Lossless Compression with Asymmetric Numeral Systems (2020)
bjlkeng.ioยท5dยท
Discuss: Hacker News
๐Ÿ—œ๏ธArchive Compression
Flag this post
War of the words
leonlins.comยท1dยท
Discuss: DEV
๐Ÿš€Spacecraft Navigation
Flag this post
Visual Information Theory โ€“ colah's blog
colah.github.ioยท6dยท
Discuss: Hacker News
๐Ÿ“ŠApproximate Computing
Flag this post
Fluctuation-learning relationship in recurrent neural networks
nature.comยท6d
๐ŸŽฎReinforcement Learning
Flag this post
Waveform Design for Over-the-Air Computing
arxiv.orgยท3d
๐Ÿ“กSignal Processing
Flag this post
Chaotic Creation: Building Intelligent Networks from Noise by Arvind Sundararajan
dev.toยท2dยท
Discuss: DEV
๐ŸœSwarm Intelligence
Flag this post
Shannonโ€™s Principle in IoT: Lessons from the Field
blog.devops.devยท4d
โ˜๏ธCloud Computing
Flag this post
Causal Model-Based Reinforcement Learning for Sample-Efficient IoT Channel Access
arxiv.orgยท2d
๐ŸŽฎReinforcement Learning
Flag this post
The Generalisation Illusion: A 2025 Psychological Audit of Artificial Intelligence
jorgebscomm.blogspot.comยท2d
๐Ÿ”AI Detection
Flag this post
Computability of the Optimizer for Rate Distortion Functions
arxiv.orgยท3d
๐Ÿ—œ๏ธArchive Compression
Flag this post
Symbol Detection in Multi-channel Multi-tag Ambient Backscatter Communication Under IQ Imbalance
arxiv.orgยท4d
๐Ÿ”„Feed Aggregation
Flag this post
Attention and Compression is all you need for Controllably Efficient Language Models
arxiv.orgยท6d
๐Ÿ—œ๏ธCompression Algorithms
Flag this post
Intro to Routing: Mixture-of-Experts and Expert Choice
neelsomaniblog.comยท1dยท
Discuss: Hacker News
๐ŸงฌOptimization Algorithms
Flag this post
Towards Optimal Constellation Design for Digital Over-the-Air Computation
arxiv.orgยท5d
๐Ÿ”ขNumPy
Flag this post
How Point Cloud to BIM Helps Surveyors Reduce Costs and Save Time
scantobim.onlineยท5dยท
Discuss: DEV
๐Ÿ—data engineering
Flag this post
The Transformer and the Hash: building blocks of 21st century political science
nothinghuman.substack.comยท3dยท
Discuss: Substack
๐ŸงŠIceberg Tables
Flag this post
The Law of Leaky Abstractions
joelonsoftware.comยท4dยท
Discuss: Hacker News
๐Ÿ›ก๏ธMemory Safety
Flag this post
How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy
dev.toยท3dยท
Discuss: DEV
๐Ÿ”Privacy Engineering
Flag this post
Human or Machine? Low-Latency Audio Detection of Humans at Scale
nooks.aiยท2dยท
Discuss: Hacker News
๐Ÿ“ŠColumnar Engines
Flag this post