Quantcast
Channel: Decorator Pattern » Algorithms
Browsing latest articles
Browse All 12 View Live

Image may be NSFW.
Clik here to view.

How Google’s Self Driving Car Works

IEEE Spectrum have an article describing some details of the Google autonomous vehicle project, much of the information is public for the first time. The article is here, but by far the best bit is the...

View Article



Image may be NSFW.
Clik here to view.

Side Channel Attacks

An interesting read on side channel attacks: “The second story was about USB devices. Basically, they plugged a very precise voltmeter into an USB port and started recording the very small variations...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Research shows Augmented Projectors

Some really great work out of MSR. Combination Depth Camera/Projector/IMU allows for some really novel interactions. Worth a look.

View Article

Image may be NSFW.
Clik here to view.

Patenting the impossible

Jean-loup Gailly (author of gzip!) dissects US Patent 5,533,051 on ‘compression of random data’. The title immediately raises suspicion as it’s impossible to compress truly random data. Anyone with a...

View Article

Image may be NSFW.
Clik here to view.

AI Challenge Post Mortem Article

The winner of the AI Challenge 2011 has posted a detailed description of their code. It’s worth a quick read and spells out the algorithms clearly, with example code in Java. Link.

View Article


Image may be NSFW.
Clik here to view.

Algorithm Measures Human Pecking Order

The MIT Technology Review has covered a fascinating paper that concludes : “The way people copy each other’s linguistic style reveals their pecking order.” Worth a read. Link. The original paper is...

View Article

Image may be NSFW.
Clik here to view.

The Value of Immediate Feedback

You may have heard of Bret Victor from his “Kill Math” project and the beautiful differential equation playground that he has created with his Interactive Exploration of a Dynamical System. It caused...

View Article

Image may be NSFW.
Clik here to view.

Breaking Full-Disk Encryption Using FireWire

There have been a number of proof-of-concept hacks using IEEE1394 devices’ DMA to elevate privileges on a host machine. The most useful application of this technique is breaking into machines that use...

View Article


Image may be NSFW.
Clik here to view.

The GRAIL Project

In 1964 the RAND corporation unveiled the GRAIL Project. GRAIL was an early example of a GUI, and (the first?) example of a tablet. The system used a programming language called GrailLanguage, which...

View Article


Image may be NSFW.
Clik here to view.

SIGGRAPH 2013 Highlights

Worth your time.

View Article
Browsing latest articles
Browse All 12 View Live




Latest Images