What P vs NP is actually about
https://vasekrozhon.wordpress.com/2024/08/18/what-p-vs-np-is-actually-about/
https://vasekrozhon.wordpress.com/2024/08/18/what-p-vs-np-is-actually-about/
Vasek Rozhon's blog
What P vs NP is actually about
We recently made a Polylog video about a nonstandard way of understanding the P vs NP problem. As usual, our goal was to present an underrated idea in a broadly understandable way, while being sligโฆ
Building a Secure Software Supply Chain with GNU Guix
https://arxiv.org/abs/2206.14606
https://arxiv.org/abs/2206.14606
arXiv.org
Building a Secure Software Supply Chain with GNU Guix
The software supply chain is becoming a widespread analogy to designate the series of steps taken to go from source code published by developers to executables running on the users? computers. A...
๐4
Emergent Systems based on Glenn Puchtel's Biocybernetic Theory
https://thingspool.net/morsels/page-6.html
https://thingspool.net/morsels/page-6.html
ThingsPool
Emergent Systems based on Glenn Puchtel's Biocybernetic Theory
This a new way of designing biology-inspired emergent systems, based upon Glenn Puchtel's biocybernetic theory. It encompasses the construction of artificial life, artificial mind, virtual ecosystems, wetware, and other nature-inspired phenomena, based onโฆ
๐2
Conway's Gradient of Life
https://hardmath123.github.io/conways-gradient.html
https://hardmath123.github.io/conways-gradient.html
๐ฅ4
How I Experience Web Today
https://how-i-experience-web-today.com/
https://how-i-experience-web-today.com/
๐คฃ13๐2๐คจ2
Major Version Numbers are Not Sacred
https://tom.preston-werner.com/2022/05/23/major-version-numbers-are-not-sacred
https://tom.preston-werner.com/2022/05/23/major-version-numbers-are-not-sacred
Preston-Werner
Major Version Numbers are Not Sacred
๐1
The Long Way to Deforestation: A Type Inference and Elaboration Technique for Removing Intermediate Data Structures
https://dl.acm.org/doi/pdf/10.1145/3674634
https://dl.acm.org/doi/pdf/10.1145/3674634
๐3
Practical Design Patterns
: Opaque Pointers and Objects in Chttps://interrupt.memfault.com/blog/opaque-pointers
Interrupt
Practical Design Patterns: Opaque Pointers and Objects in C
An overview of the opaque pointer pattern in C. How to create objects in C.
๐3๐1
A formal kernel memory-ordering model
https://lwn.net/Articles/718628/
https://lwn.net/Articles/718628/
๐3๐ฅ2
Adding row polymorphism to Damas-Hindley-Milner
https://bernsteinbear.com/blog/row-poly/
https://bernsteinbear.com/blog/row-poly/
Max Bernstein
Adding row polymorphism to Damas-Hindley-Milner
Intro to HM
โค3๐2
Using Circular Programs for Higher-Order Syntax
https://emilaxelsson.github.io/documents/axelsson2013using.pdf
https://emilaxelsson.github.io/documents/axelsson2013using.pdf
๐1
What Not to Do When Writing an Interpreter for Specialisation
https://www.researchgate.net/publication/2648244_What_Not_to_Do_When_Writing_an_Interpreter_for_Specialisation
https://www.researchgate.net/publication/2648244_What_Not_to_Do_When_Writing_an_Interpreter_for_Specialisation
ResearchGate
(PDF) What Not to Do When Writing an Interpreter for Specialisation
PDF | A partial evaluator, given a program and a known โstaticโ part of its input data, outputs a specialised or residual program in which computations... | Find, read and cite all the research you need on ResearchGate
๐1
Computability and Complexity: From a Programming Perspective
http://hjemmesider.diku.dk/~neil/comp2book2007/book-whole.pdf
http://hjemmesider.diku.dk/~neil/comp2book2007/book-whole.pdf
๐ฅ1
Checking Polynomial Time Complexity with Types
https://link.springer.com/chapter/10.1007/978-0-387-35608-2_31
https://link.springer.com/chapter/10.1007/978-0-387-35608-2_31
SpringerLink
Checking Polynomial Time Complexity with Types
Light Affine Logic (LAL) is a logical system due to Girard and Asperti offering a polynomial time cut-elimination procedure. It can be used as a type system for lambda-calculus, ensuring a well-typed program has a polynomial time bound on any input. Typesโฆ
๐1
Category Theory Illustrated
https://abuseofnotation.github.io/category-theory-illustrated/05_logic/
https://abuseofnotation.github.io/category-theory-illustrated/05_logic/
๐3
A deep dive into Linuxโs new mseal syscall
https://blog.trailofbits.com/2024/10/25/a-deep-dive-into-linuxs-new-mseal-syscall/
https://blog.trailofbits.com/2024/10/25/a-deep-dive-into-linuxs-new-mseal-syscall/
The Trail of Bits Blog
A deep dive into Linuxโs new mseal syscall
If you love exploit mitigations, you may have heard of a new system call named mseal landing into the Linux kernelโs 6.10 release, providing a protection called โmemory sealing.โ Beyond notes from the authors, very little information about this mitigationโฆ
๐2