You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Greetings. I love what I see here, are you implementing from a specific research paper or is this a home-rolled implementation? I'd love to see some docs on the design/thought process or some statistics about it's false deauths etc. I'd love to use this in a project of mine.
The text was updated successfully, but these errors were encountered:
Greetings. I love what I see here, are you implementing from a specific research paper or is this a home-rolled implementation? I'd love to see some docs on the design/thought process or some statistics about it's false deauths etc. I'd love to use this in a project of mine.
Hi, this is something we've started from scratch. It's part of an ongoing research effort, so pardon me for the lack of documentation. Hope to add some with increasing progress.
Greetings. I love what I see here, are you implementing from a specific research paper or is this a home-rolled implementation? I'd love to see some docs on the design/thought process or some statistics about it's false deauths etc. I'd love to use this in a project of mine.
Hi, this is something we've started from scratch. It's part of an ongoing research effort, so pardon me for the lack of documentation. Hope to add some with increasing progress.
Keep up the good work, you've definitely got a watcher.
Greetings. I love what I see here, are you implementing from a specific research paper or is this a home-rolled implementation? I'd love to see some docs on the design/thought process or some statistics about it's false deauths etc. I'd love to use this in a project of mine.
The text was updated successfully, but these errors were encountered: