- CompSci Weekend SuperThread (December 08, 2017)
- The Mathematics of 2048: Counting States by Exhaustive Enumeration
- Free open-source Prolog books, tutorials, packages and frameworks.
- Online Turing Machine Simulator (best one I've found)
- Get lost in a pile of papers? Let's build a journal club together for a better academia!
- POPL 2018 Research Papers
- NIPS: 2017 Day 1 & 2 Highlights
- IPOL Journal · Image Processing On Line
- People of Programming Languages

- Quantum communication complexity paper
- Quantum computing explained : manipulating quantum states of qubits.
- Loop Tiling
- AMA: We’re 3 roboticists at MIT’s Computer Science and Artificial Intelligence Lab, here to...
- Not Your Father's Analog Computer
- Is git a blockchain?
- Questions on Rotating Register File / Register Allocation for modulo scheduling
- Hacker News AMA: NY AG Schneiderman on net neutrality and protecting our voice in government
- Did anyone read this paper: neurmorphic computing's yesterday today and tomorrow
- Fractal tree (xpost from r/perfectloop, by u/Blokatt)
- In this blog post we introduce a parallel algorithm, bfsort, based on Bloom Filters, that can sort...
- BibSLEIGH — Bibliography of Software Language Engineering in Generated Hypertext
- The tension between convenience and performance in automatic differentiation – Jeffrey M. Siskind
- Discussion on Static Code Analysis
- Reviews needed about this Udacity's Introductory course on OS.
- Describing Tic-Tac-Toe Using Dependent Sum Types (reformulated and reposted w/o some obvious errors)
- Programming Languages Are Antiquated Compared to Advances in Processor Speed, Storage Capacity.

- Is 3 Rounds of DBAN using DoD 5220.22-M sufficient if I’m selling my computer?
- Has my computer been hacked?
- Which AWS certification is helpful for CyberSecurity?
- My final for information technology
- TCL/Roku as pc monitor
- A bit concerned Lenovo laptop's security
- Anyone familiar with Fortigate? I have something i need to confirm with. If i enable the IPS...
- Is malware bytes/super-antispyware that reliable (failure to detect)
- bug bounty or entrapment and harassment, you decide!

- In need of a new firewall
- Clearing my computer of harmful material
- Outlook web has been hacked - how can I download all of the emails with attachments to scan?
- Hackers Say They've Already Broken Face ID
- Forums for buying stolen software/code
- Why cybersecurity workers are some of the hardest to retain
- Stylus vs finger signature
- Seriously? Is this real?
- Getting started in computer security
- Belarc Advisor
- Good or useless: Connect 2 routers to 1 modem. One router dedicated for iot, the other for desktops...
- CyberSecurity as a profession
- Which recent OS can display "It is now safe to turn off your computer"?
- Would it be legal to phish your family and friends, to see who falls for it and then educate them ?
- How much more safe is my Computer, if I plug it in through Ethernet cable instead of using WIFI?
- Disabling IRDP on Windows Server - Repercussions

- "For every 10" Constraint
- Need help solving a linear program using excel solver
- Math vs CS courses in undergrad
- Need help in a Linear Program formulation problem
- State-run algorithms should stay in the realm of science fiction
- Convex Optimization in R
- A Constant-Factor Approximation Algorithm for the Asymmetric Traveling Salesman Problem
- Can anyone help me with an excel solver problem?
- What is the most popular and well developed modelling language and solvers for linear...

- My solutions to travelling salesman problem and assignment problem published. [x-post from...
- Scheduling a Conference using Python Slides
- Uber assignment with lpSolve
- [Schools] OR Masters Programs
- Traffic planning can be counter-intuitive. Road with 1 car lane can accommodate 2.5x traffic than a...
- How to Solve Any Dynamic Programming Problem – Pramp
- Syngenta Crop Challenge
- Parallelism for Linear and Mixed Integer Programming, and why it's not super helpful
- "Economies of density in e-commerce: a study of Amazon's fulfillment center network", Houde et al...
- Business owner getting into OR and QF, was wanting resources.
- A TSP Breakthrough
- What does a vertical startup mean in the context of beginning operations of a newly installed...
- Scheduling class presentations using linear programming with Python
- Heathrow Airport and the Travelator Problem
- Linear Programming and Healthy Diets Part 2
- What is the name for a routing problem which takes due date into consideration along with distance...

- I want to write a pre scientific work on algorithms, but I just dont where should I start.
- Optimizing Nonlinear convex functions
- [Process Scheduling] Scheduling n processes with deadlines on m identical processors
- Get the column (of a matrix) most similar to another vector?
- Facebook Mutual Friends algorithm
- Best approach to learn Algorithms
- Any good approaches for perfect hashing, with one table?
- Question: Algorithm to find the largest subset of points

- How to identify what "type" of algorithm is needed for a problem?
- The Power Of Generics – OmarElGabry’s Blog
- Traversing a non-square matrix diagonally until a corner is hit
- Choosing direction in DFS maze generation
- Top Algorithms/Data Structures/Concepts every computer science student should know
- Algorithm for pseudo random iteration?
- Clustering algorithm based on a certain cluster "value"?
- Evolutionary Algorithms for Feature Selection
- A Library of Parallel Algorithms
- Suggestions needed for algo ideas for look-a-like audiences, recommendation systems
- Need a local search algorithm for a very large problems, with high-degree search graph
- Still trying to find frame of reference
- Python - A* Search Optimization
- An Algorithm Isn’t Always the Answer
- Finding the k-th largest element in a k-ary tree?
- Algorithm to determine central location within enclosed rooms?
- Solving the Traveling Salesman Problem with a genetic algorithm and ncurses