SPAD: Specialized Prefill and Decode Hardware for Disaggregated LLM Inference
arxiv.org·19h·
Discuss: r/LLM
💻Local LLMs
Sorting encrypted data without decryption: a practical trick
dev.to·8h·
Discuss: DEV
🔐Hash Functions
BQN "Macros" with •Decompose (2023)
saltysylvi.github.io·1h·
Discuss: Hacker News
🦀Rust Macros
An enough week
blog.mitrichev.ch·1d·
🧮Z3 Solver
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·13h
💎Information Crystallography
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·23h·
Discuss: Hacker News
🔢Reed-Solomon Math
Three ways formally verified code can go wrong in practice
buttondown.com·6h
📜Proof Carrying Code
A Function Generator From The Past
hackaday.com·4h
Circuit Archaeology
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.com·3d
🔢Reed-Solomon Math
Enhancing Vector Signal Generator Accuracy with Adaptive Polynomial Regression Calibration
dev.to·10h·
Discuss: DEV
📡Audio Modulation
A Proof of the Riemann Hypothesis
dev.to·1d·
Discuss: DEV
⚔️Lean Theorem
GaloisInc/parameterized-utils
github.com·2d
🧮Algebraic Datatypes
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·19h
📐Compression Bounds
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
Cactus Language • Semantics 3
inquiryintoinquiry.com·7h
🔢Denotational Semantics
More on Carmichael
johndcook.com·1d·
Discuss: Hacker News
🔢Reed-Solomon Math
Neural Networks from Scratch in Python: Simpler Than You Think
hamza.se·3h·
Discuss: Hacker News
📊Quantization
Homomorphism Problems in Graph Databases and Automatic Structures
arxiv.org·19h
🔗Graph Isomorphism
Efficient and accurate search in petabase-scale sequence repositories
nature.com·2d·
Discuss: Hacker News
🔄Burrows-Wheeler
Self-Extracting F3
buttondown.com·4d·
Discuss: Hacker News
Format Verification