This Week in Security: Bogus Ransom, WordPress Plugins, and KASLR
hackaday.com·1d
🛡️macOS Security
Flag this post
Prentice Hall Interview with Rich Stevens, Author of Unix Programming (1997)
📡Network Protocol Design
Flag this post
Coding on Paper
⚙️Compiler Design
Flag this post
A File Format Uncracked for 20 Years
🎯GADT
Flag this post
AWK technical notes (2023)
🔀Brzozowski Derivatives
Flag this post
[P] triplet-extract: GPU-accelerated triplet extraction via Stanford OpenIE in pure Python
🧩Parser Combinators
Flag this post
Extracting Causal Relations in Deep Knowledge Tracing
arxiv.org·2d
📚Automata Learning
Flag this post
NAP: Attention-Based Late Fusion for Automatic Sleep Staging
arxiv.org·3d
🔲Cellular Automata
Flag this post
Investigating Robot Control Policy Learning for Autonomous X-ray-guided Spine Procedures
arxiv.org·2d
🤖Robotics
Flag this post
Language Models Model Language
📚Automata Learning
Flag this post
Enhanced Anti-Reflection Coating Design via Stochastic Gradient Descent on Parametric Nanostructure Optimization
🔧Unikernel Development
Flag this post
Composing and Decomposing AI Functions (Tutorial with Python Examples)
🤖Program Synthesis
Flag this post
The isogeometric boundary element algorithm for solving the plane strain problem of an elastic matrix containing an open material surface of arbitrary shape
arxiv.org·3d
📐Linear Algebra
Flag this post
pDANSE: Particle-based Data-driven Nonlinear State Estimation from Nonlinear Measurements
arxiv.org·6d
🔄Finite State Machines
Flag this post
Meeting Minutes That Don't Suck: A Developer's Guide to AI Documentation
🔤Language Design
Flag this post
Loading...Loading more...