algorithms – Finbonacci heaps – Computer Science Stack Exchange

Thanks for contributing an answer to Computer Science Stack Exchange!

  • Please be sure to answer the question. Provide details and share your research!

But avoid

  • Asking for help, clarification, or responding to other answers.
  • Making statements based on opinion; back them up with references or personal experience.

Use MathJax to format equations. MathJax reference.

To learn more, see our tips on writing great answers.

shared folders – I am losing my ubuntu share with my W10 computer and smart Tv’s after any updates or restarts on the ubuntu

Stack Exchange Network


Stack Exchange network consists of 176 Q&A communities including Stack Overflow, the largest, most trusted online community for developers to learn, share their knowledge, and build their careers.

Visit Stack Exchange

Diamtere of ismomorphic graphs – Computer Science Stack Exchange

Thanks for contributing an answer to Computer Science Stack Exchange!

  • Please be sure to answer the question. Provide details and share your research!

But avoid

  • Asking for help, clarification, or responding to other answers.
  • Making statements based on opinion; back them up with references or personal experience.

Use MathJax to format equations. MathJax reference.

To learn more, see our tips on writing great answers.

computer networks – SSID evaluation within the 802.11 protocol

Inspired by a question on superuser, I was reading up about the 802.11 protocol. This made me wonder if the SSID is actively used outside the authentication and association process. I know that it’s used for beacon frames which will get evaluated after a connection between AP and client has been established. But within beacon frames the SSID value is optional, so it made me think it does not get evaluated.

So my question is, will the SSID usually be evaluated during a connection between AP and client after the authentication and association process? Is this a required within the 802.11 protocol or is this up to the implementation?

I hope computer science is the right site to ask this question since I don’t feel it belongs on Network Engineering because it’s too theoretical.

compatibility – How can I transfer photos from an old Canon Rebel EOS 350D to my computer?

Try toggling the Communication setting. Some users report that Print/PTP works for them (confusingly, this is the setting that should be used in order to connect the camera directly to certain Canon printers). Others report that PC connection is the correct setting.

Press the Menu button to bring up the menus. Press the Jump button, or use ◀︎/ buttons, until the Set-up 2 menu (yellow, looks like wrench+hammer “2”) is highlighted. Under Communication, try changing the option (it will be either Print/PTP or PC connection).

Connection menu instruction manual page 120 of Canon EOS 250D User Manual
Taken from page 120 of the Canon EOS 250D User Manual

If that doesn’t work, you will need to use a CompactFlash card reader to get the photos off of the CF card and onto your computer. They can be had for as little at $10 USD at various retailers online.


Sources

Note that because of the age of the camera (it was introduced in 2005), many of the support references are to older versions of Windows.

ios – Google Chrome: Can my organization access my computer if I am signed in?

I am signed into Google Chrome on my personally-owned Mac with a G Suite/Google Workspace account managed by my organization. I was recently looking around in Google Chrome and found this message under chrome://management:

enter image description here

I am wondering what “Activity on this device may also be managed outside of Chrome” means. I don’t want my organization to be able to access anything on my device that I do outside of my work Chrome profile. So:

  1. Can my organization access files on my device?
  2. Can my organization change settings on my device?
  3. Can my organization lock, erase, or geolocate my device?

I am also signed into the Gmail, Docs, Sheets, Slides, Drive, etc. apps on my iPhone. Does this allow my organization to do any of the above?

computer vision – Shape-from-shading algorithms?

Before I go to the effort of writing my own code, I was wondering if there is code available for shape-from-shading algorithms. These take an image (such as a black-and-white image, such as this) and infer the three-dimensional depth map based on the lightness at a point and constraints such as smoothness of the inferred surface, or properties of the light source (e.g., a point source from a known direction).

syntax – Is there a common agreed upon token symbol used in computer science or common across languages?

I have seen tokens like this:

 var message = "Hello, {Name}";

and like this:

 var message = "Hello, ${name}";

and like this:

 var message = "Hello, @NAME";

and a few other styles over the years.

Is there a common or preferred token format, style or character used in creating a set of tokens?

I have tried to used constants, like so,

“The width is WIDTH”

but I ran into problems when I had a token phrase that was contained in another token phrase.

For example, I had WIDTH and PERCENT_WIDTH as tokens. If the string contained both tokens one token could be replaced by the other in the first run through.

So if the token replacement value was 50 and the string was:

“The width of the item is WIDTH. That is PERCENT_WIDTH of the total.”

then I ended up with,

“The width of the item is 50. That is PERCENT_50 of the total.”

It wouldn’t find “PERCENT_WIDTH” because that token string was modified.

So if I replaced the “PERCENT_WIDTH” token first that would solve that problem but as I added more tokens that would increase the chances for errors. So now I’m trying to figure out a recommended token format.

I’m using regex to find and replace matches.

There appears to be no “tokens” topic tag.