- CompSci Weekend SuperThread (December 14, 2018)
- Is it worth doing a double major in CS and Stats?
- 3 important practices I follow to become better at programming
- CSIndexbr: An open science tool for exploring Brazilian papers in CS
- Has Anyone Tried Udacity's OS Course?
- Do Computer Organization/Architecture courses teach you how a computer actually works?
- Masters Courses for Algorithms
- How To become a “Systems” Guy ?
- Best way to study coding (university/academic/everyday life/etc)?

- How do computers represent negative values in binary?
- We Need an FDA For Algorithms
- A Simple Model of Non-Turing Equivalent Computation
- Is there a difference between xor and !=
- Examples of primary memory?
- What's the difference between computer science and computer engineering?
- Learning to Read & Understand Computer Science Formulas?
- CS undergrad, idk about Queueing theory simulations. Ty for help
- Correlation, Computability, and the Complexity of Music
- How Can I learn OS ? Any Courses ?
- Choosing my university courses for next semester (functional programming or OS) ?
- Experience Report on Formally Verifying Parts of OpenJDK's API with KeY [abstract + link to PDF/PS]
- Data Classification Tutorial using R
- Efficiently finding whether two graph nodes/vertices are comnected
- Computer logic meets cell biology: how cell science is getting an upgrade.
- The beauty of Lempel-Ziv compression (Art of the Problem video produced with Lempel himself)
- Compsci 1 pre-req

- Is there possibility to hack monitor remotely.
- in poorer countries are there a lot of computers running massively outdated and insecure networked...
- Found a Very Underrated Computer Security Channel
- Intrusion Attacks?
- Targeted Windows Directories
- Why dont operating systems also consider programs to have permissions/ownership the same as users?
- Clues in Marriott hack implicate China
- Flash zero-day exploit spotted – patch now!
- Thousands of sensitive emails stolen in intrusion of Republican campaign arm

- Recent gmail login locations
- How A.I.-Created Fake Fingerprints Can Fool Biometric Security Systems
- Malwarebytes/SuperAntiSpyware
- Proprietary Software or Open Source
- Abuses of Server-Side Requests - Poster I made
- Germany proposes router security guidelines
- Privacy issues in computer accessories
- How to scramble keyboards for passwords?
- Real Hackers Tell Us Why They Love the Movie 'Hackers'
- Crosspost - Privacy Issues with Logitech software.
- OSIsoft breach
- Help. Me. Please.
- Warning: EMSISOFT products useless if offline on startup.
- Need to format a drive for "research purposes"
- How to secure my network?
- Reading Email Headers

- "How to train your oracle: The Delphi method and its turbulent youth in operations research and the...
- Calculating a complex network's availability/reliability when there exists latency in the edges...
- 3D Knapsack with Sequence
- It would take a laptop computer 1,000 years to compute the most efficient route between 22 cities
- Please, I'm stuck at these questions! Any help much appreciated!
- Generating guitar solos by integer programming
- Evaluating Resource-Constrained Targeted Immunization Strategies for Infectious Disease

- What happened when Boston Public Schools tried for equity with an algorithm
- Hey /r/Systems, I made a research paper recommender for Computer Science, and I would love for you...
- If you're in Europe, don't miss out on OR 2018 in Brussels from Sept 12-14!
- LP folding is finally worth it. Exploit symmetries to amplify the combinatorial explosion of MIP...
- "The Secret to Ant Digging Efficiency Is Idleness"
- Conversation with a three year old
- Graph Clustering - Capacitated VRP on a MultiDiGraph
- "Evolving Floorplans" with NEAT (Joel Simon)
- Fair elections: anti-gerrymandering
- Good sources of papers / articles being published to keep up to date?
- Alion Science and Technology is looking for ops research qualified people to support national...
- "DART: Revolutionizing Logistics Planning", Hedberg 2002
- Zoo, buses, kids and optimization
- Multithreaded solving without sacrificing incremental calculations and reproducible runs
- How to solve Dynamic programming problems
- How Overnight Shipping Works
- Three of the most important scientific conferences in the field of Mathematical Optimization are...
- "Caffeine dosing strategies to optimize alertness during sleep loss", Vital-Lopez et al 2018 [tabu...

- [QUESTION] Comparing fixed length trie trees algorithm
- What algorithm should I use for this type of counting ?
- What kind of data structure and algorithm does robin hood use to accomplish this? It has real...
- Box Packing Knapstack solution
- Calculating the number of numbers with at least k digits C within a range
- We Need an FDA For Algorithms
- Particle Swarm Optimizer - The Hive Mind
- Illuminating a small board by placing the least amount of lamps possible

- Getting all possible paths of equality, including implicit connections
- Got any favorite examples of exact cover problems?
- Super basic question I think...
- Infinite Card Game Challenge
- Amortized cost of inserting strings into a hash table
- Genetic Algorithm - Applications & Examples
- Worst and Best case instance for Radix Sort?
- Check if a long list of random integers has repeated values?
- Is a Bloom filter just and index for a hash table?
- Google Interview Questions Deconstructed: The Knight’s Dialer (Impossibly Fast Edition)
- Holt's puzzle from Brooklyn Nine Nine.
- Recomputing values in a list
- Topological sort in a cyclic graph
- Bresenham's line drawing algorithm in JavaScript with HTML as raster screen
- Are there any good resources for practicing with NPC problems?
- Unnamed algorithm for Travelling Salesman Problem
- Are there any programs available that do things like generate graphs and find the MIS (Maximum...