Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.org·1d
🔗Graph Isomorphism
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·1d·
Discuss: Hacker News
🔢Reed-Solomon Math
An enough week
blog.mitrichev.ch·1d·
🧮Z3 Solver
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·19h
💎Information Crystallography
Enhancing Vector Signal Generator Accuracy with Adaptive Polynomial Regression Calibration
dev.to·16h·
Discuss: DEV
📡Audio Modulation
Revisiting Karpathy's 'Unreasonable Effectiveness of Recurrent Neural Networks'
gilesthomas.com·4h·
Discuss: Hacker News
🎧Learned Audio
Three ways formally verified code can go wrong in practice
buttondown.com·11h
📜Proof Carrying Code
Sorting encrypted data without decryption: a practical trick
dev.to·13h·
Discuss: DEV
🔐Hash Functions
BQN "Macros" with •Decompose (2023)
saltysylvi.github.io·7h·
Discuss: Hacker News
🦀Rust Macros
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·1d
📐Compression Bounds
A Function Generator From The Past
hackaday.com·10h
Circuit Archaeology
SPAD: Specialized Prefill and Decode Hardware for Disaggregated LLM Inference
arxiv.org·1d·
Discuss: r/LLM
💻Local LLMs
My First Week of Vibecoding
underreacted.leaflet.pub·2h·
Discuss: Hacker News
🎯Gradual Typing
Basketball trivia, editing distances, and derangement
leancrew.com·2d
🌳Trie Structures
Efficient and accurate search in petabase-scale sequence repositories
nature.com·2d·
Discuss: Hacker News
🔄Burrows-Wheeler
Erlang-Red Walkthrough – Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.com·15h·
Discuss: Hacker News
🌐Protocol Synthesis
A Proof of the Riemann Hypothesis
dev.to·2d·
Discuss: DEV
⚔️Lean Theorem
Hardware Vulnerability Allows Attackers to Hack AI Training Data – NC State News
news.ncsu.edu·8h·
Discuss: Hacker News
🔐RISC-V Cryptography
GaloisInc/parameterized-utils
github.com·3d
🧮Algebraic Datatypes
Slip – A Lisp System in JavaScript
lisperator.net·15h·
Discuss: Hacker News
🔗Lisp