Fast Matrix Multiply on an Apple GPU
percisely.xyz·1d·
Discuss: Hacker News
SIMD Vectorization
Self-Extracting F3
buttondown.com·2d·
Discuss: Hacker News
Format Verification
Legal Contracts Built for AI Agents
paid.ai·22h·
Discuss: Hacker News
Automated Theorem Proving
Building Actual Peer-to-peer Applications: Outside Misconceptions
hackernoon.com·1d
🌐Distributed Hash
Daily briefing: Chemistry Nobel for ‘super sponge’ MOFs
nature.com·24m
🌡️Preservation Physics
AI Just Got Better at Counting Trees
hackernoon.com·1d
🌀Hyperbolic Geometry
When Machines Think In Context
forbes.com·1d
🔲Cellular Automata
CANOPI: Contingency-Aware Nodal Optimal Power Investments with High Temporal Resolution
arxiv.org·2d
📐Interval Arithmetic
Harmonizing AI Voices: Bridging the Gap in Intelligent Communication
dev.to·1d·
Discuss: DEV
🎙️Whisper
Java Backend Coding Technology: Writing Code in the Era of AI
dev.to·5d·
Discuss: DEV
💻Programming languages
Integrating Ollama with Python: REST API and Python Client Examples
dev.to·1d·
Discuss: DEV
🎙️Whisper
On Convex Functions of Gaussian Variables
arxiv.org·7h
📐Compression Mathematics
Automated Spectral Deconvolution & Peak Profiling for Bioprocess Monitoring
dev.to·2d·
Discuss: DEV
📄Document Digitization
Explainable but Vulnerable: Adversarial Attacks on XAI Explanation in Cybersecurity Applications
arxiv.org·2d
🕵️Vector Smuggling
SECA: Semantically Equivalent and Coherent Attacks for Eliciting LLM Hallucinations
arxiv.org·2d
👑Coq Tactics