- CompSci Weekend SuperThread (March 16, 2018)
- From logic and math to code. For dummies. Part III. Dependent types
- How can I learn to love Math again as a CompSci major?
- Are there any good resources that summarize the algebra of asymptotic notation?
- Free Webinar - Infrastructure for Usable Machine Learning with Spark Creator and Stanford...
- Major Field Test
- How to Solve the Anagram Indices Problem
- Learning DSA isn't tough now - Community Curated DSA Resources (2018)

- Recommendations for online courses?
- why isn't Church also considered a founder of computer science?
- Improving Bloom filter - can we distinguish elements of a database using less than 2.33275...
- Need a program for testing the buoyancy of small boats.
- Quick implementation of a decision tree in Python (mostly as study notes)
- There are plenty of books on how to implement RDBMS engines. What are some notable text books,...
- DAE find "new" processes virus-like?
- KWICK SÖRT
- Do you think mastering induction is essential in becoming better at designing algorithms?
- Computing the running max
- A clear explanation and implementation about VLAN, hope it works for those who need it
- Comparing syntax of different languages
- Recurrence Relation help
- Huawei Seeds for the Future
- AI Humble Bundle: Worth It?
- Lockable Binary Trees
- My friend and I are producing a podcast about computational chemistry! This week we talk to an...
- Simple overview of how Huffman coding works.

- Bought a used surface pro 3. How to Make Sure No Viruses and Get Ready for Use?
- Is SMS 2-factor auth a good idea?
- What are the best DDoS cloud mitigation services/
- A.I. is getting cheaper, easier to use - and to manipulate
- Advice for a non-profit, please. If a computer is infected, and they access a cloud based encrypted...
- Centrally Managed PCs for Home
- Why does apple want my credit card info to reset my password?
- Strava’s fitness tracker heat map reveals the location of military bases

- First ‘Jackpotting’ Attacks Hit U.S. ATMs
- Quora and you (x-post: /r/security)
- A New Wave Of Bad Ads Is Hijacking Even Top-Tier Websites
- Help needed to bypass schools protected chrome books
- Find syslog file in Tenable and SIEM
- Best free software to use to keep PC secure and info private?
- Bitcoin Monero: Cryptojacking Is The Next Big Cyber Threat
- Are we likely to see secure microprocessors anytime in the near future?
- Are Passwords Protected Using Hash Functions?
- Techie here, Help keep YouTube Channel alive? Please :)
- Where exactly is the location of a password on windows
- Mum got caught in a phishing scam. Are there any particularly useful resources to educate her?
- Cybersecurity Today Is Treated Like Accounting Before Enron
- The Meltdown Mug: remind your friends to patch their system every time you drink coffee
- ‘It Can’t Be True.’ Inside the Semiconductor Industry’s Meltdown
- Do you think spectre and meltdown were based on NSA exploits leaked by Shadow Brokers?
- Warrantless phone, laptop searches at the US border hit record levels

- Operations Research Letters Turnaround (x-post /r/OperationsResearch)
- Generating Multi-day Schedules with Kotlin
- Amazon built its hyper efficient warehouses by embracing chaos: the benefits of random distribution...
- "A Unified Framework for Stochastic Optimization", Powell 2018
- _The Operations Evaluation Group: A History Of Naval Operations Analysis_, Tidman 1984
- Evaluating an Algorithm
- Conference scheduling talks to rooms and timeslots for a better attendee experience

- Lectures on Modern Convex Optimization (pdf)
- How to find OR jobs in the Netherlands ?
- Travelling Salesman Problem and Nearest Nieghbour
- Using Kotlin for Linear Programming Part II
- How do I choose a between different Multiple Criteria Decision Making Algorithms?
- [OR] Production Problem for the next 4 months: If fluctuations in the monthly production cause a...
- Predictive Maintenance
- "For every 10" Constraint
- Need help solving a linear program using excel solver
- Math vs CS courses in undergrad
- Need help in a Linear Program formulation problem
- State-run algorithms should stay in the realm of science fiction
- Convex Optimization in R
- A Constant-Factor Approximation Algorithm for the Asymmetric Traveling Salesman Problem
- Can anyone help me with an excel solver problem?
- What is the most popular and well developed modelling language and solvers for linear...
- My solutions to travelling salesman problem and assignment problem published. [x-post from...
- Scheduling a Conference using Python Slides

- What are some good books on data structures and algorithms for a beginner?
- Learning Distributed Word Representations with Neural Network: an implementation of the algorithm...
- Fastest algorithm for sorting 64 64-bit numbers?
- Sub-path of shortest path are shortest path
- A way to prepare for junior level job interviews
- KWICK SÖRT
- Parallel and distributed genetic algorithms
- How much will a beginner learn about data structures and algorithms after reading Niklaus Wirth's...
- Implementing minimax with alphabeta pruning
- Day of week from any date formula

- Fill algorithm
- Implementation of Image content-aware fill algorithm(C#)
- Algorithms for scheduling tasks/events in a calendar
- Autonomous Driving – Car detection with YOLO Algorithm
- Are genetic algorithms viable in any way for pathfinding?
- Best algorythm for consuming tokens in Compilerbuilding
- Encoding Algorithm
- Genetic Crossover Conundrum
- Optimizing DFS cycle detection in a digraph
- Designing a crawler to extract all the links from a website (site map)?
- Best way to approach this particular algorithm.
- Are there any problems that can be solved using topological sort, but not using BFS/DFS?
- I just created my first app using five different algorithms
- Hash tables beat the common list by a clever compromise
- Help with optimum route