from "myself"
- My boss asked me to come up with a list of mobile commerce security threats.
- DHS STATEMENT ON THE ISSUANCE OF BINDING OPERATIONAL DIRECTIVE 17-01...KASPERSKY LAB PRODUCTS..."...
- Just purchased MS Office 2016 (home/student) key card and downloaded Office. How do I make sure my...

- Equifax Wikipedia Page Screenshot - Sep. 12, 2017
- Why is he putting his web stuff into the Cloud "for security"?
- If I send an email to an incorrect email address ending in .com instead of the correct .org, is...
- Customer received a fraudulent mail. What should be done?
- Can I block countries on my ASUS router?
- Best way to work on multiple stations with portable browser.
- Using Touch ID on iPhone as password on desktop?
- Is there a way to have 2FA accompany a password to unlock my Google Pixel XL?
- Small and simple tool for testing Slow Loris vulnerability
- Tech Firms Team Up To Take Down 'WireX' Android DDoS Botnet
- Daily vulnerabilities
- Computer starts randomly typing letters then finishes with "t/r/piracyred/r/piracy"
- Is it better to have independent programs for malware, adware, spyware, ransomware, and antivirus...
- Help Request: Best PC Security Suite
- Access to internal Machine via RDP/WEB
- Testing/Reviewing new software for malicious activity
- National Cyber Security Strategy 2016 - 2021
- A Burp Suite Automation Tool with Slack Integration

- Are constraint solvers part of Artificial Intelligence?
- My Attempt to Resolve the One Shot Prisoner's Dilemma
- PySwarms - an open-source research toolkit for Particle Swarm Optimization in Python
- Mechanism designs for scheduling problems? Are they translated into use in practice?
- Pilots have an unmatching algorithm
- Can't install Google Operation Research Tools [Help]
- Python-based solver for the policy- and path-based "SOTA" problems: planning routes over a graph...

- "Aether: Leveraging Linear Programming For Optimal Cloud Computing In Genomics", Luber et al 2017
- GLPK was used in the proof of the 300 year old Kepler conjecture
- Advice for transitioning into Operations Research
- University of Toronto Operations Researchers build Optimization Web App for NHL Expansion Draft.
- Graphical Linear Programming
- Documentaries about airport design optimization?
- Solving the vehicle routing problem with split delivery
- "Scalable Planning with Tensorflow for Hybrid Nonlinear Domains", Wu et al 2017
- How to make a constraint linear?
- Looking for good heuristic algorithms for vehicle routing problems.
- Definitive resources and research for Queueing Theory?
- What are some cool problems in Operations Research for which Algorithms have not been developed yet?
- Mobile ordering
- safety schools for operations research?
- Standard resources for keeping up with the field?
- Heat map to visualize the score of a fitness function in a constraint solver
- Water LP
- Algorithm formulation for an assignment problem

- Showing the Algorithms Behind New York City Services
- Multiple places from a certain location, find the nearest place from that location then move to...
- How complexity classes can help you avoid a bar fight!
- What types of algorithms exist for Motion Detection software?
- Super-speeds with Zero-RAM: Next Generation Large-Scale Optimization in Your Laptop!
- Can someone please explain this coin-change algorithm?
- Fast way of calculating/caching length of minimum spanning trees?

- The Minsky Circle Algorithm
- Algorithm for «digital grasshopper» game bot
- Need an algorithm where when the base number gets higher, the multiplier gets lower
- Whats a simple algorithm to see if 2 rectangles are touching? Given the bottom left corner x,y...
- Wilson’s Algorithm
- Kahn's Topological Sort Algorithm
- USACO vs Codeforces
- What kind of algorithms are used for Disease Diagnostic apps?
- How do I take a python Dictionary or List of size X and assign each element with Y random index...
- Are there any algorithms for predicting lap times based upon previous lap times?
- Compiled Vs Interpreted languages
- How would I write this algorithm in psudo-code?
- Career pivoting
- Pornhub new "excitement" graph
- Holographic Embeddings for Knowledge Graphic Completion (Tensorflow)
- Best algorithm to find implicit equality of variables
- n^log7 solution to max sum of submatrix problem
- Gems of Combinatorial Optimization and Graph Algorithms