๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ‰ Galois Connections

Abstract Interpretation, Monotone Functions, Lattice Theory, Program Analysis

Multigres Architecture Overview
multigres.comยท1dยท
Discuss: Hacker News
๐Ÿ—„๏ธDatabase Sharding
The MLOps Maturity Playbook: Practical Steps to Production-Ready ML
blog.devops.devยท1d
๐Ÿ”„Reproducible Builds
AI Models Exceed Individual Human Accuracy in Predicting Everyday Social Norms
arxiv.orgยท1h
๐Ÿ”ฒCellular Automata
Quantifying Out-of-Training Uncertainty of Neural-Network based Turbulence Closures
arxiv.orgยท1d
๐Ÿ“ŠQuantization
scI2CL: Effectively Integrating Single-cell Multi-omics by Intra- and Inter-omics Contrastive Learning
arxiv.orgยท1h
๐Ÿง Machine Learning
Profiling in Go: A Practical Guide to Finding Performance Bottlenecks
dev.toยท9hยท
Discuss: DEV
๐Ÿ“ŠPerformance Profiling
Robust Point Cloud Registration via Geometric Overlapping Guided Rotation Search
arxiv.orgยท1d
๐Ÿ“Projective Geometry
Retrieval Enhanced Feedback via In-context Neural Error-book
arxiv.orgยท2d
๐Ÿค–Grammar Induction
Building and Measuring Trust between Large Language Models
arxiv.orgยท2d
๐Ÿ”ฒCellular Automata
Effective Clustering for Large Multi-Relational Graphs
arxiv.orgยท1d
๐ŸŒŠSpectral Clustering
Meta-R1: Empowering Large Reasoning Models with Metacognition
arxiv.orgยท1d
๐Ÿง Intelligence Compression
Language Models Coupled with Metacognition Can Outperform Reasoning Models
arxiv.orgยท1d
๐Ÿง Intelligence Compression
ArgusCogito: Chain-of-Thought for Cross-Modal Synergy and Omnidirectional Reasoning in Camouflaged Object Segmentation
arxiv.orgยท1d
๐Ÿค–Advanced OCR
Auditing Approximate Machine Unlearning for Differentially Private Models
arxiv.orgยท1h
๐Ÿ›ก๏ธDifferential Privacy
Can AI Have a Personality? Prompt Engineering for AI Personality Simulation: A Chatbot Case Study in Gender-Affirming Voice Therapy Training
arxiv.orgยท1d
๐Ÿ’ปProgramming languages
LLM-Based Agents for Competitive Landscape Mapping in Drug Asset Due Diligence
arxiv.orgยท2d
๐Ÿ”Information Retrieval
Benchmarking Class Activation Map Methods for Explainable Brain Hemorrhage Classification on Hemorica Dataset
arxiv.orgยท1d
๐Ÿง Machine Learning
Analysis and Detection of RIS-based Spoofing in Integrated Sensing and Communication (ISAC)
arxiv.orgยท1d
โš–๏ธRISC-V Formal
The Vertical Advantage: Why Industry Specific AI is the Future
dev.toยท13hยท
Discuss: DEV
๐Ÿ–ฅ๏ธTerminal Renaissance
FRAME : Comprehensive Risk Assessment Framework for Adversarial Machine Learning Threats
arxiv.orgยท1d
๐Ÿฆ Malware Analysis
Loading...Loading more...
AboutBlogChangelogRoadmap