LiveNews.co.nz | Page 1044
livenews.co.nzยท1d
๐Ÿ“กErlang BEAM
Data Seeps Out of Us (furialog)
furia.comยท19h
๐Ÿ indieweb
Is IP fragmentation still considered vulnerable?
blog.apnic.netยท1d
๐Ÿ“กProtocol Stacks
Nunchuk founder, Hugo, on filter debate: Believe in PoW
stacker.newsยท1dยท
Discuss: X
๐Ÿ”„Deduplication
User Agreement
accesswdun.comยท1d
๐Ÿ”Ownership Types
Bitrig's Swift Interpreter: From Code to Bytecode
bitrig.appยท18hยท
Discuss: Hacker News
๐Ÿฆ‰Swift Interpreters
System Instruction Fixed Point
funcall.blogspot.comยท16hยท
๐Ÿ’ฌInteractive REPLs
Myth Busting: Why "Innocent Clicks" Don't Exist in Cybersecurity
unit42.paloaltonetworks.comยท12h
๐Ÿ›ก๏ธParser Security
Fundamental limits on taming infectious disease epidemics
arxiv.orgยท1d
๐Ÿง Memory Models
Typescript : Generic Data Fetch
dev.toยท1dยท
Discuss: DEV
๐Ÿ”งAPI Design
Ancient Scripts, Modern AI: Bridging the Divide with Morphology-Aware Tokenization by Arvind Sundararajan
dev.toยท3dยท
Discuss: DEV
โšกTokenizer Benchmarks
Large Language Models for One-Day Vulnerability Detection
dev.toยท15hยท
Discuss: DEV
๐ŸŽฒParser Fuzzing
Leveraging Large Language Models to Effectively Generate Visual Data for Canine Musculoskeletal Diagnoses
arxiv.orgยท7h
๐ŸŒฑMinimal ML
How to Quickly Buy Old Github Account in 2025
dev.toยท16hยท
Discuss: DEV
๐Ÿ”’Rust Borrowing
Chronon: A data platform for serving for AI/ML applications
github.comยท12hยท
Discuss: Hacker News
๐Ÿ“‹JSON Parsing
AQUA: Attention via QUery mAgnitudes for Memory and Compute Efficient Inference in LLMs
arxiv.orgยท1d
๐Ÿ”ML Language
Evaluating LLM Alignment on Personality Inference from Real-World Interview Data
arxiv.orgยท7h
๐ŸชœRecursive Descent
Transformer Architecture
dev.toยท1dยท
Discuss: DEV
๐ŸชœRecursive Descent
iShot_2.6.4.dmg
xmac.appยท19h
๐Ÿ“ฆExecutable Size