-
> ❓career change decision.
Since college upto now, I have been working on software that interacts with humans, or at most, stays within a computer.
In other words, all my computation/software kn…
-
When doing keygen you have to somehow do an out of band check with each party that they have the same result, or assume a PKI setup (which can be setup with an out-of-band check). A typical way to do …
-
i was hoping someone may be able to provide some more information on how to use these parameters, and what are reasonable values (mainly for `margin`) in different contexts. for example, several of th…
-
Dear hasmithagunda123,
I've reviewed your project's codebase and identified areas for improvement
Enhance Human Detection: Implement a deep learning-based object detection model like YOLO or SSD…
-
| Task | Who? | Status? (Not started/In progress/Ready for review) | Finished? (Yes/No) |
| --- | --- | --- | --- |
| Web crawler | Bo and Boyang | Ready for review | Yes |
| Inverted index | Bo | Rea…
-
Currently, we have the CoM information only for integration based IK. We should add it also for other IK methods.
-
Today, with the advancement of blockchain and Internet of Things (IoT) technologies, there is a growing need for authentication protocols and key exchanges to facilitate communication between these di…
-
Probably with ParaPhrase DataBase(http://paraphrase.org/#/download) and with Aligned pairs between the Simple English Wikipedia entries and their corresponding English Wikipedia entries
Kauchak, D.: …
-
Each quarter, we propose a list of papers that presenters can select from.
Presenters are welcome to propose their own choice of paper, but having a list to choose from is helpful for those without a…
-
- [ ] [The Bitter Lesson](http://www.incompleteideas.net/IncIdeas/BitterLesson.html)
# The Bitter Lesson
**DESCRIPTION:**
"The Bitter Lesson
Rich Sutton
March 13, 2019
The biggest lesson that …