Limitations of a two-pass assembler
boston.conman.org·15h
💣Binary Exploitation
Flag this post
Logic Theorist: The program that rewrote the foundations of mathematics
bigthink.com·3h
🎯A* Search
Flag this post
Linkers: A 20 Part Series
💣Binary Exploitation
Flag this post
Using eBPF to attribute packet drops to netfilter rules
developers.redhat.com·1d
💣Binary Exploitation
Flag this post
Cutting LLM Batch Inference Time in Half: Dynamic Prefix Bucketing at Scale
🔄Dynamic Programming
Flag this post
The Geographic Imperative: How CockroachDB Turns Maps into Architecture
hackernoon.com·1d
🎯A* Search
Flag this post
The Riddle of Reflection: Evaluating Reasoning and Self-Awareness in Multilingual LLMs using Indian Riddles
arxiv.org·13h
⏱️Computational Complexity
Flag this post
Finding Non-Redundant Simpson's Paradox from Multidimensional Data
arxiv.org·13h
⏱️Computational Complexity
Flag this post
Hyper Hawkes Processes: Interpretable Models of Marked Temporal Point Processes
arxiv.org·13h
⏱️Computational Complexity
Flag this post
Wordle Solver
λFunctional Programming
Flag this post
Math.random, friend or foe?
λFunctional Programming
Flag this post
Transformer-Based Decoding in Concatenated Coding Schemes Under Synchronization Errors
arxiv.org·13h
λFunctional Programming
Flag this post
Relation-Aware Bayesian Optimization of DBMS Configurations Guided by Affinity Scores
arxiv.org·1d
📈Optimization
Flag this post
MedRECT: A Medical Reasoning Benchmark for Error Correction in Clinical Texts
arxiv.org·13h
λFunctional Programming
Flag this post
Reevaluating Self-Consistency Scaling in Multi-Agent Systems
arxiv.org·13h
⏱️Computational Complexity
Flag this post
Loading...Loading more...