🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔧 Reed-Solomon Decoding

Error Correction, Polynomial Interpolation, Galois Field Operations, Syndrome Calculation

Chen, Goldbach, and the Search for an Unsolved Proof
pballew.blogspot.com·1d·
Discuss: www.blogger.com
🧮SMT Solvers
Cactus Language • Stylistics 5
inquiryintoinquiry.com·1d
📐Format Grammars
Anukari working better on some Radeon chips
anukari.com·6h·
Discuss: Hacker News
🎯Emulator Accuracy
When Everything Is Vibing
computerworld.com·5h·
Discuss: Hacker News
🎙️Whisper
Booting EDK2 (UEFI Reference Implmentation) on Hardkernel Odroid M2
blog.3mdeb.com·1d·
Discuss: Hacker News
🎯Emulator Accuracy
Psilocybin therapy for mood dysfunction in Parkinson's disease: open-label trial
nature.com·1d·
Discuss: Hacker News
⏰Time Crystals
Rethinking CLI Interfaces for AI
notcheckmark.com·11h·
Discuss: Lobsters, Hacker News
🔒WASM Capabilities
This Week in Security: Trains, Fake Homebrew, and AI Auto-Hacking
hackaday.com·1d
🔓Hacking
Improving Drug Identification in Overdose Death Surveillance using Large Language Models
arxiv.org·1d
🧠Machine Learning
Pytorch quickstart ☄️: Some of my Pytorch notes
dev.to·11h·
Discuss: DEV
📊Quantization
Learning to Quantize and Precode in Massive MIMO Systems for Energy Reduction: a Graph Neural Network Approach
arxiv.org·3d
📊Quantization
AWS AI League: The Ultimate AI Showdown for Innovation and Skill Development
dev.to·11h·
Discuss: DEV
🌊Stream Processing
Agent Memory with Spring AI & Redis
dev.to·3d·
Discuss: DEV
⚡Redis Internals
Machine Learning Fundamentals: dimensionality reduction with python
dev.to·2d·
Discuss: DEV
🧠Machine Learning
Proof-theoretic Semantics for First-order Logic
arxiv.org·1d
🏗️Constructive Logic
Refining Coarse-Grained Molecular Topologies: A Bayesian Optimization Approach
arxiv.org·1d
🌐Computational Topology
Building a CRM with AWS SAM, part 1: ping
dev.to·13h·
Discuss: DEV
⚡gRPC
Exploiting Jailbreaking Vulnerabilities in Generative AI to Bypass Ethical Safeguards for Facilitating Phishing Attacks
arxiv.org·2d
🕵️Vector Smuggling
ClaritySpeech: Dementia Obfuscation in Speech
arxiv.org·4d
💿FLAC Archaeology
From Novelty to Imitation: Self-Distilled Rewards for Offline Reinforcement Learning
arxiv.org·1d
📊Learned Metrics
Loading...Loading more...
AboutBlogChangelogRoadmap