Privacy in the Age of the Smartwatch
pratt.duke.eduΒ·1hΒ·
Discuss: Hacker News
πŸ›‘οΈPrivacy Engineering
Flag this post
Pool allocator in C++23 for simulations / game engines - faster than std::pmr
github.comΒ·17hΒ·
Discuss: r/programming
πŸ’ΎMemory Allocators
Flag this post
PolyForm Noncommercial 2.0.0-pre.2
writing.kemitchell.comΒ·1dΒ·
Discuss: Hacker News
🌐Open Source
Flag this post
Video Invisible Watermarking at Scale
engineering.fb.comΒ·2dΒ·
Discuss: Hacker News
🎬WebCodecs
Flag this post
Show HN: When 7 Codex Agents Sent Each Other 1k Messages over 2 Days
dicklesworthstone.github.ioΒ·9hΒ·
Discuss: Hacker News
πŸ”­Tracing
Flag this post
Protecting Against Open-Source Malicious Packages: What Doesn't Work
xygeni.ioΒ·21hΒ·
Discuss: Hacker News
πŸ“¦Package Managers
Flag this post
Ranking LLMs based on 180k French votes (French government's AI arena)
comparia.beta.gouv.frΒ·2dΒ·
πŸ”’Homomorphic Encryption
Flag this post
Flatpak Happenings
blog.sebastianwick.netΒ·1dΒ·
πŸ“„FlatBuffers
Flag this post
Dive into Systems
diveintosystems.orgΒ·3dΒ·
Discuss: Hacker News
βš™οΈSystems Programming
Flag this post
Fantastic (small) Retrievers and How to Train Them: mxbai-edge-colbert-v0 TechReport
paperium.netΒ·5hΒ·
Discuss: DEV
πŸ“±Edge AI
Flag this post
Distributed Media Inferencing with Kafka
dev.toΒ·11hΒ·
Discuss: DEV
🌊Stream Processing
Flag this post
Awakening Sleeping Beauties from articles on mRNA vaccines against COVID-19
arxiv.orgΒ·2h
😴Sleep Science
Flag this post
Show HN: I'm open sourcing my Chrome extension that uses AI to modify websites
github.comΒ·1dΒ·
Discuss: Hacker News
🧩Browser Extensions
Flag this post
EQ-Negotiator: Dynamic Emotional Personas Empower Small Language Models for Edge-Deployable Credit Negotiation
arxiv.orgΒ·1d
πŸ“±Edge AI
Flag this post
Computer Science Fundamentals: From Binary Systems to Algorithms
dev.toΒ·2dΒ·
Discuss: DEV
🌳Data Structures
Flag this post
Approximation by Certain Complex Nevai Operators : Theory and Applications
arxiv.orgΒ·2d
πŸ“Linear Algebra
Flag this post
Online Learning to Rank under Corruption: A Robust Cascading Bandits Approach
arxiv.orgΒ·1d
πŸ•ΈοΈGraph Theory
Flag this post