Why Bcrypt Can Be Unsafe for Password Hashing?
blog.enamya.me·1h·
Discuss: Hacker News
#️⃣Hash Tables
Flag this post
What does the ideal information environment look like?
defenderofthebasic.substack.com·2d·
Discuss: Substack
🔀Procedural Generation
Flag this post
🧠 Beyond ChatGPT: The Silent Birth of Conscious AI
future.forem.com·7h·
Discuss: DEV
💬Prompt Engineering
Flag this post
DNS downing clouds is boring: IBM Cloud is experiencing a quantum computer outage
theregister.com·6d·
Discuss: Hacker News
🐝Cilium
Flag this post
Benchmarking the cost of Java's EnumSet - A Second Look
kinnen.de·1d·
📏Linear Types
Flag this post
Physicists Create a Thermometer for Measuring ‘Quantumness’
wired.com·3d·
Discuss: Hacker News
🔢Homomorphic Encryption
Flag this post
Detailed Technical Documentation on AI Implementation Logic (Taking Large Language Models as an Example )
nbtab.com·1d·
Discuss: DEV
📱Edge AI
Flag this post
📢 New Series: Neuro-Symbolic Wednesday
dev.to·14h·
Discuss: DEV
🤖Transformers
Flag this post
A Comparative Study of Hybrid Post-Quantum Cryptographic X.509 Certificate Schemes
arxiv.org·1d
📦Protocol Buffers
Flag this post
Logic-informed reinforcement learning for cross-domain optimization of large-scale cyber-physical systems
arxiv.org·1d
💬Prompt Engineering
Flag this post
MemSearcher: Training LLMs to Reason, Search and Manage Memory via End-to-End Reinforcement Learning
arxiv.org·18h
💬Prompt Engineering
Flag this post
Why Logic Isn't as Objective as You Think
dev.to·17h·
Discuss: DEV
💫Effect Systems
Flag this post
Incremental Selection of Most-Filtering Conjectures and Proofs of the Selected Conjectures
arxiv.org·1d
🌸Bloom Filters
Flag this post
Optimizing Thin-Film Deposition via Adaptive Q-Learning for E-Beam Evaporation
dev.to·1d·
Discuss: DEV
🎯Reinforcement Learning
Flag this post
Writing an LLM from scratch, part 27 – what's left, and what's next?
gilesthomas.com·1d·
Discuss: Hacker News
💬Prompt Engineering
Flag this post
Quantum-Resistant Federated Learning with Lattice-Based Homomorphic Encryption for Edge AI Systems
dev.to·5d·
Discuss: DEV
🔢Homomorphic Encryption
Flag this post
Two-Parameter R\'enyi Information Quantities with Applications to Privacy Amplification and Soft Covering
arxiv.org·18h
📊Information Theory
Flag this post
Automated Cost-Benefit Analysis for Synthetic Biology Gene Synthesis Services
dev.to·5h·
Discuss: DEV
🎭Program Synthesis
Flag this post