Turning the SLV's maps into data with Allmaps and some GLAM plumbing
updates.timsherratt.orgยท1d
๐Ÿ”ถVoronoi Diagrams
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.comยท2d
๐Ÿ’ฃZIP Vulnerabilities
Flag this post
Color Comparison Between E Ink's Spectra 6 and ChLCD
iris-opt.comยท3dยท
Discuss: Hacker News
๐ŸŒˆColor Science
Flag this post
Digital Twins: the missing pieces we can solve with Machine Learning
quantblog.wordpress.comยท2dยท
Discuss: Hacker News
๐ŸบComputational Archaeology
Flag this post
The Treachery of Image Files
beyondloom.comยท2d
๐Ÿ” Terminal Fonts
Flag this post
Asciidoc: When Markdown Just Isn't Cutting It
hackernoon.comยท2d
๐Ÿ“„PostScript
Flag this post
Shouldn't we trust Google and other pertinent questions
cryptography.dogยท12hยท
Discuss: Hacker News
๐Ÿ“ฐRSS Archaeology
Flag this post
Nice tone! What an exclamation point does for a text
phys.orgยท1d
๐Ÿ“„Document Phonetics
Flag this post
Gamma Correct Blurring (2015)
iquilezles.orgยท2dยท
Discuss: Hacker News
๐ŸŒˆColor Science
Flag this post
Trent Alexander-Arnold mural vandalised ahead of Anfield return with Real Madrid
the-independent.comยท18h
๐Ÿ–‹Typography
Flag this post
The Nonprofit Feeding the Entire Internet to AI Companies
theatlantic.comยท21hยท
๐Ÿ“ฐContent Curation
Flag this post
Generation at the Speed of Thought: Speculative Decoding
bittere.substack.comยท2dยท
Discuss: Substack
๐Ÿš€SIMD Text Processing
Flag this post
Security Audit of intel ICE Driver for e810 Network Interface Card
arxiv.orgยท4h
๐Ÿ›ก๏ธeBPF Security
Flag this post
Getty Images v Stability: Long-awaited judgment rejects majority of Getty's claim
ipkitten.blogspot.comยท12hยท
โœ…Document Verification
Flag this post
Auditable-choice reframing unlocks RL-based verification for open-ended tasks
arxiv.orgยท4h
๐Ÿ“Linear Logic
Flag this post
Enhanced Block Copolymer Lithography via Adaptive Stochastic Gradient Descent and Dynamic Mask Optimization
dev.toยท20hยท
Discuss: DEV
โšกIncremental Computation
Flag this post
Visual Backdoor Attacks on MLLM Embodied Decision Making via Contrastive Trigger Learning
arxiv.orgยท2d
๐Ÿ”ฒCellular Automata
Flag this post
Spiking Neural Networks: The Future of Brain-Inspired Computing
arxiv.orgยท2d
๐Ÿ”ฒCellular Automata
Flag this post
Transformer-Based Decoding in Concatenated Coding Schemes Under Synchronization Errors
arxiv.orgยท1d
๐Ÿ”งReed-Solomon Decoding
Flag this post