San Salvatore di Sinis in San Salvatore, Italy
atlasobscura.com·11h
📰RSS Archaeology
Flag this post
Semiliterate restaurant Chinese
languagelog.ldc.upenn.edu·1d
🇨🇳Chinese Computing
Flag this post
Serious Data From Testing LLMs
satisfice.com·1d
⚡Proof Automation
Flag this post
Did you get lucky or unlucky?
🔗Topological Sorting
Flag this post
Metrics for Assessing Inclusivity and Empowerment of People for Supporting the Design of Inclusive Product Lifecycles
arxiv.org·21h
✋Tactile Computing
Flag this post
How protein coatings influence nanoparticles' ability to avoid immune clearance and reach their destinations
phys.org·9h
🧪Cassette Chemistry
Flag this post
Claude Haiku 4.5
🇯🇵Japanese Computing
Flag this post
Repairing Reward Functions with Human Feedback to Mitigate Reward Hacking
arxiv.org·21h
🌸Bloom Variants
Flag this post
Scheming Ability in LLM-to-LLM Strategic Interactions
arxiv.org·21h
🔲Cellular Automata
Flag this post
Unveiling Gamer Archetypes through Multi modal feature Correlations and Unsupervised Learning
arxiv.org·2d
🧠Intelligence Compression
Flag this post
Timeliness, Consensus, and Composition of the Crowd: Community Notes on X
arxiv.org·1d
📰Content Curation
Flag this post
DiSTAR: Diffusion over a Scalable Token Autoregressive Representation for Speech Generation
arxiv.org·1d
🎙️Whisper
Flag this post
Arms, transparency and security in South-East Asia [Elektronisk resurs] / edited by Bates Gill and J.N. Mak.
libris.kb.se·1d
🇸🇪Nordic Cryptography
Flag this post
Improving Anomaly Detection in Industrial Time Series: The Role of Segmentation and Heterogeneous Ensemble
arxiv.org·3d
🧠Machine Learning
Flag this post
RO-Bench: Large-scale robustness evaluation of MLLMs with text-driven counterfactual videos
arxiv.org·3d
📊Learned Metrics
Flag this post
90% of Developers Using LLMs Are Blind to Character-Level Manipulation
⚡Proof Automation
Flag this post
SaFiRe: Saccade-Fixation Reiteration with Mamba for Referring Image Segmentation
arxiv.org·2d
🧠Machine Learning
Flag this post
PoU: Proof-of-Use to Counter Tool-Call Hacking in DeepResearch Agents
arxiv.org·2d
⚡Proof Automation
Flag this post
Loading...Loading more...