Scott Aaronson receives 2020 ACM Prize in Computing Computer Science |
- Scott Aaronson receives 2020 ACM Prize in Computing
- What is the best book to learn about parsers?
- New Algorithm that overcomes limitations by hash and B-tree indexes. Search by any possible search key combination in consistent high performance.
- RIP routing - split horizon with poisoned reverse?
- Jobs in ML and AI?
- Is Welcome To The Game a virtual machine?
- MLSys 2021 Workshops: Graph Neural Networks, on-device intelligence, emerging hardware, recommendation systems, and more
- Best resources to prepare for cs math?
- What are some good journals to follow on programming and computation? like computational models like term rewriting, lambda calculus and such. like the laws of physics for compsci
- Climate Change and CS Researchers
- Consultation and guidance community on questions of NP and NP-Hard of university-level and research
- With modern computers, can an automated system beat the best humans at chess? (please read details)
- Need some advice and recommendations
- Why does trying to break into the NT 3.1 kernel reboot my 486DX4 machine?
- A Cambrian Explosion of AI
- What are some good journals to follow on programming and computation? like computational models like term rewriting, lambda calculus and such. like the laws of physics for compsci
- Where to learn software testing
- identification through email?
- Choosing undergrad university
- What is Memory Leak In Java
- Machine Learning at Pace: Optimization Code Boosts Performance by 5x
Scott Aaronson receives 2020 ACM Prize in Computing Posted: 22 Apr 2021 08:19 AM PDT |
What is the best book to learn about parsers? Posted: 22 Apr 2021 05:48 PM PDT |
Posted: 23 Apr 2021 04:23 AM PDT |
RIP routing - split horizon with poisoned reverse? Posted: 23 Apr 2021 03:31 AM PDT So we started learning about RIP routing and I just want to make sure I have this concept correct. If we have a network A - B - C, and metric of 1 for both links and the tables have converged. A knows to get to to C it takes a route that goes through B with a total cost of 2, but when A sends its routing table to B it sends the link from A to C with a cost of infinity, since B knows a better path to C it simply ignores that link given to it by A. But if the link from B - C goes down, B will mark the previously valid route as invalid and send a message to A saying that route is now unreachable so it changes its local table by updating the path that was valid, since A is using split horizon with poisoned reverse it was already telling B that C was unreachable through it, now the routers wait for the routes to timeout and remove the entry from their routing tables. So split horizom with poisoned reverse helps speed up the convergence time? Is this what is happening? Thanks. [link] [comments] |
Posted: 23 Apr 2021 02:26 AM PDT Just wondering how the job market looks for ML and AI and how the average pay is. im starting CS next year and these topics especially interests me. Also if its generally an enjoyable field to be in? Thanks [link] [comments] |
Is Welcome To The Game a virtual machine? Posted: 22 Apr 2021 11:37 PM PDT I did some testing and found that the browser in Welcome To The Game is an actual useable browser. You can go to any website you want. But I was wondering if it is a virtual machine. I haven't done much with VMs and don't know like anything about them. But WTTG seems to work like a virtual machine. [link] [comments] |
Posted: 22 Apr 2021 05:36 PM PDT Here is a collection of workshop recordings from the Conference on Machine Learning and Systems earlier this month. These expert-led sessions provide solid insights on the best practices for learning systems and novel learning methods tailored to practical machine learning workflows. Some interesting ones:
(Each workshop lasts 7-9 hours. You can use the time-stamped agenda in the video descriptions or slides to navigate.) [link] [comments] |
Best resources to prepare for cs math? Posted: 22 Apr 2021 08:28 PM PDT |
Posted: 22 Apr 2021 11:04 AM PDT |
Climate Change and CS Researchers Posted: 22 Apr 2021 06:27 PM PDT Hi Really a shot in the dark Does anyone know any researchers operating in the intersection of computer science, data analysis, and climate change? I'm interested in pursuing grad school and have vague ideas of what I'd want to research, but have no background knowledge of how cs is currently utilized in the study of climate change [link] [comments] |
