How did we cope? (an ode to 8-bits)
aardvark.co.nz¡1d
đŸ•šī¸Retro Gaming
Flag this post
A functional programming course in 6 books
ericnormand.substack.com¡19h¡
Discuss: Substack
đŸ§ŦFunctional Programming
Flag this post
All Hail The OC71
hackaday.com¡21h
🔌Operating system internals
Flag this post
Generalized Top-k Mallows Model for Ranked Choices
arxiv.org¡2d
🧠Learned Indexing
Flag this post
Corpus Frequencies in Morphological Inflection: Do They Matter?
arxiv.org¡2d
🔤Morphological Analysis
Flag this post
Automated Knowledge Distillation for Enhanced Heterogeneous Sensor Fusion in Autonomous Navigation
dev.to¡4h¡
Discuss: DEV
🌀Differential Geometry
Flag this post
Transformers for Unseen Patterns: Bayesian Clustering Reimagined
dev.to¡18h¡
Discuss: DEV
🌊Spectral Clustering
Flag this post
GIFT: Group-relative Implicit Fine Tuning Integrates GRPO with DPO and UNA
arxiv.org¡1d
⚡Z3 Optimization
Flag this post
The Epistemic Suite: A Post-Foundational Diagnostic Methodology for Assessing AI Knowledge Claims
arxiv.org¡1h
đŸ—ēī¸Competency Maps
Flag this post
ReForm: Reflective Autoformalization with Prospective Bounded Sequence Optimization
arxiv.org¡1d
đŸ’ģProgramming languages
Flag this post
Correlation Dimension of Auto-Regressive Large Language Models
arxiv.org¡3d
🧠Machine Learning
Flag this post
Improving Visual Discriminability of CLIP for Training-Free Open-Vocabulary Semantic Segmentation
arxiv.org¡1d
📊Learned Metrics
Flag this post
Energy-Efficient UAV-Enabled MEC Systems: NOMA, FDMA, or TDMA Offloading?
arxiv.org¡2d
â„šī¸Information Theory
Flag this post
Artificial Intelligence Based Predictive Maintenance for Electric Buses
arxiv.org¡1d
🧠Machine Learning
Flag this post
Abjad AI at NADI 2025: CATT-Whisper: Multimodal Diacritic Restoration Using Text and Speech Representations
arxiv.org¡1d
đŸŽ™ī¸Whisper
Flag this post
What Are People's Actual Utility Functions in Budget Aggregation?
arxiv.org¡1h
🤝Consensus Networks
Flag this post
Privacy-Aware Federated nnU-Net for ECG Page Digitization
arxiv.org¡2d
🔐Homomorphic Encryption
Flag this post