Show HN: Rebuilt Bible search app to run 100% client-side with Transformers.js
biblos.appยท15hยท
Discuss: Hacker News
๐Ÿ“œBinary Philology
Erlang-Red Walkthrough โ€“ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.comยท23hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
Random samples from a tetrahedron
johndcook.comยท55m
๐Ÿ’ŽInformation Crystallography
Refactoring: A way to write better Code
dev.toยท11hยท
Discuss: DEV
โš™๏ธOperational Semantics
Nearly Instance-Optimal Parameter Recovery from Many Trajectories via Hellinger Localization
arxiv.orgยท2d
๐ŸงฎKolmogorov Bounds
2025-10-10 # LLMs Are Transpilers
alloc.devยท1dยท
Discuss: Hacker News
๐Ÿ”„Language Evolution
The Custom Conveyor: Building Your Own Iterators
dev.toยท8hยท
Discuss: DEV
๐Ÿ”„Burrows-Wheeler
Scalable Semantic Map Generation via Hierarchical Graph Optimization
dev.toยท17hยท
Discuss: DEV
โšกIncremental Computation
Aria: An Agent For Retrieval and Iterative Auto-Formalization via Dependency Graph
arxiv.orgยท4d
โšกProof Automation
94% of Developers Waste Tokens on Reasoning LLMs. Here's Why.
dev.toยท1dยท
Discuss: DEV
๐Ÿ’ปLocal LLMs
A Manifesto for the Programming Desperado
github.comยท21hยท
Discuss: Hacker News
๐Ÿ’ปProgramming languages
Memory Retrieval and Consolidation in Large Language Models through Function Tokens
arxiv.orgยท1d
๐Ÿ’ปProgramming languages
The Trillion Dollar AI Software Development Stack
a16z.comยท16hยท
Discuss: Hacker News
โšกProof Automation
Automated Design of Peptide-Based Drug Candidates via Constrained Generative Adversarial Networks
dev.toยท6hยท
Discuss: DEV
๐Ÿ”Vector Forensics
Randomized and quantum approximate matrix multiplication
arxiv.orgยท1d
๐Ÿ”Quantum Cryptography
Enhanced SoC Design via Adaptive Topology Optimization with Reinforcement Learning
dev.toยท1dยท
Discuss: DEV
๐ŸงฉRISC-V
The Conveyor Belt Protocol: Understanding Iterators
dev.toยท9hยท
Discuss: DEV
๐ŸงฌFunctional Programming
IASC: Interactive Agentic System for ConLangs
arxiv.orgยท1d
๐ŸŒณContext free grammars
XRPO: Pushing the limits of GRPO with Targeted Exploration and Exploitation
arxiv.orgยท2d
๐ŸŽฏPerformance Proofs
Implicit Models: Expressive Power Scales with Test-Time Compute
arxiv.orgยท4d
๐ŸŽฏPerformance Proofs