๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ“ˆ Entropy Estimation

Mutual Information, Statistical Tests, Randomness Testing, Information Measures

Meta opposes the EU's AI plans
heise.deยท16h
โš–๏ธLegal Compliance
3 Ways Control System Principles Can Help With Decision Making
spectrum.ieee.orgยท2d
โš™๏ธsystems theory
5 Features Every AI-Powered SOC Platform Needs in 2025
securityaffairs.comยท2d
๐ŸŒŠStream Processing
Open Sesame: Poems with Entropy
benwr.netยท3dยท
Discuss: Lobsters, Hacker News
๐Ÿ”“Password Cracking
A distributed systems reliability glossary
antithesis.comยท4dยท
Discuss: Lobsters, Hacker News, r/programming
โœ…Archive Fixity
AtCoder Finals Problem Statement
atcoder.jpยท3dยท
Discuss: Hacker News
๐Ÿ‡ฏ๐Ÿ‡ตJapanese Computing
Supervised Fine Tuning on Curated Data Is Reinforcement Learning
independentresearch.aiยท1dยท
Discuss: Hacker News
๐Ÿ“ŠFeed Optimization
Tactical Trust (1 of 2): Platform Crypto for Developers
tiemoko.comยท1dยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Pragmata Gameplay Breakdown Details Its Blend Of Hacking And Gunplay
dev.toยท11hยท
Discuss: DEV
๐Ÿ•น๏ธGame Preservation
An Interpretable AI framework Quantifying Traditional Chinese Medicine Principles Towards Enhancing and Integrating with Modern Biomedicine
arxiv.orgยท4d
๐Ÿง Machine Learning
SurgeryLSTM: A Time-Aware Neural Model for Accurate and Explainable Length of Stay Prediction After Spine Surgery
arxiv.orgยท3d
๐Ÿง Machine Learning
Probabilistic Soundness Guarantees in LLM Reasoning Chains
arxiv.orgยท2d
๐Ÿ›ก๏ธProof-Carrying Archives
Machine Learning Fundamentals: dropout project
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStream Processing
AdaptiSent: Context-Aware Adaptive Attention for Multimodal Aspect-Based Sentiment Analysis
arxiv.orgยท2d
๐ŸŽ›๏ธFeed Filtering
Assessing the economic benefits of space weather mitigation investment decisions: Evidence from Aotearoa New Zealand
arxiv.orgยท2d
๐ŸŒก๏ธPreservation Physics
Artificial Intelligence in Cybersecurity: Dual Use for Defense and Attack
dev.toยท2dยท
Discuss: DEV
๐ŸŽฏThreat Hunting
When Pattern-by-Pattern Works: Theoretical and Empirical Insights for Logistic Models with Missing Values
arxiv.orgยท2d
๐ŸงฎKolmogorov Complexity
Machine Learning Fundamentals: dropout example
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStreaming Systems
Machine Learning Fundamentals: dimensionality reduction example
dev.toยท3dยท
Discuss: DEV
๐Ÿ“Vector Dimensionality
Dataset resulting from the user study on comprehensibility of explainable AI algorithms
arxiv.orgยท2d
๐Ÿง Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap