New Finding Aid β Jay A. Urice, Jr. papers
vault217.gmu.eduΒ·13h
πarchives
Flag this post
Cyberattacken mot Jaguar Land Rover slog mot Storbritanniens BNP
computersweden.seΒ·13h
πΈπͺSwedish Cryptanalysis
Flag this post
Two Vaquita Calves Offer Flicker of Hope for Most Endangered Porpoises on Earth
scientificamerican.comΒ·1d
π²Cellular Automata
Flag this post
PCT quantum symmetries -- section
ncatlab.orgΒ·1d
πQuantum Cryptography
Flag this post
Show HN: Linguistic RL β A 7B model discovers Occam's Razor through reflection
π―Proof Tactics
Flag this post
What 50 years of buried data tell us about Canada's mining oversight
phys.orgΒ·1d
πCultural Computing
Flag this post
Satellite images show scale of destruction in Pokrovsk as Russia pushes to take key Ukrainian city
the-independent.comΒ·17h
π·πΊRussian Computing
Flag this post
New prompt injection papers: Agents Rule of Two and The Attacker Moves Second
π§ͺProtocol Fuzzing
Flag this post
Diffusion Dynamics in Biofilms with Time-Varying Channels
arxiv.orgΒ·23h
π²Cellular Automata
Flag this post
Students' Acceptance of Arduino Technology Integration in Student-Led Science Inquiry: Insights from the Technology Acceptance Model
arxiv.orgΒ·23h
βTactile Computing
Flag this post
MDR ROI, Proven Outcomes, and What Security Leaders Need to Ask For
rapid7.comΒ·1d
πNTLM Forensics
Flag this post
Measuring the Intrinsic Dimension of Earth Representations
arxiv.orgΒ·2d
π§ Machine Learning
Flag this post
Bootc for Workstation Use
πOperating system internals
Flag this post
AI-Driven Optimization of Zeolite Synthesis via Reinforcement Learning & Multi-Objective Bayesian Optimization
β‘Z3 Optimization
Flag this post
MoM: Mixtures of Scenario-Aware Document Memories for Retrieval-AugmentedGeneration Systems
πDocument AI
Flag this post
The AI Deskilling Paradox
cacm.acm.orgΒ·8h
π²Cellular Automata
Flag this post
Loading...Loading more...