Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.orgยท15h
๐Ÿ“Compression Bounds
When mathematics meets aesthetics: Tessellations as a precise tool for solving complex problems
phys.orgยท3h
๐Ÿ“Mathematical Art
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.orgยท19hยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.comยท9h
๐Ÿ’ŽInformation Crystallography
Cactus Language โ€ข Semantics 3
inquiryintoinquiry.comยท3h
๐Ÿ”ขDenotational Semantics
An enough week
blog.mitrichev.chยท23hยท
๐Ÿ“ˆLinear programming
Three ways formally verified code can go wrong in practice
buttondown.comยท2h
๐Ÿ“œProof Carrying Code
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.orgยท15h
๐Ÿ”—Graph Isomorphism
A Proof of the Riemann Hypothesis
dev.toยท1dยท
Discuss: DEV
โš”๏ธLean Theorem
Slip โ€“ A Lisp System in JavaScript
lisperator.netยท5hยท
Discuss: Hacker News
๐Ÿ”—Lisp
GaloisInc/parameterized-utils
github.comยท2d
๐ŸงฎAlgebraic Datatypes
Status II
andyjohnson.ukยท6h
๐Ÿ“„Document Digitization
Experimenting with ACL2 and Claude Code
mikedodds.orgยท7hยท
Discuss: Hacker News
๐Ÿ‘‘Isabelle
On the Pure Quantum Polynomial Hierarchy and Quantified Hamiltonian Complexity
arxiv.orgยท1d
โš›๏ธQuantum Algorithms
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.comยท3d
๐Ÿ”ขReed-Solomon Math
Defeating Return Type Polymorphism
philipphagenlocher.deยท1dยท
Discuss: Hacker News
๐ŸงฌFunctional Programming
Enhancing Vector Signal Generator Accuracy with Adaptive Polynomial Regression Calibration
dev.toยท6hยท
Discuss: DEV
๐Ÿ“กAudio Modulation
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.devยท1dยท
Discuss: Hacker News
๐Ÿ”Hash Functions
Let's Write a Macro in Rust
hackeryarn.comยท3hยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros