Z3 Applications, Constraint Programming, Verification Workflows, Decision Procedures

Chain-in-Tree: Back to Sequential Reasoning in LLM Tree Search
arxiv.org·11h
🧮SMT Solvers
The eBPF Verifier – How Linux Safely Runs User Code in Kernel Space
qpoint.io·22h·
Discuss: Hacker News
🛡️eBPF Security
Functional genetic programming and exhaustive program search with combinator expressions (2007)
cs.hmc.edu·23h·
Discuss: Lobsters
🔗Functional Compilers
Building Smarter MCP Servers — From Theory to Practice
clever-cloud.com·7h
🔒WASM Capabilities
Faster, Cheaper, Local: The Myth and Reality of Replacing Claude for Coding
dev.to·18h·
Discuss: DEV
🏗️Compiler Archaeology
Holosplit
atdotde.blogspot.com·4h·
🔧KAITAI
First Day: A New Chapter at the JKU
stefan-marr.de·9h
🔩Systems Programming
Creating Web Applications with Julia
digitalocean.com·1d·
Discuss: Hacker News
👑Isabelle
A DuckDB extension for in-database inference, written in Rust 🦀
github.com·4h·
🦀Rust Borrowing
Domain-Aware Hyperdimensional Computing for Edge Smart Manufacturing
arxiv.org·11h
🎯Performance Proofs
Gitlab CTO on freeing developers for innovation with AI
computerweekly.com·4h·
Discuss: Hacker News
🔄Language Evolution
SupraEVM 50% faster than Monad
supra.com·3d·
Discuss: Hacker News
SMT Applications
Using GraphViz for CLAUDE.md
blog.fsck.com·2d
⚔️Lean Tactics
Subtext Retrospective
subtext-lang.org·1d·
Effect Handlers
Automated Excipient Polymorphism Prediction via Multi-Modal Data Fusion and HyperScore Validation
dev.to·20h·
Discuss: DEV
🧮Algebraic Datatypes
Solving 2-SAT
nima101.github.io·11h·
Discuss: Hacker News
🔗Constraint Handling
Towards Safe Reasoning in Large Reasoning Models via Corrective Intervention
arxiv.org·1d
📏Linear Logic
The Java Developer’s Dilemma: Part 1
oreilly.com·1d
📏Code Metrics
Why TigerBeetle is the most interesting database in the world
amplifypartners.com·3h·
🗄️Database Internals
CSnake: Detecting Self-Sustaining Cascading Failure via Causal Stitching of Fault Propagations
arxiv.org·11h
🛡️Error Boundaries