Dimensional Analysis in Programming Languages (2018)
gmpreussner.com·2d·
Discuss: Hacker News
🔢Algebraic Datatypes
Property-based testing of batch-invariant operations
mmaaz.ca·2d·
Discuss: Hacker News
🎲Property Testing
Highly concurrent in-memory counter in GoLang
engineering.grab.com·2d
🧠Memory Models
What happened to Longcat models? Why are there no quants available?
huggingface.co·1d·
Discuss: r/LocalLLaMA
Gleam
We built AI to split the monolith
engineering.monday.com·1d·
Discuss: Hacker News
🎭Program Synthesis
Custom AI Solutions vs Off-the-Shelf AI: Which Is Right for You?
clickittech.com·3d·
Discuss: DEV
🎭Program Synthesis
**Netflix Movie Recommendation using Multi-Armed Bandit Algo
dev.to·16h·
Discuss: DEV
🔍Search Algorithms
Google strengthens use of AI for cyber defense
techzine.eu·22h
🎭Program Synthesis
r/LLMleaderboard
reddit.com·18h·
🏠indieweb
AI-Driven Predictive Maintenance for ECDIS Utilizing Bayesian Filtering and Stochastic Optimization
dev.to·1d·
Discuss: DEV
🚂Error Propagation
POEM: Explore Unexplored Reliable Samples to Enhance Test-Time Adaptation
arxiv.org·1d
Effect Inference
Learning from Failures: Understanding LLM Alignment through Failure-Aware Inverse RL
arxiv.org·4h
🪜Recursive Descent
MindsDB Knowledge Bases: Revolutionizing AI-Powered Data Queries with SQL Algebra
dev.to·1d·
Discuss: DEV
🎓Educational Databases
MT-DAO: Multi-Timescale Distributed Adaptive Optimizers with Local Updates
arxiv.org·4h
Partial Evaluation
Python + EVM without the paper cuts: a senior playbook for fast, correct, and scalable reads
dev.to·1d·
Discuss: DEV
🌐Network Protocols
Explainable but Vulnerable: Adversarial Attacks on XAI Explanation in Cybersecurity Applications
arxiv.org·1d
🛡️Security Type Systems