When we can verify a person but recognize nothing–what are we authenticating?
syntheticauth.ai·1d·
Discuss: Hacker News
📼Cassette Hacking
FuriosaAI: Takes Aim at Nvidia GPUs with Tensor Contraction Architecture
hpcwire.com·6h·
Discuss: Hacker News
🖥️Modern Terminals
Cat: Post-training quantization error reduction via cluster-based affine transformation
arxiv.org·2d
📊Quantization
POVQA: Preference-Optimized Video Question Answering with Rationales for Data Efficiency
arxiv.org·1d
📊Rate-Distortion Theory
lukas-blecher/LaTeX-OCR
github.com·1d
👁️Constructive OCR
Detoxifying Large Language Models via Autoregressive Reward Guided Representation Editing
arxiv.org·9h
💻Local LLMs
Fine-Tuning Flow Matching via Maximum Likelihood Estimation of Reconstructions
arxiv.org·9h
📊Quantization
Domain-Aware Hyperdimensional Computing for Edge Smart Manufacturing
arxiv.org·2d
SMT Integration
Think Right: Learning to Mitigate Under-Over Thinking via Adaptive, Attentive Compression
arxiv.org·9h
🧠Intelligence Compression
SCOPED: Score-Curvature Out-of-distribution Proximity Evaluator for Diffusion
arxiv.org·9h
📊Learned Metrics
Foremost, Fastest, Shortest: Temporal Graph Realization under Various Path Metrics
arxiv.org·9h
🕸️Network Topology
Data Quality Taxonomy for Data Monetization
arxiv.org·1d
🔗Data Provenance
Learning Time-Series Representations by Hierarchical Uniformity-Tolerance Latent Balancing
arxiv.org·9h
🧠Machine Learning
NPN: Non-Linear Projections of the Null-Space for Imaging Inverse Problems
arxiv.org·9h
🌀Riemannian Computing
Building High-Performance TCP Servers in Go: Custom Binary Protocols for Ultra-Low Latency Applications
dev.to·1d·
Discuss: DEV
🌊Streaming Systems
Anatomy-DT: A Cross-Diffusion Digital Twin for Anatomical Evolution
arxiv.org·2d
🌀Differential Geometry
Representational Alignment Across Model Layers and Brain Regions with Hierarchical Optimal Transport
arxiv.org·9h
🧠Neural Codecs
Variational Secret Common Randomness Extraction
arxiv.org·9h
🧮Kolmogorov Complexity