Newest Stories by mjn
Home
Recent
Comments
Search
Login
4
A potential new Polymath project: intransitive dice
math
gowers.wordpress.com
via
mjn
1 year ago
|
cached
|
1 comment
1
10
Some advice for journalists writing about artificial intelligence
ai
togelius.blogspot.com
via
mjn
1 year ago
|
cached
|
1 comment
1
4
How Checkers Was Solved
ai
games
theatlantic.com
via
mjn
1 year ago
|
cached
|
no comments
0
2
Industrial Hardware and Software Verification with ACL2
pdf
formalmethods
lisp
cs.utexas.edu
via
mjn
1 year ago
|
cached
|
no comments
0
15
Survey of Rounding Implementations in Go
go
cockroachlabs.com
via
mjn
1 year ago
|
cached
|
3 comments
3
10
Good enough practices in scientific computing
practices
science
journals.plos.org
via
mjn
1 year ago
|
cached
|
no comments
0
42
Tag proposal: AI
☶
ai
meta
authored by
mjn
1 year ago
|
10 comments
10
2
Listening to the 78rpm Disc Collection
historical
blog.archive.org
via
mjn
1 year ago
|
cached
|
no comments
0
1
Gas Mileage, with a Side of British Units
science
rodneybrooks.com
via
mjn
1 year ago
|
cached
|
no comments
0
9
Xah Fly Keys
emacs
ergoemacs.org
via
mjn
1 year ago
|
cached
|
1 comment
1
3
Living Together: Mind and Machine Intelligence
cogsci
arxiv.org
via
mjn
1 year ago
|
cached
|
no comments
0
2
Ghosts of departed quantities: The problem with infinitesimals
math
robjlow.blogspot.com
via
mjn
1 year ago
|
cached
|
no comments
0
5
Making navigation work in adventure games
games
gameshelf.jmac.org
via
mjn
1 year ago
|
cached
|
1 comment
1
2
Public comments on the draft ACM Code of Ethics and Professional Conduct
☶
culture
practices
on.acm.org
via
mjn
1 year ago
|
cached
|
no comments
0
5
Emulate the emulators: A visual history of NESticle (2012)
games
historical
metopal.com
via
mjn
1 year ago
|
cached
|
2 comments
2
6
Array bound checking in C: The early products
c
historical
shape-of-code.coding-guideline
s.com
via
mjn
1 year ago
|
cached
|
no comments
0
5
Doing Mathematics Differently
☶
math
philosophy
inference-review.com
via
mjn
1 year ago
|
cached
|
no comments
0
4
Certifying a File System Using Crash Hoare Logic: Correctness in the Presence of Crashes
☶
compsci
cacm.acm.org
via
mjn
1 year ago
|
cached
|
no comments
0
6
SIMD-friendly algorithms for substring searching
assembly
compsci
0x80.pl
via
mjn
1 year ago
|
cached
|
1 comment
1
1
Survival of the Cryptic
culture
historical
privacy
limn.it
via
mjn
1 year ago
|
cached
|
no comments
0
20
Riseup.net Canary Statement
☶
law
privacy
riseup.net
via
mjn
1 year ago
|
cached
|
2 comments
2
6
Can You Secure an Iron Cage?
privacy
security
limn.it
via
mjn
1 year ago
|
cached
|
no comments
0
4
Custom ELF program headers—what, why and how
unix
cl.cam.ac.uk
via
mjn
1 year ago
|
cached
|
no comments
0
32
Plain HTML with a few bureaucratic gestures
web
kmjn.org
authored by
mjn
1 year ago
|
cached
|
24 comments
24
10
Depth in Strategic Games
pdf
games
julian.togelius.com
via
mjn
1 year ago
|
cached
|
3 comments
3
<< Page 3
|
Page 5 >>