Error Correcting Codes, Hamming Bounds, Geometric Coding Theory, Channel Capacity

Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.org·15h
📐Compression Bounds
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com·9h
💎Information Crystallography
An enough week
blog.mitrichev.ch·23h·
🧮Z3 Solver
From Static Rate Limiting to Adaptive Traffic Management in Airbnb’s Key-Value Store
medium.com·1d
🌊Streaming Systems
Parallelizing Cellular Automata with WebGPU Compute Shaders
vectrx.substack.com·9h·
Discuss: Substack
🔲Cellular Automata
Parameterized Complexity of s-Club Cluster Edge Deletion
arxiv.org·1d
🧮Kolmogorov Complexity
The Why of PGP Authentication
articles.59.ca·6h
🔑Cryptographic Protocols
Why Your Simple Password Is a Mathematical Catastrophe
tawandamunongo.dev·1d·
Discuss: Hacker News
🔐Hash Functions
Michael Kohn - tin can phone modem
mikekohn.net·2h
🧪Cassette Hacks
Sorting encrypted data without decryption: a practical trick
dev.to·4h·
Discuss: DEV
🔐Hash Functions
QUIC! Jump to User Space!
hackaday.com·3h
🌐Network Protocols
Randomized and quantum approximate matrix multiplication
arxiv.org·15h
🔐Quantum Cryptography
Basketball trivia, editing distances, and derangement
leancrew.com·1d
🌳Trie Structures
A Proof of the Riemann Hypothesis
future.forem.com·1d·
Discuss: DEV
🎯Arithmetic Coding Theory
Controlled Release of Microorganisms from Engineered Living Materials
pubs.acs.org·4h·
Discuss: Hacker News
📦METS Packaging
GoMem is a high-performance memory allocator library for Go
github.com·16h
🧠Memory Allocators
6D Phase Space Reconstruction: MENT-Flow Validation on Complex High-Dimensional Distributions
hackernoon.com·2d
💎Information Crystallography
Integral Signatures of Activation Functions: A 9-Dimensional Taxonomy and Stability Theory for Deep Learning
arxiv.org·15h
🧠Machine Learning
Intro to RL: Off-Policy Methods
neelsomaniblog.com·1d·
Discuss: Hacker News
🔲Cellular Automata