CompSci Weekend SuperThread (November 16, 2018)
Remote Build Execution with Bazel and Svelte
Need tests for experiment on process counters
The Comonad.Reader » Recursion Schemes: A Field Guide (Redux) - Edward Kmett 2009
which school is best for CompSci
Toom-Cook method for multiplication - algorithm
Dynamic Programming in RL
Category Construction with No Prior Information
Why Doctors Hate Their Computers: Digitization promises to make medical care easier and more...
Are there any new developments in the field of Systems Networking?
I’d like to share a revelation I’ve had during my time here: imperative languages are good for...
New NOAA Weather Satellite Captures First High-Resolution Image Of Hawaii
What is the similarity between a natural languages and programming languages?
Restricted Boltzmann Machines - algorithm
Regex with lookahead and lookbehind still type3?
An Introduction to Recursion Schemes
10 Best Certification Courses in Computer Science
TSP variation: Only visit a specific fraction of the nodes
A Leading Computer Science & IT College from Hooghly
Weak entity and identifying entity
OpenAI Founder: Short-Term AGI Is a Serious Possibility
is the future of JS multithreaded?
Will Business Analysis become an obsolete job soon?
Embracing the Laws of Physics: Three Reversible Models of Computation [abstract + link to PDF]
The Complete Guide to Node.js Developer Course
AntiSpam for Emails , Password Managers
Windows Defender Now Offers Ultra Secure Sandbox Mode, Here’s How To Turn It On...
Bug Bounty vs Ethical hacking
VPN Pros and Cons
Router to log internet traffic?
Got the invite code to HackTheBox
Identifying Possible Malicious Network Device
Is there any kind of log file that lists what softwares I opened and when?
Building a box to test security?
Regarding Security Assessments
A New California Bill Would Require Better Passwords for Internet of Things Devices
Introducing Firefox Monitor, Helping People Take Control After a Data Breach – The Mozilla Blog
Disabling ASLR in GDB to debug command line buffer overflow attacks in GNU/Linux.
Is there any way to get an alert if someone tries to login to my computer? ( long story ahead )
How to defend and attack single database on server ?
Generic question: are update mechanisms a big security issue ?
Cheap privacy oriented cell phones
Is there evidence to proof that Windows is spying us ? Are the anti-spy programs works and are they...
Can Windows take data from other OS running on same hardware ?
Moving malicious software to offline environment and how to take file from it being safe ?
Vulnerabilities of IT system due to hardware ?
Anti-malware apps harvested browser history
Authy wont delete device!
Outside managed IT services overextending their control on company?
It would take a laptop computer 1,000 years to compute the most efficient route between 22 cities
Please, I'm stuck at these questions! Any help much appreciated!
Generating guitar solos by integer programming
Evaluating Resource-Constrained Targeted Immunization Strategies for Infectious Disease
What happened when Boston Public Schools tried for equity with an algorithm
Hey /r/Systems, I made a research paper recommender for Computer Science, and I would love for you...
If you're in Europe, don't miss out on OR 2018 in Brussels from Sept 12-14!
LP folding is finally worth it. Exploit symmetries to amplify the combinatorial explosion of MIP...
"The Secret to Ant Digging Efficiency Is Idleness"
Conversation with a three year old
Graph Clustering - Capacitated VRP on a MultiDiGraph
"Evolving Floorplans" with NEAT (Joel Simon)
Fair elections: anti-gerrymandering
Good sources of papers / articles being published to keep up to date?
Alion Science and Technology is looking for ops research qualified people to support national...
"DART: Revolutionizing Logistics Planning", Hedberg 2002
Zoo, buses, kids and optimization
Multithreaded solving without sacrificing incremental calculations and reproducible runs
How to solve Dynamic programming problems
How Overnight Shipping Works
Three of the most important scientific conferences in the field of Mathematical Optimization are...
"Caffeine dosing strategies to optimize alertness during sleep loss", Vital-Lopez et al 2018 [tabu...
A Classical Math Problem Gets Pulled Into the Modern World: A century ago, the great mathematician...
"Math Says Urinals in Airplanes Might Make Lines Shorter for Everyone"
What's a good introductory OR text?
Settle this Big O bet with a friend
Rule of three - Estimating the chances of something that hasn’t happened yet
Question about solution to leetcode paint house problem.
Algorithm help: Given an integer, c, determine whether there exists integers a and b such that a^2...
Find out of the Market is open in the respective Time Zone
Deeper understanding of algorithms
The Pros And Cons Of Algorithms In Recruitment
shortest distance of convex polygon with start and exit problem
Hexagon Topology Algorithm
Basics of Genetic Algorithms
Calculating O value for me because I'm too lazy
How much of an array do you need to shuffle in order for the user to think it's shuffled?
Problem regarding Run-time error
Beating hash tables with trees? The ART-ful radix trie
Websites to start algorithm
100+ Data Structure and Algorithm Interview Questions Answers for Programmers
How algorithms are disrupting the bra space
Improving on a hill climbing algorthim (python)
machine learning bias (algorithm bias or AI bias)
Algorithm to construct a forecast tool
Names of algorithms that determine shapes to render based on zoom level?
Hi, so this question (and answer) is on the review, but I don’t understand how to solve it. This...
Functional dependency projection