🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📡 Information theory
A Process to Trick ChatGPT into Agency
news.ycombinator.com·15h·
Discuss: Hacker News
🔲Cellular Automata
Multiple Memory Systems for Enhancing the Long-term Memory of Agent
arxiv.org·1d
📼Tape Combinators
Benchmarking Computer Science Survey Generation
arxiv.org·1d
⚙️Compression Benchmarking
Locally Differentially Private Multi-Sensor Fusion Estimation With System Intrinsic Randomness
arxiv.org·1d
🛡️Differential Privacy
Facts, Arguments, Theses: Building AI Knowledge Retrieval on Meaning, Not Slices
nsavage.substack.com·1h·
Discuss: Substack
📄Text Chunking
Hacker and Physicist – A Tale of "Common Sense"
supasaf.com·20h·
Discuss: Hacker News
🔐Cryptographic Archaeology
The Chilling: Identifying Strategic Antisocial Behavior Online and Examining the Impact on Journalists
arxiv.org·1d
🎯Threat Hunting
Locality-aware Concept Bottleneck Model
arxiv.org·2d
⧗Information Bottleneck
Disentangling the Drivers of LLM Social Conformity: An Uncertainty-Moderated Dual-Process Mechanism
arxiv.org·1d
🧠Intelligence Compression
Wormhole Dynamics in Deep Neural Networks
arxiv.org·1d
🔍Vector Forensics
Comp-X: On Defining an Interactive Learned Image Compression Paradigm With Expert-driven LLM Agent
arxiv.org·1d
🧠Neural Compression
How to model the world? Introduction to Laplace Neuron
abibulic.github.io·3d·
Discuss: Hacker News, Hacker News
🔲Cellular Automata
Futurity as Infrastructure: A Techno-Philosophical Interpretation of the AI Lifecycle
arxiv.org·1d
⚖️Emulation Ethics
From 5G RAN Queue Dynamics to Playback: A Performance Analysis for QUIC Video Streaming
arxiv.org·1d
🎥Streaming Codecs
Power and Rate Allocations for Positive-rate Covert Communications in Block-Fading Channels
arxiv.org·3d
ℹ️Information Theory
Implementing Gist Memory: Summarizing and Searching Long Docs with a ReadAgent
inference-docs.cerebras.ai·2d·
Discuss: Hacker News
📄Text Chunking
Are we solving digital identity or revealing we've lost what we're proving?
syntheticauth.ai·16h·
Discuss: Hacker News
🔐PKI Archaeology
Exploiting Vocabulary Frequency Imbalance in Language Model Pre-training
arxiv.org·1d
🧠Intelligence Compression
Understanding Data Influence with Differential Approximation
arxiv.org·2d
🧠Machine Learning
GEN2: A Generative Prediction-Correction Framework for Long-time Emulations of Spatially-Resolved Climate Extremes
arxiv.org·1d
⚡Incremental Computation
Loading...Loading more...
AboutBlogChangelogRoadmap