vault backup: 2025-07-24 09:38:58
This commit is contained in:
parent
00d4f26797
commit
761139a02f
2
.obsidian/graph.json
vendored
2
.obsidian/graph.json
vendored
@ -39,6 +39,6 @@
|
||||
"repelStrength": 20,
|
||||
"linkStrength": 0.723958333333333,
|
||||
"linkDistance": 30,
|
||||
"scale": 0.3003387451171875,
|
||||
"scale": 0.13348388671875,
|
||||
"close": true
|
||||
}
|
||||
@ -29,7 +29,7 @@
|
||||
{"id":"8af915dccc8e1757","type":"file","file":"Literature Notes/Differential neural networks for robust nonlinear control - identification, state estimation and trajectory tracking.md","x":240,"y":1660,"width":400,"height":400,"color":"1"},
|
||||
{"id":"034773fb85df43e9","type":"file","file":"Literature Notes/Safe Reinforcement Learning via Shielding under Partial Observability.md","x":-200,"y":-183,"width":520,"height":363,"color":"1"},
|
||||
{"id":"1b0680305c662125","type":"file","file":"Literature Notes/Safe Reinforcement Learning via Shielding.md","x":-200,"y":670,"width":520,"height":330,"color":"3"},
|
||||
{"id":"0655d596e2c1bd88","x":-1242,"y":100,"width":400,"height":400,"color":"3","type":"file","file":"Literature Notes/Reluplex - An Efficient SMT Solver for Verifying Deep Neural Networks.md"}
|
||||
{"id":"0655d596e2c1bd88","type":"file","file":"Literature Notes/Reluplex - An Efficient SMT Solver for Verifying Deep Neural Networks.md","x":-1242,"y":100,"width":400,"height":400,"color":"3"}
|
||||
],
|
||||
"edges":[
|
||||
{"id":"766a32fa431c6398","fromNode":"bcc9c2b5dc701338","fromSide":"bottom","toNode":"bac68ab8fa2c1c9b","toSide":"top","color":"2"},
|
||||
|
||||
@ -13,8 +13,11 @@ savior but they don't really address a lot of the cybersecurity concerns of
|
||||
remote operation.
|
||||
|
||||
**Contributions:**
|
||||
Someone had to say the obvious that less control rooms will be less expensive
|
||||
to operate.
|
||||
|
||||
**Clarity:**
|
||||
Mediocre writing.
|
||||
|
||||
# Second Pass
|
||||
**What is the main thrust?**
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user