Inverting matrices and bilinear functions
johndcook.com·17h
📐Linear Algebra
Do Nothing
blog.tanyakhovanova.com·17h
λLambda Encodings
I Replaced My Toaster's Firmware and Now I'm a Fugitive
jxself.org·2d
🔓Hacking
My (Retro) Desk Setup in 2025
brainbaking.com·17h
💾vintage computing
13th October – Threat Intelligence Report
research.checkpoint.com·2h
🔓Hacking
Self Hosting Nightscout on Raspberry Pi
broderic.blog·1d·
Discuss: Hacker News
🔌Single Board PC
Godot Ruined My Sense of Speed
daymare.net·13h·
🎮Game Decompilation
Can an LLM Be a Black-Box Optimizer?
posgeo.wordpress.com·2d·
Discuss: Hacker News
🧮Kolmogorov Bounds
FoBE IDEA Mesh Tracker C1 – An nRF52840-based LoRa GPS tracker with sensors, OLED, knob, and more
cnx-software.com·2d
🔌Single Board PC
Advanced Multiphase Flow Characterization via Hybrid Acoustic-Optical Tomography
dev.to·1d·
Discuss: DEV
🏺Computational Archaeology
InferenceMAX – open-source Inference Frequent Benchmarking
github.com·2d·
Discuss: Hacker News
Performance Mythology
GNN Blind Spots: The Hidden Cost of Powerful Graph Models
dev.to·2d·
Discuss: DEV
🕸️Graph Embeddings
Hierarchical Scheduling for Multi-Vector Image Retrieval
arxiv.org·6h
🧮Vector Embeddings
🚀 From Rejection to Reinvention: How I Built an AI That Finds My Jobs
dev.to·2d·
Discuss: DEV
🇨🇳Chinese Computing
On knot detection via picture recognition
arxiv.org·4d
🕸️Algebraic Topology
Randomized Quantum Singular Value Transformation
arxiv.org·4d
⚛️Quantum Circuits
Why People Say “F*** LeetCode”: Difficulty, Fairness, Real-World Value — and a Better Way
dev.to·4d·
Discuss: DEV
📏Code Metrics
Enhancing Automotive Security with a Hybrid Approach towards Universal Intrusion Detection System
arxiv.org·5d
🔍Vector Forensics
Automated Design of Peptide-Based Drug Candidates via Constrained Generative Adversarial Networks
dev.to·2d·
Discuss: DEV
🔍Vector Forensics