Linux Kernel Ported to WebAssembly
๐ธ๏ธWebAssembly
Flag this post
zFLoRA: Zero-Latency Fused Low-Rank Adapters
arxiv.orgยท4d
๐๏ธLLVM
Flag this post
Sam Altman's track record of manipulation: some quotes from Karen Hao's "Empire of AI"
lesswrong.comยท16h
๐Hardware Security
Flag this post
Spending Less by Doing More
lesswrong.comยท1d
๐File Systems
Flag this post
FOCUS: Efficient Keyframe Selection for Long Video Understanding
arxiv.orgยท1d
๐คAI
Flag this post
Human Values โ  Goodness
lesswrong.comยท1d
๐Hardware Security
Flag this post
Dual-Stream Diffusion for World-Model Augmented Vision-Language-Action Model
arxiv.orgยท1d
๐คAI
Flag this post
"Koyi Sawaal Nahi Hai": Reimagining Maternal Health Chatbots for Collective, Culturally Grounded Care
arxiv.orgยท1d
๐กNetwork Protocols
Flag this post
Thought Branches: Interpreting LLM Reasoning Requires Resampling
arxiv.orgยท1d
๐๏ธLLVM
Flag this post
Engineering Social Optimality via Utility Shaping in Non-Cooperative Games under Incomplete Information and Imperfect Monitoring
arxiv.orgยท4d
๐Distributed Systems
Flag this post
LLM-generated text is not testimony
lesswrong.comยท3d
๐๏ธLLVM
Flag this post
Multi-Representation Attention Framework for Underwater Bioacoustic Denoising and Recognition
arxiv.orgยท1d
๐ฏ๏ธCandle
Flag this post
Reasoning Curriculum: Bootstrapping Broad LLM Reasoning from Math
arxiv.orgยท4d
๐ฆพRust ML
Flag this post
Neither Consent nor Property: A Policy Lab for Data Law
arxiv.orgยท4d
๐งฎLinear Algebra
Flag this post
Using Salient Object Detection to Identify Manipulative Cookie Banners that Circumvent GDPR
arxiv.orgยท1d
๐ฆพRust ML
Flag this post
Secretly Loyal AIs: Threat Vectors and Mitigation Strategies
lesswrong.comยท3d
๐Hardware Security
Flag this post
Model welfare and open source
lesswrong.comยท2d
๐ฎGame Engines
Flag this post
Loading...Loading more...