Skip to main content

Home/ Coders/ Group items matching "algorithm" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
3More

Programming Proverbs 20: Provide good documentation - Computer Science Teacher - Though... - 0 views

  • the minimum documentation for a piece of code is the list and description of: inputs - names, types and purposes outputs -  types being the most important piece algorithm descriptions
  • The old line is that the job is not done until the paperwork is done. For programming documentation is the paperwork.
  • My axim is write documentation ONLY when it hurts to not have it
1More

CLR Inside Out: New Library Classes in "Orcas" -- MSDN Magazine, April 2007 - 0 views

  •  
    New CLR libraries incladd-in hosting model, which was discussed in the last two editions of CLR Inside OutSupport for the Suite B set of cryptographic algorithms, as specified by the National Security Agency (NSA)Support for big integersA high-performance set collectionSupport for anonymous and named pipesImproved time zone supportLightweight reader/writer lock classesBetter integration with Event Tracing for Windows® (ETW), including ETW provider and ETW trace listener APIs
2More

Extension Versioning, Update and Compatibility - MDC - 0 views

  • The updateURL uses https, or there is no updateURL at all (which defaults to addons.mozilla.org which is https) The updateURL uses http and the updateKey entry is specified which will be used to verify the data in the update manifest.
  • In the update manifest delivered from the updateURL the updateLink must be specified in one of the following ways: The updateLink to the XPI file must use https The updateLink can use http and you must include an updateHash for the XPI file using sha1, sha256, sha384 or sha512 hash algorithms.
1More

Z3: SMT solver - 0 views

  • Z3 is a new high-performance theorem prover being developed at Microsoft Research.
6More

Joe Duffy's Weblog - OnBeingStateful - 0 views

  • The biggest question left unanswered in my mind is the role state will play in software of the future.
  • The biggest question left unanswered in my mind is the role state will play in software of the future. That seems like an absurd statement, or a naïve one at the very least.  State is everywhere: The values held in memory. Data locally on disk. Data in-flight that is being sent over a network. Data stored in the cloud, including on a database, remote filesystem, etc. Certainly all of these kinds of state will continue to exist far into the future.  Data is king, and is one major factor that will drive the shift to parallel computing.  The question then is how will concurrent programs interact with this state, read and mutate it, and what isolation and synchronization mechanisms are necessary to do so?
  • Many programs have ample gratuitous dependencies, simply because of the habits we’ve grown accustomed to over 30 odd years of imperative programming.  Our education, mental models, books, best-of-breed algorithms, libraries, and languages all push us in this direction.  We like to scribble intermediary state into shared variables because it’s simple to do so and because it maps to our von Neumann model of how the computer works.
  • ...3 more annotations...
  • We need to get rid of these gratuitous dependencies.  Merely papering over them with a transaction—making them “safe”—doesn’t do anything to improve the natural parallelism that a program contains.  It just ensures it doesn’t crash.  Sure, that’s plenty important, but providing programming models and patterns to eliminate the gratuitous dependencies also achieves the goal of not crashing but with the added benefit of actually improving scalability too.  Transactions have worked so well in enabling automatic parallelism in databases because the basic model itself (without transactions) already implies natural isolation among queries.  Transactions break down and scalability suffers for programs that aren’t architected in this way.  We should learn from the experience of the database community in this regard
  • There will always be hidden mutation of shared state inside lower level system components.  These are often called “benevolent side-effects,” thanks to Hoare, and apply to things like lazy initialization and memorization caches.  These will be done by concurrency ninjas who understand locks.  And their effects will be isolated by convention.
  • Even with all of this support, we’d be left with an ecosystem of libraries like the .NET Framework itself which have been built atop a fundamentally mutable and imperative system.  The path forward here is less clear to me, although having the ability to retain a mutable model within pockets of guaranteed isolation certainly makes me think the libraries are salvageable.  Thankfully, the shift will likely be very gradual, and the pieces that pose substantial problems can be rewritten in place incrementally over time.  But we need the fundamental language and type system support first.
9More

Programming as if Performance Mattered, by James Hague [2004-04-04] - 3 views

  • I frequently see bare queries from programmers in discussion forums, especially from new programmers, who are worried about performance. These worries often stem from popular notions about what operations are "slow." Division. Square roots. Mispredicted branches. Cache unfriendly data structures.
  • Inevitably someone chimes in that making out-of-context assumptions, especially without profiling, is a bad idea. And they're right.
  • The golden rule of programming has always been that clarity and correctness matter much more than the utmost speed. Very few people will argue with that. And yet do we really believe it? If we did, then 99% of all programs would be written in something like Python. Or Erlang.
  • ...5 more annotations...
  • At the same time, such concerns and advice seem to remain constant despite rapid advances in hardware.
  • That tempting, enticing, puzzle-solving activity called "optimization," it hasn't gone away either.
  • Only now the process is on a different level. It isn't machine level twiddling and cycle counting, but it isn't simply mathematical analysis of algorithms either.
  • The big difference is that the code changes I made are substantially safer than running a program and having it silently hang the system. All array accesses are bounds-checked. There's no way to accidentally overwrite a data structure. There's no way to create a memory leak.
  • Really, this is what those cycle-counting programmers from 1985 dreamed of.
  •  
    « I frequently see bare queries from programmers in discussion forums, especially from new programmers, who are worried about performance. These worries often stem from popular notions about what operations are "slow." Division. Square roots. Mispredicted branches. Cache unfriendly data structures. »
5More