Consultation and guidance community on questions of NP and NP-Hard of university-level and research Posted: 22 Apr 2021 05:42 PM PDT Hello, I wanted to ask if there is a community that issue with algorithm design and research on university-level for consultation and guidance on questions of NP and NP-Hard. It is not the purpose of publishing a community of one kind or another, the purpose is to help the advancement of research in the world only, If this is not possible, delete the thread. [link] [comments] |
With modern computers, can an automated system beat the best humans at chess? (please read details) Posted: 22 Apr 2021 09:14 PM PDT Of course I've heard of Deep Blue, and even modern Stockfish is very very good. But a chessbot like this isn't satisfying to me as "playing chess". They take a board state as input and give the name of a move as output. But that is not how chess is played. If I play chess with you, I am going to sit in front of a board with pieces on it, and a chess clock. Each of us must look at the board, recognize the pieces, choose a move, grab a piece, make that move, and as quickly as possible tap the clock. As far as I know, computers only do the "choose a move" part, which to me is not the full game of "playing chess" (though it is the part which is most difficult to humans). Where do we stand in terms of the object recognition, inverse kinematics, actuator design, and all the other parts needed, to arrive at a machine that can properly "play chess" in the same fashion that a human player can? Where are the biggest challenges here? [link] [comments] |
Need some advice and recommendations Posted: 22 Apr 2021 02:48 PM PDT In your opinion what should a high school senior who has no knowledge of cs or coding do this summer to prepare when embarking the journey of a double major in finance and cs ? [link] [comments] |
Why does trying to break into the NT 3.1 kernel reboot my 486DX4 machine? Posted: 22 Apr 2021 04:51 AM PDT |
Posted: 22 Apr 2021 05:39 PM PDT So there's the awareness that we could accidentally create some kind of AI. A neural net has unexpected effects, etc. Potentially gets out of hand. We are also likely to model AI after more primitive brains then ours, first. What happens when you make a Fly brain but give it a million times the processing power? Sounds like... unexpected effects, potentially gets out of hand. We're going to be making quite a lot of AI on our way to the perfect specimen, aren't we? It's pretty much required? And i think it's inevitable there's going to be some slips. Maybe irreversible slips - and yet, just slips. Maybe we make a paper clip optimizer, but for the foreseeable it's going to be a very dumb one. Still - you get the sense we'll have a world increasingly full of annoyance ai that maybe don't end the world but aren't a picnic either. And what does that say about the real deal? Which is more likely; a meticulously made model ascending us all, or a beta version that bugs it's way out of the box and half-asses it? Is Evolution ever neat? And what's to be done about that? [link] [comments] |
Posted: 22 Apr 2021 11:01 AM PDT |
Where to learn software testing Posted: 22 Apr 2021 01:10 PM PDT Hi Can someone suggest me Where to learn software testing? [link] [comments] |
Posted: 22 Apr 2021 09:17 AM PDT There is a little know (I think) feature of sendmail (I don't know if postfix can do the same) where an email can be sent directly to a program. If this feature is used as a very loose, asynchronous mechanism to coordinate actions among the servers in a cluster... How can the program verify the identity of the sending program/user/server? How about using ssh public keys? Is there another way where a header could be inserted (X-identity: $HASH) into the email as a "key" to verify the identity? How about just putting an identity "key" in the body of the email? [link] [comments] |
Posted: 22 Apr 2021 12:09 PM PDT Hi, My brother is an incoming freshman and wants to major in CS for his undergrad. My parents and I have little to no background and are extremely confused which university to accept. Here are the list of colleges he's been accepted to by country: USA: University of Minnesota Twin Cities Indiana University Bloomington Michigan State University CANADA: University of Alberta UBC Okanagon [link] [comments] |
Posted: 22 Apr 2021 11:18 AM PDT |
Machine Learning at Pace: Optimization Code Boosts Performance by 5x Posted: 22 Apr 2021 07:21 AM PDT |
You are subscribed to email updates from Computer Science: Theory and Application. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment