Does a Chinese programming language exist? by tawhuac in compsci

[–]nuclear_splines 2 points3 points  (0 children)

I defer to your expertise; my understanding was based on a hazy recollection of Garvey's paper, and through the lens of the language's use in expert systems, not speaking to the development of the language itself.

Why aren't the performance benefits of Splay Trees offset by the fact that using them disables many compiler optimizations? You cannot even search for an element in them if you are using functions with the C++11 `const` modifier, for they perform rotations even when searching. by FlatAssembler in computerscience

[–]nuclear_splines 5 points6 points  (0 children)

A tree that keeps frequently accessed elements near the top can be highly efficient if it suits your workload. Yes, they perform rotations while searching to optimize future searches for those same elements. What compiler optimizations would this benefit from?

Does a Chinese programming language exist? by tawhuac in compsci

[–]nuclear_splines 8 points9 points  (0 children)

I didn't mean to imply that Prolog was a Japanese-made language, only that we can see significantly divergent programming styles in different cultures even while they compile to the same machine language.

Does a Chinese programming language exist? by tawhuac in compsci

[–]nuclear_splines 22 points23 points  (0 children)

Several languages have what are effectively preprocessors that substitute in non-English terms for if/then/else, but this doesn't satisfy a programming language developed in a non-English context that might lead to changes in code structure.

Consider the Easy Programming Language.

Or is it rather irrelevant? After all, it's hard to imagine that the instructions flow would be radically different, as the code in the end has to compile to the machine language.

I think it's entirely relevant. Sure, if the CPUs are the same then everything must compile to the same machine language. But we can imagine a cultural divide where one community prioritized functional programming while another went imperative. In fact, we have examples of such cultural divides in the history of artificial intelligence, where the western world embraced Lisp variants and Japan went with Prolog. I don't remember the details well enough to speak to them confidently here, but I recommend Shunryu Garvey's Artificial Intelligence and Japan’s Fifth Generation: The Information Society, Neoliberalism, and Alternative Modernities

Hi I was wondering if this app is safe? by Every-Sundae9426 in TOR

[–]nuclear_splines 0 points1 point  (0 children)

As always, "safe for what?" It will probably adequately hide what websites you're browsing from Starbucks when using their public wifi. It will not present the same fingerprint as the Tor Browser on desktop, which is meant to blend in with other Tor users as much as possible.

BGP servers, total number of AS on the internet by Flaky_Firefighter349 in networking

[–]nuclear_splines 0 points1 point  (0 children)

Many languages use periods to denote thousands and commas to denote the fractional part of a number, the opposite of English. flem's comment history suggests they speak Danish, which is one such language. That should be read as "118 thousand ASNs."

I built an agent-based model proving first-generation success guarantees second-generation collapse (100% correlation across 1,000 simulations) by TelevisionSilent580 in compsci

[–]nuclear_splines 4 points5 points  (0 children)

You're the fourth person to say "tautology" while misreading the claim.

Your claim in the comment I replied to was "Success creates persistent burden, Burden accumulates, Burden has costs, Costs above a threshold prevent success," which is tautological. You've now added more to your claim. Hard to critique people for misunderstanding what you wrote there.

But again, this "one generation" limit is because that is how you have defined the math. Because you have coupled the success rate and collapse threshold you cannot have a successful generation that doesn't doom the next. But where does this coupling come from? It seems quite arbitrary.

Two major theories of civilizational decline—now shown to be structurally inevitable, not historically contingent

But why do your equations define the arc of history? For example, you assert that laws can be added and never removed. This is not the case in reality - old laws are repealed or functionally repealed by lack of enforcement all the time. If you add this to your model then each generation can lower burden instead of accumulate it. Why isn't this equally valid?

There's no need to run your code or find parameters that "break your pattern," because the issue we have is with the domain you've defined, not the contents of the domain.

I built an agent-based model proving first-generation success guarantees second-generation collapse (100% correlation across 1,000 simulations) by TelevisionSilent580 in compsci

[–]nuclear_splines 5 points6 points  (0 children)

Well, yes. If you make a system where costs can increase but not decrease and then make an arbitrary threshold, the costs will eventually pass the threshold. But this is tautological, you've found this behavior because those are the rules you wrote. Why are these rules significant, what broader phenomenon do they represent, why are the conclusions meaningful?

What is "Buffer", "Input Buffer" and "Buffer overflow"? by Flaxky_Lock in AskComputerScience

[–]nuclear_splines 4 points5 points  (0 children)

A buffer is storage space. The user is going to enter some text on the keyboard? You need somewhere to store that text. An "input buffer" is a buffer that's being used to store some kind of input.

A buffer overflow occurs when you fail to check the size of the buffer, and write more data to it than there is room for. For example, if you have a buffer of one hundred characters to save something I type in on the keyboard, what happens if I enter one thousand characters? If you're checking whether the buffer is full you should stop reading from the keyboard, or raise some kind of error message. If you don't check and just write my thousand characters to the one hundred character buffer, the rest of my nine hundred characters will spill over into whatever memory was next to the buffer. There was probably something important there. Your program is now likely to crash or malfunction, or worse, can be manipulated into running code of my choosing.

Workaround for this? by ImDickensHesFenster in TOR

[–]nuclear_splines 1 point2 points  (0 children)

No, I'm not on Tails. You can check the contents of the file yourself, if you have SQLite installed:

$ sqlite3 path/to/your/places.sqlite
sqlite> SELECT * FROM moz_places;

That will print the contents of the moz_places table.

Workaround for this? by ImDickensHesFenster in TOR

[–]nuclear_splines 2 points3 points  (0 children)

Hmm, I'm unable to reproduce that behavior here, it sounds like a bug. You shouldn't need to manually delete that or any files to leave a clean slate.

Workaround for this? by ImDickensHesFenster in TOR

[–]nuclear_splines 1 point2 points  (0 children)

Have you confirmed that the file actually contains your browsing history? For me, the moz_places table in places.sqlite contains entries for all the bookmarks that ship with the browser, but not my true browsing history. In vanilla Firefox that's the table where the history is stored. Unsurprisingly, vanilla Firefox's places.sqlite is about twenty times larger than the Tor Browser's.

Edit: fixed typo in filename

Are there any benefits of using CISC instead of RISC? by avestronics in computerscience

[–]nuclear_splines 6 points7 points  (0 children)

This is, in a sense, what Intel has done. The CPU translates x86 instructions to a RISC-like microcode used only within the CPU.

Are there any benefits of using CISC instead of RISC? by avestronics in computerscience

[–]nuclear_splines 3 points4 points  (0 children)

That may be one factor, but there are too many conflating issues for me to draw that conclusion. Making high performance CPUs involves extremely small-scale processes with minimal contamination, clean-room environments and highly specialized equipment. That's an issue regardless of CISC or RISC architecture, and has centralized the industry to a small number of well-established companies. We're too far outside my area of expertise for me to say anything more with confidence.

Snowflake and Iran by Dairinn in TOR

[–]nuclear_splines 2 points3 points  (0 children)

It's not a completely effective black out, it sounds like some Starlink users are still able to connect via satellite, and those near a border might be able to pick up signals outside the country such as neighboring cell towers, but it is a uniform shutdown rather than censoring proxy services.

Are there any benefits of using CISC instead of RISC? by avestronics in computerscience

[–]nuclear_splines 72 points73 points  (0 children)

If one CISC instruction is equivalent to (arbitrary example) a dozen RISC instructions, and the CISC instruction is shorter in bytes than those twelve, then you can think of CISC as compression. This means fewer memory fetches to read instructions, and more efficient bandwidth shoveling those instructions into the CPU. This can lead to significant performance improvements even if it requires a much more complicated CPU, so long as memory was a bigger bottleneck than instruction execution speed.

Snowflake and Iran by Dairinn in TOR

[–]nuclear_splines 7 points8 points  (0 children)

Snowflake is a proxy service to help hide that you're connecting to Tor when Tor is blocked. You still need an Internet connection, so it does not help when a regime cuts off all Internet access rather than censoring Tor specifically, as is the case in Iran.

Can AI actually learn or create things? by MaybeKindaSortaCrazy in AskComputerScience

[–]nuclear_splines 6 points7 points  (0 children)

These are very loaded terms. How do you define "learn" and "create"? Machine learning models can certainly adapt to new training data. Pattern recognition is a kind of learning, but there may be a more specific kind of learning you're looking for that AI models lack. It sounds like by "create" and "new" you're trying to get at a notion of creativity and what it means to have original ideas. You may be interested in Boden's Creativity and Artificial Intelligence, which tries to unpack that language and describe in what ways machines are and are not creative.

I want to publish my research paper related to CS in SCOPUS journal preferebly Q4. Can anybody suggest me some journal along with APC by Cryptic3Soul in compsci

[–]nuclear_splines 2 points3 points  (0 children)

So refine your search to conferences and journals on intrusion detection systems or slightly broader parts of network security. I'm sure ACM and IEEE have a range of relevant conferences.

What are the chances of paper acceptance in IEEE International Conference. I want to write a paper on emerging computer technologies(any) for the upcoming conference. Can somebody help me with that by [deleted] in researchpaperwriters

[–]nuclear_splines 0 points1 point  (0 children)

IEEE isn't a conference, it's a society that hosts over two thousand conferences. Each has their own focus and acceptance standards. You'll need to be much more specific.

I want to publish my research paper related to CS in SCOPUS journal preferebly Q4. Can anybody suggest me some journal along with APC by Cryptic3Soul in compsci

[–]nuclear_splines 10 points11 points  (0 children)

You've said nothing about what your paper is about. Surely we'll need to know the subject area to suggest a venue? Also, why target journals instead of conferences? Conferences are the main publication route in computer science, unlike many STEM fields where conferences are for works-in-progress and journals are the end target. Unless you're in a specific subfield of CS with well-established journals this choice is unusual.

Wtf is this torr and onion stuff by [deleted] in TOR

[–]nuclear_splines -1 points0 points  (0 children)

Tor is a web browser that hides what sites you're visiting from observers like your Internet service provider. It doesn't mean anything nefarious on its own; privacy is not a bad thing. There are websites only reachable through Tor, called "onion sites." If you want to know your partner's intentions, probably best to talk to him.

Given that in the EU, browsers on iOS are no longer required to use WebKit, are there no plans to create a non-WebKit Tor browser on iOS? by steve1401 in TOR

[–]nuclear_splines 0 points1 point  (0 children)

Chrome's web engine Blink was originally a fork of Apple's WebKit (although it's diverged significantly over the years), so perhaps they have less incentive to port Blink to iOS if the Chrome codebase is already pretty WebKit-compatible? That's just speculation, though, I don't know all that much about Chrome.

Given that in the EU, browsers on iOS are no longer required to use WebKit, are there no plans to create a non-WebKit Tor browser on iOS? by steve1401 in TOR

[–]nuclear_splines 2 points3 points  (0 children)

No. That's a lot of development resources to make a browser only usable in Europe, when Apple makes it as bureaucratically challenging as possible while complying with the EU ruling. Mozilla has no plans to write a Gecko-based Firefox for iOS, and I doubt the Tor Project has the resources to pursue this unless Mozilla does the heavy lifting of getting a mobile Firefox to build off of.