Skip to main content

CS directory

See Also


“Machine Learning Scaling”, Branwen 2021

Scaling: “Machine Learning Scaling”⁠, Gwern Branwen (2021-04-24; ⁠, ⁠, ⁠, ; backlinks):

Bibliography of ML scaling papers showing smooth scaling of neural net performance in general with increasingly large parameters, data, & compute.

“Computer Optimization: Your Computer Is Faster Than You Think”, Branwen 2021

Faster: “Computer Optimization: Your Computer Is Faster Than You Think”⁠, Gwern Branwen (2021-04-24; ⁠, ; backlinks)

“AI Risk Demos”, Branwen 2016

MCTS-AI: “AI Risk Demos”⁠, Gwern Branwen (2016-12-23; ⁠, ⁠, ):

Simple demonstrations of the AI control problem using MCTS in a Gridworld

“Aria’s Past, Present, and Future”, Branwen 2011

Arias-past-present-and-future: “Aria’s Past, Present, and Future”⁠, Gwern Branwen (2011-07-13; ⁠, ⁠, ⁠, ⁠, ; backlinks):

On divining the esoteric truth of Neo-Venezia through holes in world-building.

“Simulation Inferences”, Branwen 2009

Simulation-inferences: “Simulation Inferences”⁠, Gwern Branwen (2009-05-29; ⁠, ⁠, ⁠, ; backlinks):

How small must be the computer simulating the universe?

“Isomorphisms & Meaning”, Branwen 2009

Isomorphisms: “Isomorphisms & Meaning”⁠, Gwern Branwen (2009-04-25; ):

Haskell juvenilia; investigating when two theories or representations mean the same things.

“Evolutionary Software Licenses”, Branwen 2009

Evolutionary-Licenses: “Evolutionary Software Licenses”⁠, Gwern Branwen (2009-01-27; ⁠, ):

Game theory on BSD vs. GPL: partnership? Is GPL an evolutionary stable strategy against invasion by proprietary copyright strategies?

“The Three Grenades and the Four Noble Truths”, Branwen 2008

The-3-Grenades: “The Three Grenades and the Four Noble Truths”⁠, Gwern Branwen (2008-11-24; ; backlinks):

CMU game connected to error coding theory

“The Learning Curve and the Yield Factor: the Case of Korea's Semiconductor Industry”, Chung 2001

2001-chung.pdf: “The learning curve and the yield factor: the case of Korea's semiconductor industry”⁠, Chung (2001; ; backlinks)

“Which Computational Universe Do We Live In? Cryptographers Want to Know Which of Five Possible Worlds We Inhabit, Which Will Reveal Whether Truly Secure Cryptography Is Even Possible.” “Which Computational Universe Do We Live In? Cryptographers want to know which of five possible worlds we inhabit, which will reveal whether truly secure cryptography is even possible.” (backlinks)

“Now Anyone Can Train Imagenet in 18 Minutes” “Now anyone can train Imagenet in 18 minutes” (⁠, ⁠, ; backlinks)

“Using Learning Curve Theory to Redefine Moore's Law” “Using learning curve theory to redefine Moore's Law” (⁠, ; backlinks)

Wirth's law


Quine (computing)




Linear programming


Lempel-Ziv-Markov chain algorithm


“Apple’s T2 Security Chip Has an Unfixable Flaw: Checkm8 Vulnerability Used to Jailbreak IPhones Hits Macs As Well.” “Apple’s T2 security chip has an unfixable flaw: Checkm8 vulnerability used to jailbreak iPhones hits Macs as well.” (backlinks)

“Pokémon Plays Twitch: How a Robot Got IRC Running on an Unmodified SNES; Behind the Scenes With the Hackers That Crammed Web Chat through a Super Game Boy.” “Pokémon plays Twitch: How a robot got IRC running on an unmodified SNES; Behind the scenes with the hackers that crammed Web chat through a Super Game Boy.” (backlinks)

“The World's First Code-free Sparkline Typeface: Displaying Charts in Text without Having to Use Code” “The world's first code-free sparkline typeface: Displaying charts in text without having to use code” (backlinks)

“Baba Is Turing Complete: A Sketch of a Proof (v2)” “Baba Is Turing Complete: A sketch of a proof (v2)” (backlinks)

“Macbook Charger Teardown: The Surprising Complexity inside Apple's Power Adapter” “Macbook charger teardown: The surprising complexity inside Apple's power adapter” (backlinks)

“Computational Complexity of Air Travel Planning” “Computational Complexity of Air Travel Planning” (backlinks)

“Some AI Koans” “Some AI Koans” (⁠, ; backlinks)

“How Many Persons Can There Be: Brain Reconstruction and Big Numbers” “How many persons can there be: brain reconstruction and big numbers” (backlinks)

“To What Extent Should One Trust a Statement That a Program Is Free of Trojan Horses? Perhaps It Is More Important to Trust the People Who Wrote the Software.” “To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.” (backlinks)

“2.2. 1 Case out of 45: Powerful Language = Exploitable Language” “2.2. 1 case out of 45: powerful language = exploitable language” (backlinks)

“Dolan 2013” “Dolan 2013” (backlinks)

“Turing-Complete Chess Computation” “Turing-Complete Chess Computation” (⁠, ; backlinks)

“Timm S. Mueller” “Timm S. Mueller” (backlinks)

“Cellphone Guts for the Curious ...” “Cellphone guts for the curious ...” (backlinks)

“Working With Generators - John Nash's Cipherer” “Working with generators - John Nash's Cipherer” (backlinks)

“StarCraft: Remastered—Emulating a Buffer Overflow for Fun and Profit” “StarCraft: Remastered—Emulating a buffer overflow for fun and profit” (backlinks)

“Zend Framework: 36.6. Document Info and Metadata”

zend-manual-pdfmetadata.html: “Zend Framework: 36.6. Document Info and Metadata” (; backlinks)

“Building a 4-bit Adder in Cities: Skylines”

2019-07-15-danielbali-citiesskylineisturingcomplete.html: “Building a 4-bit adder in Cities: Skylines” (backlinks)


2012-terencetao-anonymity.html: “Original: / 114134834346472219368 / posts / 8vmpA9fgRMq” (backlinks)

“Wikimedia Proves Greenspun’s Tenth Law”

2006-jared-wikimediaprovesgreenspunstenthlaw.html: “Wikimedia Proves Greenspun’s Tenth Law” (backlinks)

“5 Commandments [technology Laws and Rules of Thumb]”

2003-ross.pdf: “5 Commandments [technology laws and rules of thumb]” (backlinks)