-
```
What steps will reproduce the problem?
0. < Jaffy> Why am I writing algorithms on postit notes?
1. < pandabot> Why am I writing pandagorithms on postit notes?
2. < Daniel> pandagorithms :)
3. < pa…
-
#### Description
I am trying to deploy a customer recommendation API on AWS Lambda using the sam CLI and docker following this tutorial:
https://sejalv.medium.com/containerized-ml-deployment…
-
## Description
Create a new risk for "Weak Hashing (MASVS-CRYPTO-1)" using the following information:
Utilizing weak hashing algorithms such as MD5 and SHA1 in a security sensitive context may com…
-
hello @dimtics ,
i am currently writing my Bachelorthesis about Intrusion Detection implement with Machine learning Algorithms. Could I have your permission to use this code? I would also indirectl…
-
Do these algorithms calculate the overall maximum of the data set? or just the maximum in each thread block?
-
In alloy, there is going to be an included Utils class that contains common rather simple self-contained algorithms to aid in writing code. For example, a `constrain` method. What other methods should…
-
I am writing https://wiki.openhumans.org/wiki/Finding_relations_between_variables_in_time_series and would like to add your app. Could you please tell me more about the financial algorithms betterself…
-
When compiling with GCC 12, the following warnings are generated:
```
algorithms/mda/interface.c:185:44: warning: argument 1 of type 'const mda_interface_t *[2]' with mismatched bound [-Warray-par…
-
Currently it is very easy to filter the graph in any way a user may want i.e. get nodes which have a degree>10. However if we then ask for the neighbours of these nodes this filter will obviously be i…
-
I'm currently attempting to script API calls to TASS from a FileMaker database, and I'm finding it difficult to work with AES ECB encryption.
FileMaker does not have script steps for encryption wit…