🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📊 Shannon Entropy

Information Bounds, Optimal Coding, Channel Capacity, Compression Limits

Data Compression with Relative Entropy Coding
arxiv.org·2d
📐Compression Mathematics
Uniformity increases entropy
johndcook.com·1d
📈Entropy Estimation
Portable Network Graphics (PNG) Specification (Third Edition)
w3.org·18h·
Discuss: Hacker News
🕸️WebP Analysis
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750830996145900)
dev.to·8h·
Discuss: DEV
🌐Network Protocols
Researchers train AI to generate long-form text using only reinforcement learning
the-decoder.com·22h
🧠Intelligence Compression
Encrypting identifiers in practice
sjoerdlangkemper.nl·9h
🌊Stream Ciphers
Greedy Is Good. Less Greedy May Be Better
gojiberries.io·13h·
Discuss: Hacker News
🧮Kolmogorov Complexity
Code Rate Optimization via Neural Polar Decoders
arxiv.org·2d
🧠Neural Codecs
Ossification and the Internet
blog.apnic.net·8h
📡Network Archaeology
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·6h
🦠Malware Analysis
COPY OF HDMI 2.2's full specs have been finalized, with better support for modern displays
engadget.com·1h
🎬WebCodecs API
Fast Rate Information-theoretic Bounds on Generalization Errors
arxiv.org·1d
⧗Information Bottleneck
How much slower is random access, really?
samestep.com·1d·
Discuss: Hacker News
📼Tape Encoding
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.to·1h·
Discuss: DEV
🧠Machine Learning
A Simple but Accurate Approximation for Multivariate Gaussian Rate-Distortion Function and Its Application in Maximal Coding Rate Reduction
arxiv.org·1d
🧠Neural Compression
Why Your Next LLM Might Not Have A Tokenizer
towardsdatascience.com·19h
🤖Grammar Induction
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·1d
🔢Bitwise Algorithms
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·2h
🦠Malware Analysis
A large deviation view of \emph{stationarized} fully lifted blirp interpolation
arxiv.org·10h
📐Compression Bounds
RL-Driven Semantic Compression Model Selection and Resource Allocation in Semantic Communication Systems
arxiv.org·1d
⧗Information Bottleneck
Loading...Loading more...
AboutBlogChangelogRoadmap