Algorithmic Archive Project: Use Cases (1/3)
blogs.bodleian.ox.ac.uk·2d
📊Citation Graphs
Offensive OSINT s05e10 - Interactive investigative stories part 1
offensiveosint.io·1d
🌐WARC Forensics
Why Low-Precision Transformer Training Fails: An Analysis on Flash Attention
huggingface.co·13h·
Discuss: Hacker News
📊Learned Metrics
How the Rise of Tabular Foundation Models Is Reshaping Data Science
towardsdatascience.com·8h
🧠Machine Learning
Getting a Hypergraph of Functions to a Browser
systeminit.com·4h·
Discuss: Hacker News
📐E-graphs
Show HN: A Field Report on Teaching a Chinese AI to Deconstruct Its Censorship
github.com·1d·
🔲Cellular Automata
Leveraging the Zeigarnik Effect
theolouvel.com·21m·
Discuss: Hacker News
Minimalism
A small number of samples can poison LLMs of any size
anthropic.com·5h·
🔍Vector Forensics
Relational Database Distillation: From Structured Tables to Condensed Graph Data
arxiv.org·17h
📊Graph Databases
Kurzgesagt - In a Nutshell: AI Slop Is Destroying The Internet
dev.to·3h·
Discuss: DEV
🤖AI Curation
Three Solutions to Nondeterminism in AI
blog.hellas.ai·1d·
Discuss: Hacker News
🎯Performance Proofs
LLM Data Detox: Erasing the Past for a Brighter AI Future
dev.to·2d·
Discuss: DEV
💻Local LLMs
Partial Information Decomposition via Normalizing Flows in Latent Gaussian Distributions
arxiv.org·2d
🧠Machine Learning
Ghosts in the Code: A Memorial Grove for Deleted AI
connectingminds.uk·5h·
Discuss: DEV, Hacker News
🏺Protocol Archaeology
We Hate AI Slop
gauthamsk.substack.com·8h·
Discuss: Substack
🎛️Feed Filtering
I analyzed 70 Data Breaches. Three controls would have stopped 65% of them
securityblueprints.io·3h·
Discuss: Hacker News
🔐Capability Systems
RND1: Simple, Scalable AR-to-Diffusion Conversion
radicalnumerics.ai·1h·
Discuss: Hacker News
💻Local LLMs
Get RICH or Die Scaling: Profitably Trading Inference Compute for Robustness
arxiv.org·17h
🧠Intelligence Compression
Automated Copyright Infringement Detection via Semantic Fingerprinting and Dynamic Thresholding
dev.to·22h·
Discuss: DEV
👁️Perceptual Hashing