Did Euclid exist? Is it okay to quote people that did not exist?
blog.computationalcomplexity.orgยท1dยท
๐Ÿ”Cryptographic Archaeology
Flag this post
It's Time to Bring Back GNOME Office (Hope You Remember It)
itsfoss.comยท12h
๐Ÿ”“Open Source Software
Flag this post
YaCy - The search engine I thought I would love
sprocketfox.ioยท23h
๐Ÿ”BitFunnel
Flag this post
A Metal Detectorist Was Searching a Fieldโ€”and Discovered a 2,200-Year-Old Treasure
popularmechanics.comยท1d
๐ŸบMedia Archaeology
Flag this post
The OWASP AI/LLM Top 10: Understanding Security and Privacy Risks in AI-Powered Mobile Applications
nowsecure.comยท10h
๐Ÿ’ปLocal LLMs
Flag this post
Blood, Brick and Legend: The Chemistry of Dracula's Castle
news.research.gatech.eduยท2dยท
Discuss: Hacker News
๐ŸงชManuscript Chemistry
Flag this post
Reproduced and Recovered: the First Chinese Keyboard-based MingKwai Typewriter
hackaday.comยท1d
๐Ÿ‡จ๐Ÿ‡ณChinese Computing
Flag this post
Quantitative Metaphors for Sizes in Biology
press.asimov.comยท10hยท
Discuss: Hacker News
๐Ÿ”ฒCellular Automata
Flag this post
Like sculpting from within: New technique builds advanced materials out of basic plastics
phys.orgยท1d
๐Ÿ“„Document Digitization
Flag this post
A filtering scheme for confocal laser endomicroscopy (CLE)-video sequences for self-supervised learning
arxiv.orgยท1d
๐ŸŒ€Riemannian Computing
Flag this post
From vibe coding to context engineering: 2025 in software development
technologyreview.comยท12hยท
Discuss: Hacker News
๐Ÿ”„Language Evolution
Flag this post
High Resolution Seismic Waveform Generation using Denoising Diffusion
arxiv.orgยท1d
๐Ÿ“กFrequency Archaeology
Flag this post
Open Character Training: Shaping the Persona of AI Assistants through Constitutional AI
arxiv.orgยท1d
๐ŸŽ™๏ธWhisper
Flag this post
Surfacing Subtle Stereotypes: A Multilingual, Debate-Oriented Evaluation of Modern LLMs
arxiv.orgยท1d
๐Ÿ›Digital humanities
Flag this post
Note
hsu.cyยท1d
๐Ÿ“œText Collation
Flag this post
Forecasting Future Anatomies: Longitudianl Brain Mri-to-Mri Prediction
arxiv.orgยท18h
๐ŸŒ€Riemannian Computing
Flag this post
Two-Parameter R\'enyi Information Quantities with Applications to Privacy Amplification and Soft Covering
arxiv.orgยท18h
๐Ÿ“กInformation theory
Flag this post
Model Predictive Control with Multiple Constraint Horizons
arxiv.orgยท18h
โœจEffect Handlers
Flag this post