Forensic linguistics: how dark web criminals give themselves away with their language
⚙Low-level programming
Flag this post
Cellular Performances, cellular automata audiovisual set
neural.it·4d
⚙Hardware design
Flag this post
Can You Irrigate the Garden?
⚙Hardware design
Flag this post
Redefining data center efficiency with supervision and CFD
datacenterdynamics.com·1d
⚙Hardware design
Flag this post
Building a unified experience from the CLI to the Web Application
⚙Low-level programming
Flag this post
The Quiet AI Revolution
aei.org·2d
💻Computer science
Flag this post
Writing Hack: Write It Just Like That
lesswrong.com·12h
⚙Low-level programming
Flag this post
Predictive Practices: Simulating Society's Rhythms to Shape a Better Future by Arvind Sundararajan
⚙Hardware design
Flag this post
Tree-Based Stochastic Optimization for Solving Large-Scale Urban Network Security Games
arxiv.org·2d
💻Computer science
Flag this post
How to Automate Your Knowledge Management with Python and AI APIs
⚙Low-level programming
Flag this post
Co-Designing Multimodal Systems for Accessible Remote Dance Instruction
arxiv.org·2d
⚙Low-level programming
Flag this post
ProbLog4Fairness: A Neurosymbolic Approach to Modeling and Mitigating Bias
arxiv.org·2d
⚙Hardware design
Flag this post
Building a Simple Personal Library with Python: My Experience from Zero to Execution
⚙Low-level programming
Flag this post
The Polite Liar: Epistemic Pathology in Language Models
arxiv.org·4d
⚙Low-level programming
Flag this post
Loading...Loading more...