Unusual Memory Bit Patterns | Software Verify
softwareverify.com·1h
🔩Systems Programming
Pleasant Imperative Program Proofs with GallinaC
arxiv.org·1d
⚔️Lean Tactics
Lomuto's Comeback for Quicksort Partitions
dlang.org·15h·
Discuss: Hacker News
🔗Topological Sorting
Advent of Code: Libraries
elly.town·1d
🔒Type Safety
How we built a flywheel to steadily improve security for Amazon RDS
aws.amazon.com·13h
👁️Observatory Systems
Unraveling the Infeasibility Knot: Graph-Guided Troubleshooting for Complex Constraints
dev.to·1h·
Discuss: DEV
🧮Constraint Solvers
Portable C++ Guideline
github.com·19h·
Discuss: Hacker News
🦀Rust Borrowing
Optimizing ClickHouse for Intel's 280 core processors
clickhouse.com·13h·
💨Cache Analysis
The Ternary Manifesto
homepage.cs.uiowa.edu·22h
📝Concrete Syntax
PSA: `views::single` doesn’t really view
quuxplusone.github.io·2d
🧮Algebraic Datatypes
Safepoints and Fil-C
fil-c.org·2d·
Discuss: Hacker News
Hardware Transactional Memory
System Instruction Fixed Point
funcall.blogspot.com·1d·
Proof Automation
Compiling with Continuations
swatson555.github.io·1d·
Discuss: Hacker News
💻Programming languages
Hardness of Dynamic Core and Truss Decompositions
arxiv.org·4h
🎯Performance Proofs
Supporting our AI overlords: Redesigning data systems to be Agent-first
muratbuffalo.blogspot.com·15h·
🗄️Database Internals
What is Algebraic about Algebraic Effects?
interjectedfuture.com·2d·
Discuss: Hacker News
Algebraic Effects
Topological Sort: Managing Mutable Structures in Haskell
mmhaskell.com·3d
🔗Topological Sorting
Semantic Dictionary Encoding
falvotech.com·2d·
Discuss: Hacker News
🌀Brotli Dictionary
Concurrent Linguistic Error Detection (CLED): a New Methodology for Error Detection in Large Language Models
arxiv.org·1d
🔍Z3 Parsing
Rust-style safety model for C++ 'rejected' as profiles take priority
theregister.com·1d·
Discuss: Hacker News
🦀Rust Borrowing