-
### Description
Text knockout is a quite important technique: instead of printing a text, a rectangle around the text is printed and the text is **not** printed. This means, the text looks white wh…
-
First of all, I would like to sincerely thank you for this library. It works very well for our needs.
In our use case, we are interested in finding a single optimal change point (based on a cost fu…
-
We forward these term suggestions that EBRAINS received from data providers:
name | suggestedTerminology | interlex ID | Notes | definition
-- | -- | -- | -- | --
…
-
As a MDIP node operator, I want to secure my MDIP wallet seed keys for my node's Agent DIDs using state-of-the-art crypto-currency key management practices and techniques.
-
there seems to be duplicate techniques:
- T0111 : Traditional Media - Examples include TV, Newspaper, Radio, etc.
- T0114.002 : Traditional Media - Examples include TV, Radio, Newspaper, billboard…
-
Over 17 years later, maybe it's time to update Miller's book?
For a while now, the audio examples have been modernized to include new features and have been revised in other ways by me. The book li…
-
Ideas to reduce the cache pressure during point lookup:
where:
- Perform initially
- Perform between iterations upon some criteria being met
what:
- binning
- KD Trees
-
We need to discover a way to classify our malware. The first step can be binary identification, malicious or benign. Then the next steps could be classifying various types of malware
-
Dear mr.Vux,
I have several DX11 Effects side by side (let's say just Constant (DX11.Effect)).
Now I want to use the same Technique for all of them. Unfortunately it's not possible to connect one…
-
- Added by [Darwyn Sumner](http://micropezids.myspecies.info/user/2)
- Scratchpad: [European Micropezids & Tanypezids](http://micropezids.myspecies.info)
### Description:
It is possible to add small…