understanding LSM trees via read, write, and space amplification
bitsxpages.com·7h
A Novel Side-channel Attack That Utilizes Memory Re-orderings (U. of Washington, Duke, UCSC et al.)
semiengineering.com·11h
SplittingSecrets: A Compiler-Based Defense for Preventing Data Memory-Dependent Prefetcher Side-Channels
arxiv.org·1d
Least Recently Used Cache
agentultra.com·9h
FlashAttention 4: Faster, Memory-Efficient Attention for LLMs
digitalocean.com·18h
Agentic Memory
dolthub.com·6h
A distributed systems reliability glossary
antithesis.com·2d
Hippocampus model implementing a Turing machine
pub.towardsai.net·2h
datahaven-xyz/datahaven: An EVM compatible Substrate chain, powered by StorageHub and secured by EigenLayer
github.com·4h
Experiments on Reward Hacking Monitorability in Language Models
lesswrong.com·1h
Loading...Loading more...