🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📊 Shannon Entropy

Information Bounds, Optimal Coding, Channel Capacity, Compression Limits

Data Compression with Relative Entropy Coding
arxiv.org·2d
📐Compression Mathematics
Uniformity increases entropy
johndcook.com·2d
📈Entropy Estimation
Worth Reading 062425
rule11.tech·7h
🌐DNS over QUIC
Portable Network Graphics (PNG) Specification (Third Edition)
w3.org·1d·
Discuss: Hacker News
🕸️WebP Analysis
Advanced Path of Network Programming Deep Exploration from TCP to Application Layer Protocols(1750830996145900)
dev.to·17h·
Discuss: DEV
🌐Network Protocols
Researchers train AI to generate long-form text using only reinforcement learning
the-decoder.com·1d
🧠Intelligence Compression
The dynamics and geometry of choice in the premotor cortex
nature.com·23h
🔲Cellular Automata
Encrypting identifiers in practice
sjoerdlangkemper.nl·18h
🌊Stream Ciphers
Greedy Is Good. Less Greedy May Be Better
gojiberries.io·22h·
Discuss: Hacker News
🧮Kolmogorov Complexity
Code Rate Optimization via Neural Polar Decoders
arxiv.org·2d
🧠Neural Codecs
Mastering Malware Analysis: A SOC Analyst’s Guide to Dynamic Analysis with AnyRun
infosecwriteups.com·14h
🦠Malware Analysis
Ossification and the Internet
blog.apnic.net·16h
📡Network Archaeology
Fast Rate Information-theoretic Bounds on Generalization Errors
arxiv.org·1d
⧗Information Bottleneck
Using Wavelets and Clustering to Predict Odd or Even Numbers: An Overengineered Approach with Pretty (But Confusing) Plots
dev.to·9h·
Discuss: DEV
🧠Machine Learning
How much slower is random access, really?
samestep.com·2d·
Discuss: Hacker News
📼Tape Encoding
A Simple but Accurate Approximation for Multivariate Gaussian Rate-Distortion Function and Its Application in Maximal Coding Rate Reduction
arxiv.org·1d
🧠Neural Compression
Contextualizing SUTRA: Advancements in Multilingual & Efficient LLMs
hackernoon.com·7h
💻Local LLMs
Cost-Effective Optimization and Implementation of the CRT-Paillier Decryption Algorithm for Enhanced Performance
arxiv.org·1d
🔢Bitwise Algorithms
In the Wild: Malware Prototype with Embedded Prompt Injection
research.checkpoint.com·10h
🦠Malware Analysis
Algorithm Complexity: Time, Space, and Big-O Notation
dev.to·13h·
Discuss: DEV
🧮Kolmogorov Complexity
Loading...Loading more...
AboutBlogChangelogRoadmap