Visualizing Intersecting Sets
🧮Information theory
Flag this post
Turning undersea cables into a global monitoring system for seismic and environmental hazards
phys.org·1d
🧮Information theory
Flag this post
//RMC
eazyizzie.dev·2d
👥Pragmatics
Flag this post
Copier Uptime Without the Drama: A Practical Playbook for Offices That Hate Fire Drills
🔧Workflow Automation
Flag this post
European Commission proposal to ‘overhaul the GDPR risks user privacy
blog.lukaszolejnik.com·1d
🧮Information theory
Flag this post
From Lists to Structured Data: A Transformation Guide
haarisekou200207.webbuzzfeed.com·4d
📝NLP
Flag this post
The Secret Power of 6-7
psychologytoday.com·1d
💬Philosophy of Language
Flag this post
The unbearable lightness of getting scammed: Future of full scale cybersecurity
techradar.com·2d
🎲Bayesian Cognition
Flag this post
Evolutionary Optimization Trumps Adam Optimization on Embedding Space Exploration
arxiv.org·2d
🎨Computational Creativity
Flag this post
Dev Journal: This week's progress
✅Productivity
Flag this post
Age modulates the link between stress-related neural activity and mortality
nature.com·2d
🧮Information theory
Flag this post
Announcing “Computational Functionalism Debate” (soliciting paid feedback): Test your intuitions about consciousness
lesswrong.com·1d
💡Cognitive Science
Flag this post
Explore More, Learn Better: Parallel MLLM Embeddings under Mutual Information Minimization
arxiv.org·5d
🔄Transformers
Flag this post
Whisper Leak: A novel side-channel attack on remote language models
microsoft.com·2d
🎲Bayesian Cognition
Flag this post
A diffusion-based multi-modal anomaly detection approach for data communication in TACS
sciencedirect.com·3d
🔧Workflow Automation
Flag this post
Quantum Chip Co-Design for Fidelity and Entanglement Preservation
arxiv.org·2d
🧮Information theory
Flag this post
Loading...Loading more...