🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
⚡ Circuit Verification

Hardware Formal Methods, FPGA Validation, Logic Synthesis, Digital Design Proofs

About our proof-of-concept LLM tool for navigating Debian's manpages
gwolf.org·10h
🦀Rust Macros
Good binding data is all you need
leashbio.substack.com·22h·
Discuss: Substack
🗂️Vector Databases
Edsger W. Dijkstra on IPW's
cs.utexas.edu·2d·
Discuss: Hacker News
🇷🇺Soviet Computing
Ask HN: – Build Gaming Setup AIO: Steam – GoG – Epic Games – RetroArch – PPSSPP
news.ycombinator.com·7h·
Discuss: Hacker News
🔌Operating system internals
I Accidentaly Wrote a Compile-Time Executable State Machine (2020)
philippegroarke.com·4d·
Discuss: Hacker News
🔗Functional Compilers
Everyone knows what a horse is: What we got wrong about universal translators
nimishg.substack.com·14h·
Discuss: Substack
💻Programming languages
GAIA: Emotional Commerce x Ecological Regeneration: Building with Bolt - WLH Challenge
dev.to·4h·
Discuss: DEV
🦋Format Metamorphosis
Improving Data and Parameter Efficiency of Neural Language Models Using Representation Analysis
arxiv.org·18h
🧮Kolmogorov Complexity
UART VHDL Implementation on FPGA with Host Data Exchange
hackster.io·5d
🔍FPGA Verification
SmartDocs AI - Intelligent Documentation Search with Algolia MCP Server
dev.to·1d·
Discuss: DEV
🌀Brotli Internals
Dollars per token considered harmful
modal.com·1d·
Discuss: Hacker News
💻Local LLMs
Spent the week at one of the top AI research conferences
aol.com·2h·
Discuss: Hacker News
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Xiangqi-R1: Enhancing Spatial Strategic Reasoning in LLMs for Chinese Chess via Reinforcement Learning
arxiv.org·18h
🔲Cellular Automata
Regex Is a 70-Year-Old Dinosaur—Here’s the Modern Alternative
hackernoon.com·15h
🔍RegEx Engines
CRABS: A syntactic-semantic pincer strategy for bounding LLM interpretation of Python notebooks
arxiv.org·18h
💻Programming languages
Which graph motif parameters count?
arxiv.org·18h
🔗Graph Isomorphism
Security Principles for Designing an Unhackable Crypto Wallet
cacm.acm.org·3h
🌳Archive Merkle Trees
Commuting Distance Regularization for Timescale-Dependent Label Inconsistency in EEG Emotion Recognition
arxiv.org·1d
📊Learned Metrics
Continuous Spiking Graph Neural Networks
arxiv.org·2d
🕸️Graph Embeddings
Prompt4Trust: A Reinforcement Learning Prompt Augmentation Framework for Clinically-Aligned Confidence Calibration in Multimodal Large Language Models
arxiv.org·2d
🎙️Whisper
Loading...Loading more...
AboutBlogChangelogRoadmap