-
Hi Homer
I am performing scattering and local field calculations with for the structure depicted below, using the scuff-scatter command line utility. All the files and inputs for the simulation are a…
-
-
Segmentation algorithms are often confused by lesioned areas, resulting in incorrect automated segmentation results in these regions. As such, it is good practice is to subtract the lesion mask from t…
-
Character.PlaceOnWalkableArea (obsolete script name: MoveToWalkableArea) script API function is supposed to bring character to nearest walkable area, but sometimes fails.
So far I found this occuri…
-
{{{
# !html
Reply to: noreply@sort.ucd.ie
}}}
{{{
Bugs item #222, was opened at 2005-11-29 11:05
You can respond by visiting:
http://sort.ucd.ie/tracker/?func=detail&atid=441&aid=222&group_id=97
Ca…
atiti updated
11 years ago
-
## CVE-2020-15522 - Medium Severity Vulnerability
Vulnerable Library - bcprov-jdk15on-1.56.jar
The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contain…
-
@atrniv @pyros2097 Great work on this project. It's very different from the other 3 GraphQL libraries (as well as the reference JS implementation). For my purposes I think it is the most suitable base…
hsyed updated
7 years ago
-
Today it is possible to alter the resolve algorithm to some extent using `--experimental-specifier-resolution`. However that switch only supports a couple of fixed use-cases and is not available prog…
-
Ok lets recap the high level requirements that lots of people have asked for:
1) ability as consumer to swap from google maps to openstreet map / bing / etc
2) ability as guide editor to set prefe…
-
The following Fig. shows (from left to right) caustic, kappa, alpha1 -map.
Top row is NSIE, middle row shows Pseudo-Elliptical PowerLaw, bottom row is Power Law ellipticized by Fourier method. For the…
leier updated
8 years ago