Abracadabra Money Hack Analysis
blog.verichains.io·1d
🎫Kerberos Attacks
How to Use the ‘Association’ Technique to Remember What You Study
lifehacker.com·4h
🧠Personal Knowledge Base
Printf Style Debugging Of Elisp
irreal.org·2h
🔓Decompilation
What are PolyForm licenses?
polyformproject.org·1d·
🔓Open Source Software
The IBM 5100 – By Bradford Morgan White
abortretry.fail·6h·
Discuss: Hacker News
🏢IBM Mainframes
Why do LLMs freak out over the seahorse emoji?
vgel.me·1d·
🗜️LZW Variants
Signal secures its chats against quantum computers
heise.de·1d
🔐Quantum Security
When ChatGPT Turns Informant
futureofbeinghuman.com·1d·
Discuss: Hacker News
🔓Hacking
Humans and their environment: beyond the nature/culture opposition (2023)
bmcr.brynmawr.edu·8h·
Discuss: Hacker News
❄️Nordic Design Philosophy
Embracing the parallel coding agent lifestyle
simonw.substack.com·1d·
Discuss: Substack
🌳Incremental Parsing
ESLint plugin for React Compiler users to flag manual memoization
github.com·1d·
Discuss: Hacker News
🎯Gradual Typing
Components of JWTs Explained
fusionauth.io·2d·
Discuss: Hacker News
🌐Network Protocols
Safe and Compliant Cross-Market Trade Execution via Constrained RL and Zero-Knowledge Audits
arxiv.org·13h
🌳Archive Merkle Trees
Interpretable Neuropsychiatric Diagnosis via Concept-Guided Graph Neural Networks
arxiv.org·13h
🕸️Graph Embeddings
TROLL: Trust Regions improve Reinforcement Learning for Large Language Models
arxiv.org·13h
🧮Kolmogorov Bounds
Bridging the Gap Between Multimodal Foundation Models and World Models
arxiv.org·13h
🔲Cellular Automata
Domain-Robust Marine Plastic Detection Using Vision Models
arxiv.org·13h
📐Projective Geometry
Operationalizing Data Minimization for Privacy-Preserving LLM Prompting
arxiv.org·13h
💻Local LLMs
Progressive Bound Strengthening via Doubly Nonnegative Cutting Planes for Nonconvex Quadratic Programs
arxiv.org·1d
🎯Performance Proofs
SwiReasoning: Switch-Thinking in Latent and Explicit for Pareto-Superior Reasoning LLMs
arxiv.org·13h
💻Local LLMs