Folding trees and efficient color coding
Folds are convenient and efficient abstractions of recursive patterns for processing data structures. In 1984 John Hughes wrote “Why functional programming ...
Folds are convenient and efficient abstractions of recursive patterns for processing data structures. In 1984 John Hughes wrote “Why functional programming ...
R is an environment for exploratory data analysis that is becoming increasingly popular. It is also used for analysis of data in high-impact scientific publ...
Sampling (n) elements without replacement from a collection of (N) elements means that no duplicates are allowed. A strategy for sampling without replacemen...
This very old program of mine, written such that the code fits into a 25 lines 80 columns terminal window, lets you play Tic Tac Toe on a (19 ) grid:
A Quine is a program that prints its own source code. Writing one is considered a rite of passage for programmers. In his Turing award lecture, “Reflections...
To cite Wikipedia:
Lately, I have been working on problems that require solving convex optimization problems. In the course of this work I have been using cvxpy. The cvxpy hom...
Recently I have been thinking about recursive sets. These are sets that have a computable characteristic function. A standard example of a set that is not r...
Sampling (n) elements without replacement from a collection of (N) elements means that no duplicates are allowed. A strategy for sampling without replacemen...
A Quine is a program that prints its own source code. Writing one is considered a rite of passage for programmers. In his Turing award lecture, “Reflections...
To cite Wikipedia:
R is an environment for exploratory data analysis that is becoming increasingly popular. It is also used for analysis of data in high-impact scientific publ...
Sampling (n) elements without replacement from a collection of (N) elements means that no duplicates are allowed. A strategy for sampling without replacemen...
This very old program of mine, written such that the code fits into a 25 lines 80 columns terminal window, lets you play Tic Tac Toe on a (19 ) grid:
A Quine is a program that prints its own source code. Writing one is considered a rite of passage for programmers. In his Turing award lecture, “Reflections...
To cite Wikipedia:
Last year I was asked by Norges Tekniske Vitenskapsakademi (The Norwegian Technical Science Academy) to write a chapter on privacy in the upcoming addition ...
In the last year, I have repeatedly been offered the opportunity to contribute to marketing campaigns produced by the content marketing firm Mediaplanet. Fo...
Checking out Kifer and Machanavajjhala’s TODS paper on their Pufferfish privacy framework, I read the following (note that (M_1) and (M_2) are randomized qu...
Folds are convenient and efficient abstractions of recursive patterns for processing data structures. In 1984 John Hughes wrote “Why functional programming ...
To cite Wikipedia:
In response to the COVID-19 pandemic, the Norwegian Institute of Health first commissioned and then deployed a population surveillance / contact tracing cel...
Differential privacy (Dwork et al. 2006) is an emerging standard for database privacy. As such, differential privacy is concerned with databases describing ...
The use, and usefulness, of (p)-values is controversial. One of the reasons for this is that (p)-values often are misinterpreted. One such misinterpretation...
Differential privacy (Dwork et al. 2006) is an emerging standard for database privacy. As such, differential privacy is concerned with databases describing ...
Over the years I’ve repeatedly heard the claim that (k)-anonymity means that the re-identification probability is at most (). In an important sense this is ...
In response to the COVID-19 pandemic, the Norwegian Institute of Health first commissioned and then deployed a population surveillance / contact tracing cel...
This very old program of mine, written such that the code fits into a 25 lines 80 columns terminal window, lets you play Tic Tac Toe on a (19 ) grid:
R is an environment for exploratory data analysis that is becoming increasingly popular. It is also used for analysis of data in high-impact scientific publ...
Folds are convenient and efficient abstractions of recursive patterns for processing data structures. In 1984 John Hughes wrote “Why functional programming ...
Differential privacy (Dwork et al. 2006) is an emerging standard for database privacy. As such, differential privacy is concerned with databases describing ...
Lately, I have been working on problems that require solving convex optimization problems. In the course of this work I have been using cvxpy. The cvxpy hom...
Recently Google open-sourced their flow graph based numerical computation library Tensorflow. In their words:
Checking out Kifer and Machanavajjhala’s TODS paper on their Pufferfish privacy framework, I read the following (note that (M_1) and (M_2) are randomized qu...
I finally moved my pages from a static page generation system that I cobbled together with git, makefiles, pandoc, and css, to the Jekyll based pages you ar...
In the last year, I have repeatedly been offered the opportunity to contribute to marketing campaigns produced by the content marketing firm Mediaplanet. Fo...
Over the years I’ve repeatedly heard the claim that (k)-anonymity means that the re-identification probability is at most (). In an important sense this is ...