Design Patterns: 15 Years After the Revolution, by Danny Kalev @ InformIT [2009-10-30] - 1 views

  • by defining a description template that included among the rest: Known uses. Sample code (as opposed to a typical algorithm which were often described in plain English and perhaps a few sketchy lines of pseudo-code). Collaboration (A description of how classes and objects used in the pattern interact with each other). Consequences (results and side-effects). Related patterns.
  • Would a 2009 catalog of the 23 classic design patterns look much different? According to the authors of Design Patterns: Elements of Reusable Code, the answer is no.
  • The authors would reclassify certain patterns and omit a few of the original patterns but the design and implementation would remain pretty much the same: "We have found that the object-oriented design principles and most of the patterns haven't changed since then" says Erich Gamma. You can't escape the feeling that patterns are frozen in time
  • ...2 more annotations...
  • In the meantime, in the C++ world the tide has turned towards a completely different paradigm known as generic programming (and to some extent, functional programming). Instead of plain classes and a complex inheritance chain, C++ these days uses templates, meta-programming and static type checking. The C++ Standard Library is the most prominent showpiece of the generic and functional programming idioms.
  • Over-engineering is another source of criticism. Programmers who become acquainted with patterns are often tempted to solve every problem using a pattern, even when a much simpler solution would probably be a better choice.

Survetement Lacoste Pas Cher Cela - 0 views

started by longchamppas on 05 Apr 16 no follow-up yet
1More

Buy TripAdvisor Reviews - 100% Guaranteed & Cheap... - 0 views

  •  
    Buy TripAdvisor Reviews Introduction If you are looking for a way to improve your hotel's ratings, TripAdvisor reviews are a great way to do so. But the problem with this is that some people try to sell their fake reviews on the website and these can have an impact on your hotel's reputation. What is Tripadvisor TripAdvisor is a travel website that allows users to post reviews about hotels, restaurants and attractions in destinations worldwide. It is the largest travel website in the world, with more than 500 million reviews of hotels and restaurants. TripAdvisor has become so popular because it's easy to use-and free! You can leave your own reviews or read others' opinions about your favorite places to stay or have fun. If you're looking for more than just a place to stay, you might also want to check out some of our other pages on this site: The problem with TripAdvisor reviews TripAdvisor is the most popular travel site in the world, with over 250 million users. It's also one of the most trusted places to get honest and unbiased reviews on any business or product. TripAdvisor reviews can make or break your business, so it's important to know what they are, how they work and how they can help you improve your business. Can you buy a good review? You can buy a good review on TripAdvisor. But how does one tell if a review is fake? Fake reviews typically come from people with no connection to the establishment, who have never been there and don't know anything about it. This means they can write whatever they want in an attempt to get their name out there and increase their chances of being found by Google search engines (which often utilize algorithms based on such things). Buy TripAdvisor Reviews If you suspect that your hotel was reviewed by someone who has never visited it before or had any idea what they were talking about, read through the comments carefully-some users will make claims that don't match up with reality! If something does
1More

AI-ML Development Services | Apptread - 0 views

  •  
    We at Apptread offer AI solutions that power numerous industries. Our team of highly skilled algorithm experts, data scientists, machine learning experts, and technology consultants is always motivated to perform extraordinarily well. Learn more about our AI&Ml Development Services by getting in touch with us: https://apptread.com/contact https://bit.ly/3wFXUMh
1More

2014: Oracle B-Tree Index: From the concept to Internals - Oracle Wiki - Oracle - Toad ... - 3 views

  •  
    "Ask to Talks" is a platform where people can get answers, insights, and discussions on a wide range of topics. Whether you're looking for advice, expert insights, or community opinions, "Ask to Talks" has a place for it all. https://asktotalks.info/
3More

2013: Anatomy of a pseudorandom number generator - visualising Cryptocat's buggy PRNG -... - 13 views

  •  
    A pseudorandom number generator (PRNG) creates sequences that appear random but are algorithmically determined. Cryptocat's buggy implementation likely had flaws in entropy or seeding, compromising randomness and security. You can check this: https://3rr.co
  •  
    Thanks Dude http://718sp.co
  •  
    Fabien Cadet, 2013: Anatomy of a pseudorandom number generator - visualising Cryptocat's buggy PRNG - an insightful deep dive into flawed randomness. While you're brushing up on crypto flaws, keep your windows secure and stylish with https://windowtintinglasvegas.com/
« First ‹ Previous 41 - 59 of 59
Showing 20 items per page