-
This issue is meant to be an outline of our testing and evaluation strategy for the Hamming DHT implementation and a place to collect notes and observations.
### Initial testing thoughts
Here's the i…
-
Hello dear author, is your paper applicable to the underwater segmentation field? The underwater segmentation field uses SAM, and here is the DOI of the relevant paper: https://doi.org/10.48550/arXiv.…
-
This specific feature is a branched off issue that was thought of while getting issue #10 made.
Basically, this adds a whole slew of variants for each Equipment.
## Weapon Variants
- Normal
…
-
By the way, have you ever run this code to verify the validity of the SeedNet algorithm(CVPR'2018)?
Recently, I have executed more than 13100 epoches according to the code your given, among which the…
-
It seems to me that `RangeCheck` tries too hard and sometimes fails too easily. And we also seem to have cases where range checks reach this phase (and they are eliminated) but they could have been el…
-
**Is your feature request related to a problem? Please describe.**
To reduce the effectiveness of attempts to compromise a user account, things like preventing an account from logging in if enough fa…
-
The current algorithm for suggestions is loosely inspired by Fourier transformation concepts, in that it uses the idea that complex waveforms can be described as a sum of simpler waveforms. It is beli…
-
I've been working with DPBGA and have encountered some issues that I'd like to clarify:
**ASR Drops to Zero with Different Target Class:**
When I change the target class (e.g., to Flickr), the A…
-
### Description
At some point, we will need to evaluate the effectiveness of our algorithm. Choosing the path for evaluation earlier allows us to structure our code accordingly, enabling it to work…
-
If people want to write to their member of Congress, it can be more effective if you write the "Legislative Assistant" staffer in charge of the particular area you're writing to.
For example, for Edu…