Enhanced SoC Design via Adaptive Topology Optimization with Reinforcement Learning
dev.to·16h·
Discuss: DEV
🧩RISC-V
Who Invented the Johnson Decade Counter (and Why)?
eejournal.com·1d·
Discuss: Hacker News
Homebrew CPUs
Three ways formally verified code can go wrong in practice
buttondown.com·1h
📜Proof Carrying Code
Neuro-Symbolic AI
en.wikipedia.org·4h·
Discuss: Hacker News
🔲Cellular Automata
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·9h
💎Information Crystallography
LED Strips
revk.uk·5h·
Discuss: www.revk.uk
⚙️DIY Electronics
Cactus Language • Semantics 3
inquiryintoinquiry.com·3h
🔢Denotational Semantics
A new method to build more energy-efficient memory devices could lead to a sustainable data future
phys.org·10h
🧲Magnetic Recording
Categorical systems theory
topos.institute·7h
🔀Category Theory
BYOVD to the next level (part 2) — rootkit like it's 2025
blog.quarkslab.com·1d
🔍eBPF
Side project - MV864A restoration - substantial progress in reverse engineering
rescue1130.blogspot.com·21h·
Circuit Archaeology
Experimenting with ACL2 and Claude Code
mikedodds.org·6h·
Discuss: Hacker News
👑Isabelle
Modern C and initializing an array
subethasoftware.com·1d
🗂Data structures
The Bit Shift Paradox: How "Optimizing" Can Make Code 6× Slower
hackernoon.com·2d
🧮Compute Optimization
Reverse Engineering keyboard firmware with Ghidra
blog.usedbytes.com·2d·
Discuss: Hacker News
🔓Reverse engineering
Rigorous Evaluation of Microarchitectural Side-Channels with Statistical Model Checking
arxiv.org·4d
🔧Hardware Verification
Toy Binary Decision Diagrams
philipzucker.com·4d
🧮Algebraic Datatypes
The Chip That Spoke Lisp
jxself.org·3d
🤖Lisp Machines
An enough week
blog.mitrichev.ch·23h·
📈Linear programming