262 total results found
This is a spot where i will keep track of the infrastructure changes that I make as a way to cata...
Methods for building twitter-specific sentiment lexicon
Using mutual information This page has quite a bit of information regarding how the mutual infor...
Cloning a Repository
This chapter discusses how to clone a repository. This is most likely the first thing one will do...
This is an excellent alias for git hist to add to your .gitconfig file git log --pretty=format:"...
The Guided Git Tutorial is an invaluable resource for learning how to effectively use git. This c...
One of the most powerful functionalities provided by git is the checkout functionality. This com...
Redirect traffic using iptables
HOST_PORT=3230 PUBLIC_IP=192.168.1.150 CONT_PORT=22 CONT_IP=10.121.80.77 sudo iptables -t n...
Make lxd container accessible outside of host machine
The default network connector type is a bridged connector and as such does not allow for outside ...
How to control turbo boost inside the operating system
If you would like to control whether turbo boost is allowed from within linux instead of using th...
lxc container setup
I prefer to purge openssh-server and then reinstall it as the default config requires preshared k...
The sun set on a dead end job. Just dark. I worked for that job. I gave for that paycheck. The mo...
Goals: I want to have a way to store my files for machines that are ephemeral For example, im...
Comparison of two-side MI
As mentioned in Methods for building twitter-specific sentiment lexicon there are two general way...
Run docker container inside of lxc container
Create an unprivleged container with nesting turned on Run docker containers as normal
Containers on IU supercomputers
Karst, Carbonate and Big Red II have the singularity package available which allows users to run ...
Carbonate node: 710.223 GFLOPS on intel mkl linpack If you need to get 32GB of VRAM on Carbonate...
ClingDing Spring 2019
January 23rd Coffee @ Pourhouse January 30th NACLO grading party February 6th Co...
Cross validation character n-grams tfidf F1-score Task A 0.6440953412784399 preci...
Lock packages in zypper
To prevent updates to packages in zypper, you can use the al command to add a lock. sudo zypper ...
Implement sentiment value creator with fit() and transform(). Integrate corenlpSentimentAnalyze...
Practical Tools for Computational Linguistics
This book is a work in progress. It details pieces of tech that are necessary for Computational L...
Weekly research goals
Swahili Dependency Treebank Creation
This describes my thesis research and related research surrounding the creation of a universal de...
Malicious language detection
Luyia tagging project
This is my web parser written in julia using the genie framework
Git is an invaluable tool to programmers and computational linguists alike. Version control is a ...
Deep Speech decoder breakdown
I'll put little lessons I learn here.
This is an irony/sarcasm detection project working with the tweets I collected earlier this year....
These are plans for purchases and infrastructure changes
This describes some information about the super computer tools that are available at IU as well a...
I'm developing a parser for the L203 classes that can be fed rules
Installing matrix-synapse on pypy
sudo apt install virtualenv virtualenv -p ./pypy3 ~/synapse/env source ~/synapse/env/bin/activa...