Probabilistic Structures, False Positive Rates, Cuckoo Filters, Counting Filters

The Horton-Strahler number of butterfly trees
arxiv.org·5h
🧮Kolmogorov Bounds
Hyper-Specific Sub-Field: **Fuzzing for IoT Firmware Reverse Engineering**
dev.to·7h·
Discuss: DEV
🧪Binary Fuzzing
Semantic Dictionary Encoding
falvotech.com·18h·
Discuss: Hacker News
🌀Brotli Dictionary
Linkage
11011110.github.io·16h
📐Linear Algebra
Is IP fragmentation still considered vulnerable?
blog.apnic.net·7h
🌐DNS Security
Topological Sort: Managing Mutable Structures in Haskell
mmhaskell.com·1d
🔗Topological Sorting
I built an interactive bloom filter visual simulator so you can understand this data structure better
coffeebytes.dev·6d·
🌸Bloom Filters
VulAgent: Hypothesis-Validation based Multi-Agent Vulnerability Detection
arxiv.org·5h
Proof Automation
MAUI: Reconstructing Private Client Data in Federated Transfer Learning
arxiv.org·5h
🔒Privacy Archives
Sound Statistical Model Checking for Probabilities and Expected Rewards (extended version)
arxiv.org·1d
🎯Performance Proofs
Mathematics Discovering Its Consciousness: Lasso Estimator as Cosmic Backdoor
zakelfassi.com·1d·
Discuss: Hacker News
🧮Kolmogorov Complexity
LLM Rerankers for RAG: A Practical Guide
fin.ai·1d·
🔍Information Retrieval
Rendezvous Hashing Explained (2020)
randorithms.com·13h·
🌐Distributed Hash
A Slotted Hash Cons for Alpha Invariance
philipzucker.com·14h·
Discuss: Hacker News
λLambda Encodings
LLM-Based Instance-Driven Heuristic Bias In the Context of a Biased Random Key Genetic Algorithm
arxiv.org·1d
💻Programming languages
A Visual Guide to Tuning Gradient Boosted Trees
towardsdatascience.com·14h
🧠Intelligence Compression
BiLSTM-VHP: BiLSTM-Powered Network for Viral Host Prediction
arxiv.org·5h
🧮Kolmogorov Complexity
SpecVLM: Fast Speculative Decoding in Vision-Language Models
arxiv.org·5h
Information Bottleneck
ECMAScript TC39 proposal-pattern-matching
github.com·19h·
Discuss: Hacker News
🔤Type Theory