understanding LSM trees via read, write, and space amplification
bitsxpages.com·8h
A Novel Side-channel Attack That Utilizes Memory Re-orderings (U. of Washington, Duke, UCSC et al.)
semiengineering.com·12h
SplittingSecrets: A Compiler-Based Defense for Preventing Data Memory-Dependent Prefetcher Side-Channels
arxiv.org·1d
Least Recently Used Cache
agentultra.com·9h
FlashAttention 4: Faster, Memory-Efficient Attention for LLMs
digitalocean.com·19h
Agentic Memory
dolthub.com·7h
Hippocampus model implementing a Turing machine
pub.towardsai.net·3h
datahaven-xyz/datahaven: An EVM compatible Substrate chain, powered by StorageHub and secured by EigenLayer
github.com·5h
A distributed systems reliability glossary
antithesis.com·2d
Experiments on Reward Hacking Monitorability in Language Models
lesswrong.com·2h
Loading...Loading more...