I Tried Beating LeetCode Like a Game. It Actually Worked.
dev.to·23h·
Discuss: DEV
λFunctional Programming
Flag this post
Beyond Brute Force: 4 Secrets to Smaller, Smarter, and Dramatically Cheaper AI
hackernoon.com·4h
⏱️Computational Complexity
Flag this post
TOPol: Capturing and Explaining Multidimensional Semantic Polarity Fields and Vectors
arxiv.org·2d
🕸️Graph Theory
Flag this post
How Distributed ACID Transactions Work in TiDB
pingcap.com·1d
📊Data Structures
Flag this post
My first fifteen compilers (2019)
blog.sigplan.org·23h·
Discuss: Hacker News
λFunctional Programming
Flag this post
Automated High-Throughput Mutational Burden Assessment & Stratification via Spectral Graph Convolutional Networks
dev.to·19h·
Discuss: DEV
🕸️Graph Theory
Flag this post
The Python Coding Stack: And Now You Know Your ABC
thepythoncodingstack.com·6h
💻programming
Flag this post
Chatbots, My Rules of Engagement
christophedujarric.com·13h·
Discuss: Hacker News
⏱️Computational Complexity
Flag this post
Structurally Valid Log Generation using FSM-GFlowNets
arxiv.org·1d
λFunctional Programming
Flag this post
Down with template (or not)!
cedardb.com·1d
λFunctional Programming
Flag this post
Secure Onion Encryption and the Case of Counter Galois Onion
eprint.iacr.org·2d
λFunctional Programming
Flag this post
Evidence on language model consciousness
lesswrong.com·15h
λFunctional Programming
Flag this post
An underqualified reading list about the transformer architecture
fvictorio.github.io·2d·
Discuss: Hacker News
⏱️Computational Complexity
Flag this post
Research roundup: 6 cool science stories we almost missed
arstechnica.com·3h
⏱️Computational Complexity
Flag this post
Hacktoberfest Final Week
dev.to·1d·
Discuss: DEV
λFunctional Programming
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
dev.to·1d·
Discuss: DEV
📈Optimization
Flag this post
Show HN: Fast-posit, sw implementation of posit arithmetic in Rust
github.com·2d·
Discuss: Hacker News
🔢mathmemathics
Flag this post
Demystifying Normalization in RDBMS: From 1NF to 3NF
dev.to·10h·
Discuss: DEV
🔁Recursion
Flag this post
Books for Robots (Only)
jmadden.org·2h·
Discuss: Hacker News
🔄Dynamic Programming
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·1d
💣Binary Exploitation
Flag this post