A Lorenz Teletype Shows Us Its Secrets
hackaday.comΒ·17h
πŸ’Ύvintage computing
Make Rebuildworld
rebuildworld.netΒ·15hΒ·
πŸ“ΌCassette Culture
Internet favors the development of flexible identities among language learners
phys.orgΒ·8h
πŸ›Digital humanities
The little Random that could
blog.julik.nlΒ·3dΒ·
Discuss: Hacker News
πŸ§ͺCBOR Fuzzing
SORVEPOTEL: Self-Propagating Malware Spreading Via WhatsApp - Kudelski Security Research Center
kudelskisecurity.comΒ·2d
🦠Malware Analysis
DRPO: Efficient Reasoning via Decoupled Reward Policy Optimization
arxiv.orgΒ·21h
🎯Performance Proofs
Decoding Emotion in the Deep: A Systematic Study of How LLMs Represent, Retain, and Express Emotion
arxiv.orgΒ·21h
πŸ’»Local LLMs
Vibe Coding Through Subscriptions, Payments, and PDF Nightmares
dev.toΒ·11hΒ·
Discuss: DEV
πŸ’ΎPersistence Strategies
RediShell: Critical Remote Code Execution
wiz.ioΒ·1dΒ·
Discuss: Hacker News
πŸ“¦Container Security
Outsmarting the Noise: Adaptive Cyber Defense with AI by Arvind Sundararajan
dev.toΒ·3dΒ·
Discuss: DEV
🎯Threat Hunting
Forking-Sequences
arxiv.orgΒ·21h
🌸Bloom Variants
Spiral of Silence in Large Language Model Agents
arxiv.orgΒ·1d
πŸ’»Programming languages
My time at Oracle: functional and design specification reviews
smalldatum.blogspot.comΒ·1dΒ·
πŸ’ΎPersistence Strategies
Precision Inertial Navigation via Multi-Modal Sensor Fusion and Adaptive Kalman Filtering
dev.toΒ·16hΒ·
Discuss: DEV
🌊Stream Processing
Read Between the Lines: A Benchmark for Uncovering Political Bias in Bangla News Articles
arxiv.orgΒ·21h
βš™οΈCompression Benchmarking
Certifiable Safe RLHF: Fixed-Penalty Constraint Optimization for Safer Language Models
arxiv.orgΒ·21h
πŸ”—Parser Combinators
Detection of retinal diseases using an accelerated reused convolutional network
arxiv.orgΒ·21h
πŸŒ€Riemannian Computing