Privacy is Value.v2. the Swordsman, the Mage, the Drake, and capturing the 7th Capital
sync.soulbis.com·1d
⚡Fusion Laws
Flag this post
Dangerous Logic - De Morgan & Programming
i-programmer.info·4d
🧩Constraint Logic
Flag this post
System Practice: Coherence Game
🔶Lattice Theory
Flag this post
Longreads + Open Thread
thediff.co·15h
📮Message Queues
Flag this post
A mathematical certification for positivity conditions in Neural Networks with applications to partial monotonicity and Trustworthy AI
arxiv.org·2d
🔍ML Language
Flag this post
Anthropic Research Shows How LLMs Perceive Text via @sejournal, @martinibuster
searchenginejournal.com·2d
🔍ML Language
Flag this post
Building a Production-Ready Enterprise AI Assistant with RAG and Security Guardrails
🛡️Parser Security
Flag this post
Thought Engineering
🪜Recursive Descent
Flag this post
The Epistemic Suite: A Post-Foundational Diagnostic Methodology for Assessing AI Knowledge Claims
arxiv.org·3d
🔮Metacircular Evaluators
Flag this post
My first fifteen compilers (2019)
🔬Nanopasses
Flag this post
Let Hypothesis Break Your Python Code Before Your Users Do
towardsdatascience.com·1d
🎲Property Testing
Flag this post
How I Use Every Claude Code Feature
🎯99-Line Tools
Flag this post
GIR-Bench: Versatile Benchmark for Generating Images with Reasoning
🗺️Region Polymorphism
Flag this post
StreetMath: Study of LLMs' Approximation Behaviors
arxiv.org·2d
🌱Minimal ML
Flag this post
How Tools Shape How We See the World
every.to·10h
🎮Language Ergonomics
Flag this post
Is 'human' a risky AGI target
✨Effect Inference
Flag this post
Loading...Loading more...