Dimensional Analysis in Programming Languages (2018)
gmpreussner.com·2d·
Discuss: Hacker News
🔢Algebraic Datatypes
Property-based testing of batch-invariant operations
mmaaz.ca·2d·
Discuss: Hacker News
🎲Property Testing
From Word2Vec to LLM2Vec: How to Choose the Right Embedding Model for RAG
milvus.io·5d
📊LR Parsing
Drop #714 (2025-10-06): Monday Morning Grab Bag
dailydrop.hrbrmstr.dev·1d
💬Smalltalk VMs
We built AI to split the monolith
engineering.monday.com·1d·
Discuss: Hacker News
🎭Program Synthesis
Custom AI Solutions vs Off-the-Shelf AI: Which Is Right for You?
clickittech.com·3d·
Discuss: DEV
🎭Program Synthesis
**Netflix Movie Recommendation using Multi-Armed Bandit Algo
dev.to·18h·
Discuss: DEV
🔍Search Algorithms
Google strengthens use of AI for cyber defense
techzine.eu·1d
🎭Program Synthesis
Reasonable Link Management (shortener) Service
dev.to·54m·
Discuss: DEV
🏠indieweb
r/LLMleaderboard
reddit.com·20h·
🏠indieweb
AI-Driven Predictive Maintenance for ECDIS Utilizing Bayesian Filtering and Stochastic Optimization
dev.to·1d·
Discuss: DEV
🚂Error Propagation
POEM: Explore Unexplored Reliable Samples to Enhance Test-Time Adaptation
arxiv.org·1d
Effect Inference
Learning from Failures: Understanding LLM Alignment through Failure-Aware Inverse RL
arxiv.org·6h
🪜Recursive Descent
MindsDB Knowledge Bases: Revolutionizing AI-Powered Data Queries with SQL Algebra
dev.to·1d·
Discuss: DEV
🎓Educational Databases
MT-DAO: Multi-Timescale Distributed Adaptive Optimizers with Local Updates
arxiv.org·6h
Partial Evaluation
Python + EVM without the paper cuts: a senior playbook for fast, correct, and scalable reads
dev.to·1d·
Discuss: DEV
🌐Network Protocols
Explainable but Vulnerable: Adversarial Attacks on XAI Explanation in Cybersecurity Applications
arxiv.org·1d
🛡️Security Type Systems