🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🏹 Effect Systems

Algebraic Effects, Effect Handlers, Computational Effects, Pure Functions

Game of Trees Hub
gothub.org·3h·
Discuss: Lobsters, Hacker News
🖥️Self-hosted Infrastructure
Friendship promotes neural and behavioral similarity
eurekalert.org·7h·
Discuss: Hacker News
➡️Category Theory
Datacenter Industry Model – SemiAnalysis
semianalysis.com·1h·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
When Tests Become the Bottleneck
blog.testthetest.com·39m·
Discuss: Hacker News
👁️System Observability
Science of Chess: How does chess calculation depend on words vs. pictures?
lichess.org·1d·
Discuss: Hacker News
🎮Verification Games
One misclick away: How I found a critical vulnerability in a dating app
hame.page·1d·
Discuss: Hacker News
🍎Apple
LLMs for coding (+ free workflow templates)
blog.n8n.io·3d·
Discuss: Hacker News
🤖Program Synthesis
AGI Is Mathematically Impossible (3): Kolmogorov Complexity
news.ycombinator.com·2d·
Discuss: Hacker News
✓Automated Theorem Proving
Structured Prompts, Better Outcomes? Exploring the Effects of a Structured Interface with ChatGPT in a Graduate Robotics Course
arxiv.org·4d
⚙️PL Implementation
Application of RESNET50 Convolution Neural Network for the Extraction of Optical Parameters in Scattering Media
arxiv.org·9h
🐫OCaml
A Brain Tumor Segmentation Method Based on CLIP and 3D U-Net with Cross-Modal Semantic Guidance and Multi-Level Feature Fusion
arxiv.org·9h
🔠Type-Level Programming
eSapiens: A Platform for Secure and Auditable Retrieval-Augmented Generation
arxiv.org·9h
🔄Reproducible Builds
Precoded Zak-OTFS for Per-Carrier Equalization
arxiv.org·9h
📡Network Protocol Design
Stopping the rot when good software goes bad means new rules from the start
theregister.com·1d·
Discuss: Hacker News
💾Retro Computing
TGLD: A Trust-Aware Game-Theoretic Lane-Changing Decision Framework for Automated Vehicles in Heterogeneous Traffic
arxiv.org·9h
🤖Program Synthesis
Safe Deep Reinforcement Learning for Resource Allocation with Peak Age of Information Violation Guarantees
arxiv.org·1d
📡Network Protocol Design
From Curiosity to Competence: How World Models Interact with the Dynamics of Exploration
arxiv.org·1d
🐫OCaml
ViTCoT: Video-Text Interleaved Chain-of-Thought for Boosting Video Understanding in Large Language Models
arxiv.org·9h
🎮Verification Games
RadiomicsRetrieval: A Customizable Framework for Medical Image Retrieval Using Radiomics Features
arxiv.org·1d
🧱Immutable Infrastructure
Generalizable 7T T1-map Synthesis from 1.5T and 3T T1 MRI with an Efficient Transformer Model
arxiv.org·1d
🐫OCaml
Loading...Loading more...
AboutBlogChangelogRoadmap