cpt's Top FindsLoading...
photographer suzanne jongmans recreates renaissance portraits using packaging materials
designboom.com·12h
Can't Recall the Syntax? Try These WYSIWYG Markdown Editors on Linux
itsfoss.com·2d
Nobel Prize in Chemistry 2025
nobelprize.org·12h·
Discuss: Hacker News
How To Start Bug Bounties (2021)
ozguralp.medium.com·7h·
Discuss: Hacker News
Windows 3.1 in a Windows 95 Virtual Machine (2022)
geoffchappell.com·3d·
Discuss: Hacker News
💾vintage computing
New AWS whitepaper: Security Overview of Amazon EKS Auto Mode
aws.amazon.com·1d
Operationalizing Data Minimization for Privacy-Preserving LLM Prompting
arxiv.org·1d
📐Language Theory
Assessment Twins: A Protocol for AI-Vulnerable Summative Assessment
arxiv.org·2d
📐Language Theory
TROLL: Trust Regions improve Reinforcement Learning for Large Language Models
arxiv.org·1d
AgentCaster: Reasoning-Guided Tornado Forecasting
arxiv.org·1d
SoK: Kicking CAN Down the Road. Systematizing CAN Security Knowledge
arxiv.org·2d
🌐Network Protocols
Sign up or login to customize your feed and get personalized topic recommendations
NS-Pep: De novo Peptide Design with Non-Standard Amino Acids
arxiv.org·1d
More Than Meets the Eye? Uncovering the Reasoning-Planning Disconnect in Training Vision-Language Driving Models
arxiv.org·1d
Compressed Convolutional Attention: Efficient Attention in a Compressed Latent Space
arxiv.org·1d
⚙️Compilers
Progressive Bound Strengthening via Doubly Nonnegative Cutting Planes for Nonconvex Quadratic Programs
arxiv.org·2d
⚙️Compilers
Wave-PDE Nets: Trainable Wave-Equation Layers as an Alternative to Attention
arxiv.org·1d
A Fixed Point Framework for the Existence of EFX Allocations
arxiv.org·1d