How do I securely send you a present when bad guys are intercepting our mail?
colinpaice.blogยท3h
โSymbolic Computation
Flag this post
Data-Driven Construction of a Generalized Kinetic Collision Operator from Molecular Dynamics
link.aps.orgยท1d
๐Statistical Mechanics
Flag this post
Lorxus Does Halfhaven: 11/01~11/07
lesswrong.comยท1d
โSymbolic Computation
Flag this post
Guardian-regularized Safe Offline Reinforcement Learning for Smart Weaning of Mechanical Circulatory Devices
arxiv.orgยท2d
๐Optimization Algorithms
Flag this post
Can LLM Agents Really Debate? A Controlled Study of Multi-Agent Debate in Logical Reasoning
arxiv.orgยท1d
๐Multiphysics Simulation
Flag this post
DRAGON: Guard LLM Unlearning in Context via Negative Detection and Reasoning
arxiv.orgยท2d
โSymbolic Computation
Flag this post
Swift GSoC 2025 highlight: Improved code completion for Swift
swift.orgยท1d
โSymbolic Computation
Flag this post
Unlocking True Concurrency in Python 3.13: Mastering Free-Threaded Mode for High-Performance Applications
๐ปComputational Science
Flag this post
Jaxley: differentiable simulation enables large-scale training of detailed biophysical models of neural dynamics
nature.comยท17h
๐Optimization Algorithms
Flag this post
Is composition memory-efficient ?
โSymbolic Computation
Flag this post
Who Are We in This Universe?
๐Origami Engineering
Flag this post
Optimizing Diversity and Quality through Base-Aligned Model Collaboration
arxiv.orgยท2d
๐Optimization Algorithms
Flag this post
Loading...Loading more...