- CompSci Weekend SuperThread (February 16, 2018)
- Call-by-Name Gradual Type Theory [abstract + link to PDF]
- Quickly create live update GUIs for Python packages using Markdown and a few custom HTML elements.
- The fastest sorting algorithm (in the unit-cost RAM model)?
- Reference request on a result by Ray Solomonoff mentioned in a lecture by Marvin Minsky
- Best Computer Science Conferences?
- Could meltdown and spectre have been found much earlier if brilliant theoretical computer...
- Why are loop invariants so rare in CompSci (and in code)? They can give you coding superpowers!

- How to Formulaically Solve Tree Interview Questions
- On the P vs NP question: a proof of inequality
- IDEA: A series of nonverbal algorithm assembly instructions
- Code review experiment
- How does the Meltdown patch work?
- China’s AI-powered NetEase is Music to Your Ears
- Distributed Tracing Standard OpenTracing Makes Moves
- The real-world version of the famous “traveling salesman problem” finally gets a good-enough...
- building an app
- Understanding State Machines – freeCodeCamp
- CommonMark is a Useful, High-Quality Project
- A Language and Compiler View on Differentiable Programming
- Why does no one understand Turing Completeness?
- Preparation for Operating Systems Course
- Tech’s Ethical ‘Dark Side’: Harvard, Stanford and Others Want to Address It
- Sandia researcher out to tackle a persistent problem: uncertainty in HPC models
- TeXmacs–maxima interface by Andrey G. Grozin
- Need a tutor for Formal Language Theory/Theory of Computation

- Why does apple want my credit card info to reset my password?
- Strava’s fitness tracker heat map reveals the location of military bases
- First ‘Jackpotting’ Attacks Hit U.S. ATMs
- Quora and you (x-post: /r/security)
- A New Wave Of Bad Ads Is Hijacking Even Top-Tier Websites
- Help needed to bypass schools protected chrome books
- Find syslog file in Tenable and SIEM
- Best free software to use to keep PC secure and info private?

- Bitcoin Monero: Cryptojacking Is The Next Big Cyber Threat
- Are we likely to see secure microprocessors anytime in the near future?
- Are Passwords Protected Using Hash Functions?
- Techie here, Help keep YouTube Channel alive? Please :)
- Where exactly is the location of a password on windows
- Mum got caught in a phishing scam. Are there any particularly useful resources to educate her?
- Cybersecurity Today Is Treated Like Accounting Before Enron
- The Meltdown Mug: remind your friends to patch their system every time you drink coffee
- ‘It Can’t Be True.’ Inside the Semiconductor Industry’s Meltdown
- Do you think spectre and meltdown were based on NSA exploits leaked by Shadow Brokers?
- Warrantless phone, laptop searches at the US border hit record levels
- What to do when computer is hacked?
- Password managers as a single point of failure
- Sophos Vs Avast
- Practical uses for NOP sled?
- Being Safe, When Others Aren't On The Same Network
- Can a virus or a malware spread from an infected PDF file if it's opened through chrome ?

- _The Operations Evaluation Group: A History Of Naval Operations Analysis_, Tidman 1984
- Evaluating an Algorithm
- Conference scheduling talks to rooms and timeslots for a better attendee experience
- Lectures on Modern Convex Optimization (pdf)
- How to find OR jobs in the Netherlands ?
- Travelling Salesman Problem and Nearest Nieghbour
- Using Kotlin for Linear Programming Part II
- How do I choose a between different Multiple Criteria Decision Making Algorithms?
- [OR] Production Problem for the next 4 months: If fluctuations in the monthly production cause a...

- Predictive Maintenance
- "For every 10" Constraint
- Need help solving a linear program using excel solver
- Math vs CS courses in undergrad
- Need help in a Linear Program formulation problem
- State-run algorithms should stay in the realm of science fiction
- Convex Optimization in R
- A Constant-Factor Approximation Algorithm for the Asymmetric Traveling Salesman Problem
- Can anyone help me with an excel solver problem?
- What is the most popular and well developed modelling language and solvers for linear...
- My solutions to travelling salesman problem and assignment problem published. [x-post from...
- Scheduling a Conference using Python Slides
- Uber assignment with lpSolve
- [Schools] OR Masters Programs
- Traffic planning can be counter-intuitive. Road with 1 car lane can accommodate 2.5x traffic than a...
- How to Solve Any Dynamic Programming Problem – Pramp

- CS50 Quicksort YouTube video
- Randomly sampling pairs of objects from a list that must meet some criteria. Is there a better way?
- Find a number in a sorted array with interleaved 0s and positive integers?
- Properties, another way to test your algorithms
- What would be the best approach to do the following?
- (beginner) I wrote my own insertion sort and have a question before I continue self-teaching myself.
- Interactive Image Segmentation with Graph-Cut (Max-flow / Min-cut)
- How to calculate the interior convex hull for a set of points?

- Would someone mind taking a look at my algorithms? ...
- Unicef recruits gamers to mine Ethereum in aid of Syrian children | Global development
- Question on recursive math
- Checking equivalence of trace elements
- An algorithm that can determine the cause based on key words.
- Maximize Performance with this One Weird Trick or: Cache-Oblivious Data Structures
- Domain and Range Transfer
- Analysis of Longest Subsequence code complexity
- Poplar heap: a data structure turned implicit
- Efficient way to swap phone number string format from “AAABBBCCCC” to “BBBAAACCCC”?
- How is Djikstras better running time than Bellman?
- Best Possible Complexity
- How to determine the number of unique graphs represented by an Adjacency Matrix? (Linkedin/Facebook...
- Change in time complexity of an algorithm from 1-d data structure to 2-d data structure as input
- Hashing in particular order
- algorithms question
- How I made gesture recognition and won in GitHub Game Off