๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”ง Hardware Verification

Formal Methods, Circuit Correctness, Model Checking, Silicon Validation

Interpretable Early Failure Detection via Machine Learning and Trace Checking-based Monitoring
arxiv.orgยท2d
๐ŸŽฏPerformance Proofs
Can We Build Trustable Hardware? (2019)
bunniestudios.comยท36mยท
Discuss: Hacker News
๐Ÿ”’Hardware Attestation
A low-cost protocol enables preparation of magic states and fault-tolerant universal quantum computation
phys.orgยท2h
โš›๏ธQuantum Error Correction
Breaking AI Testing Barriers: Dynamic Assertions and AI Automation Deliver 1000%+ Productivity Gains
engineering.salesforce.comยท17h
๐Ÿ”Concolic Testing
Model-based Testing Distributed Systems with P Language (2021)
mydistributed.systemsยท1dยท
Discuss: Lobsters, Hacker News, r/programming
๐Ÿ“žSession Types
Formal Methods for Stellar DeFi: Verifying Lending Protocol with Certora Sunbeam Prover
blog.positive.comยท2d
โœ…Format Verification
TaMaRa: Towards a Triple Modular Redundancy Pass for Yosys
blog.yosyshq.comยท4dยท
Discuss: Lobsters, Hacker News
๐Ÿ”FPGA Verification
Future Research in XP Modeling: A Call for Self-Learning Models
hackernoon.comยท20h
โš™๏ธOperating System Design
Automated Anomaly Detection in Electrochemical Etching Microstructures via Multi-Modal Analysis
dev.toยท20hยท
Discuss: DEV
๐Ÿ“„Document Digitization
A tiny firm wants to slash energy consumption by changing the way CPUs are designed - and it is even planning a new high performance server chip
techradar.comยท19h
๐Ÿ–ฅ๏ธHardware Architecture
Fact-checking when blogging
perrotta.devยท4h
๐Ÿ”—Online Curation
01 Getting Started with the Trenz TE0950 Board
hackster.ioยท1d
โšกHomebrew CPUs
Working with Contexts
oreilly.comยท2h
๐Ÿ”—Constraint Handling
ReST-RL: Achieving Accurate Code Reasoning of LLMs with Optimized Self-Training and Decoding
arxiv.orgยท8h
๐Ÿ’ปLocal LLMs
It's a Trap - Reliable Exploitation of CVE-2024-30084
scrapco.deยท5h
๐ŸŽฏNTLM Attacks
From Black Box to Blueprint
martinfowler.comยท1h
๐Ÿ›๏ธMainframe Archaeology
CPU Branch Prediction โ€“ Earliest Forms of Machine Learning
medium.comยท20hยท
Discuss: Hacker News
โšกCPU Microarchitecture
Simulating the Commodore PET
hackaday.comยท1d
๐ŸŽฎGameboy Emulation
Huawei to open-source its UB-Mesh data center-scale interconnect soon, details technical aspects โ€” one interconnect to rule them all is designed to replace ever...
tomshardware.comยท20h
๐Ÿ Homelab Federation
Even Heads Fix Odd Errors: Mechanistic Discovery and Surgical Repair in Transformer Attention
arxiv.orgยท8h
โœจEffect Handlers
Loading...Loading more...
AboutBlogChangelogRoadmap