<p>🔗 <a href="https://manuelmoreale.com/on-em-dashes">Manuel Moreale: On em dashes</a></p>
lmika.org·1d
🖋Typography
String Art Generator – Free Online Thread Art Maker
string-artgenerator.com·3d·
Discuss: Hacker News
📐Mathematical Art
Google Pixel 10 adds C2PA to camera and Photos to spot AI-generated or edited images
securityaffairs.com·1d
🕸️WebP Analysis
Dangers of Recommender Systems – Ivan Vendrov
blog.sentinel-team.org·23h·
Discuss: Hacker News
🎯Content Recommendation
EmbeddingGemma Model Card
ai.google.dev·5d·
Discuss: Hacker News
⚙️Compression Benchmarking
AI mirrors experimental science to uncover a mechanism of gene transfer
cell.com·1h·
Discuss: Hacker News
🔲Cellular Automata
Claude's memory architecture is the opposite of ChatGPT's
dev.to·12h·
Discuss: DEV
Hardware Transactional Memory
LifeGPT: Generative pretrained transformer model for cellular automata
nature.com·6d·
Discuss: Hacker News
🔲Cellular Automata
Can SSD-Mamba2 Unlock Reinforcement Learning for End-to-End Motion Control?
arxiv.org·2d
🔲Cellular Automata
Nano Banana – AI Image Editing, Powered by Google Gemini
nanobanana.cool·1d·
Discuss: Hacker News
📄Document Digitization
Incorporating AI Incident Reporting into Telecommunications Law and Policy: Insights from India
arxiv.org·10h
📝ABNF Parsing
Exploiting Unlabeled Structures through Task Consistency Training for Versatile Medical Image Segmentation
arxiv.org·4d
🧠Machine Learning
JoPA:Explaining Large Language Model's Generation via Joint Prompt Attribution
arxiv.org·2d
🤖Grammar Induction
Risk-averse Fair Multi-class Classification
arxiv.org·3d
🧮Kolmogorov Bounds
MLP-SRGAN: A Single-Dimension Super Resolution GAN using MLP-Mixer
arxiv.org·4d
🧠Neural Codecs
**Essential Python Security Practices: Building Robust, Attack-Resistant Applications**
dev.to·1d·
Discuss: DEV
🛡️WASM Security
Aligning LLMs for the Classroom with Knowledge-Based Retrieval -- A Comparative RAG Study
arxiv.org·2d
🔍Information Retrieval