- See Also
-
Links
- “Machine Learning Scaling”, Branwen 2021
- “Computer Optimization: Your Computer Is Faster Than You Think”, Branwen 2021
- “AI Risk Demos”, Branwen 2016
- “Aria’s Past, Present, and Future”, Branwen 2011
- “Simulation Inferences”, Branwen 2009
- “Isomorphisms & Meaning”, Branwen 2009
- “Evolutionary Software Licenses”, Branwen 2009
- “The Three Grenades and the Four Noble Truths”, Branwen 2008
- “Against Copyright”, Branwen 2008
- “The Learning Curve and the Yield Factor: the Case of Korea's Semiconductor Industry”, Chung 2001
- “Which Computational Universe Do We Live In? Cryptographers Want to Know Which of Five Possible Worlds We Inhabit, Which Will Reveal Whether Truly Secure Cryptography Is Even Possible.”
- “Now Anyone Can Train Imagenet in 18 Minutes”
- “Using Learning Curve Theory to Redefine Moore's Law”
- Wirth's law
- Quine (computing)
- PDP-6
- Linear programming
- Lempel-Ziv-Markov chain algorithm
- “Apple’s T2 Security Chip Has an Unfixable Flaw: Checkm8 Vulnerability Used to Jailbreak IPhones Hits Macs As Well.”
- “Pokémon Plays Twitch: How a Robot Got IRC Running on an Unmodified SNES; Behind the Scenes With the Hackers That Crammed Web Chat through a Super Game Boy.”
- “The World's First Code-free Sparkline Typeface: Displaying Charts in Text without Having to Use Code”
- “Baba Is Turing Complete: A Sketch of a Proof (v2)”
- “Macbook Charger Teardown: The Surprising Complexity inside Apple's Power Adapter”
- “Computational Complexity of Air Travel Planning”
- “Some AI Koans”
- “How Many Persons Can There Be: Brain Reconstruction and Big Numbers”
- “To What Extent Should One Trust a Statement That a Program Is Free of Trojan Horses? Perhaps It Is More Important to Trust the People Who Wrote the Software.”
- “2.2. 1 Case out of 45: Powerful Language = Exploitable Language”
- “Dolan 2013”
- “Turing-Complete Chess Computation”
- “Timm S. Mueller”
- “Cellphone Guts for the Curious ...”
- “Working With Generators - John Nash's Cipherer”
- “StarCraft: Remastered—Emulating a Buffer Overflow for Fun and Profit”
- “Zend Framework: 36.6. Document Info and Metadata”
- “Building a 4-bit Adder in Cities: Skylines”
- “Original: Plus.google.com/114134834346472219368/posts/8vmpA9fgRMq”
- “Wikimedia Proves Greenspun’s Tenth Law”
- “5 Commandments [technology Laws and Rules of Thumb]”
- Miscellaneous
See Also
Links
“Machine Learning Scaling”, Branwen 2021
Scaling
: “Machine Learning Scaling”, (2021-04-24; ; backlinks):
Bibliography of ML scaling papers showing smooth scaling of neural net performance in general with increasingly large parameters, data, & compute.
“Computer Optimization: Your Computer Is Faster Than You Think”, Branwen 2021
Faster
: “Computer Optimization: Your Computer Is Faster Than You Think”, Gwern Branwen (2021-04-24; ; backlinks)
“AI Risk Demos”, Branwen 2016
MCTS-AI
: “AI Risk Demos”, (2016-12-23; ):
Simple demonstrations of the AI control problem using MCTS in a Gridworld
“Aria’s Past, Present, and Future”, Branwen 2011
Arias-past-present-and-future
: “Aria’s Past, Present, and Future”, (2011-07-13; ; backlinks):
On divining the esoteric truth of Neo-Venezia through holes in world-building.
“Simulation Inferences”, Branwen 2009
Simulation-inferences
: “Simulation Inferences”, (2009-05-29; ; backlinks):
How small must be the computer simulating the universe?
“Isomorphisms & Meaning”, Branwen 2009
Isomorphisms
: “Isomorphisms & Meaning”, (2009-04-25; ):
Haskell juvenilia; investigating when two theories or representations mean the same things.
“Evolutionary Software Licenses”, Branwen 2009
Evolutionary-Licenses
: “Evolutionary Software Licenses”, (2009-01-27; ):
Game theory on BSD vs. GPL: partnership? Is GPL an evolutionary stable strategy against invasion by proprietary copyright strategies?
“The Three Grenades and the Four Noble Truths”, Branwen 2008
The-3-Grenades
: “The Three Grenades and the Four Noble Truths”, (2008-11-24; ; backlinks):
CMU game connected to error coding theory
“Against Copyright”, Branwen 2008
Copyright
: “Against Copyright”, (2008-09-26; ; backlinks):
Copyright considered paradoxical, incoherent, and harmful from an information theory and compression perspective as there is no natural kind corresponding to ‘works’, merely longer or shorter strings for stupider or smarter algorithms.
“The Learning Curve and the Yield Factor: the Case of Korea's Semiconductor Industry”, Chung 2001
2001-chung.pdf
: “The learning curve and the yield factor: the case of Korea's semiconductor industry”, Chung (2001; ; backlinks)
“Which Computational Universe Do We Live In? Cryptographers Want to Know Which of Five Possible Worlds We Inhabit, Which Will Reveal Whether Truly Secure Cryptography Is Even Possible.”
https://www.quantamagazine.org/which-computational-universe-do-we-live-in-20220418/
: “Which Computational Universe Do We Live In? Cryptographers want to know which of five possible worlds we inhabit, which will reveal whether truly secure cryptography is even possible.” (backlinks)
“Now Anyone Can Train Imagenet in 18 Minutes”
https://www.fast.ai/2018/08/10/fastai-diu-imagenet/
: “Now anyone can train Imagenet in 18 minutes” ( ; backlinks)
“Using Learning Curve Theory to Redefine Moore's Law”
https://web.archive.org/web/20130609114014/http://www.electroiq.com/articles/sst/print/volume-46/issue-7/features/fab-management/using-learning-curve-theory-to-redefine-moores-law.html
: “Using learning curve theory to redefine Moore's Law” ( ; backlinks)
Wirth's law
Quine (computing)
PDP-6
Linear programming
Lempel-Ziv-Markov chain algorithm
“Apple’s T2 Security Chip Has an Unfixable Flaw: Checkm8 Vulnerability Used to Jailbreak IPhones Hits Macs As Well.”
https://arstechnica.com/information-technology/2020/10/apples-t2-security-chip-has-an-unfixable-flaw/
: “Apple’s T2 security chip has an unfixable flaw: Checkm8 vulnerability used to jailbreak iPhones hits Macs as well.” (backlinks)
“Pokémon Plays Twitch: How a Robot Got IRC Running on an Unmodified SNES; Behind the Scenes With the Hackers That Crammed Web Chat through a Super Game Boy.”
https://arstechnica.com/gaming/2015/01/pokemon-plays-twitch-how-a-robot-got-irc-running-on-an-unmodified-snes/
: “Pokémon plays Twitch: How a robot got IRC running on an unmodified SNES; Behind the scenes with the hackers that crammed Web chat through a Super Game Boy.” (backlinks)
“The World's First Code-free Sparkline Typeface: Displaying Charts in Text without Having to Use Code”
https://aftertheflood.com/journal/the-worlds-first-code-free-sparkline-typeface/
: “The world's first code-free sparkline typeface: Displaying charts in text without having to use code” (backlinks)
“Baba Is Turing Complete: A Sketch of a Proof (v2)”
http://www.twitlonger.com/show/n_1sqrh1m
: “Baba Is Turing Complete: A sketch of a proof (v2)” (backlinks)
“Macbook Charger Teardown: The Surprising Complexity inside Apple's Power Adapter”
http://www.righto.com/2015/11/macbook-charger-teardown-surprising.html#ref8
: “Macbook charger teardown: The surprising complexity inside Apple's power adapter” (backlinks)
“Computational Complexity of Air Travel Planning”
http://www.demarcken.org/carl/papers/ITA-software-travel-complexity/ITA-software-travel-complexity.pdf
: “Computational Complexity of Air Travel Planning” (backlinks)
“Some AI Koans”
http://www.catb.org/jargon/html/koans.html
: “Some AI Koans” ( ; backlinks)
“How Many Persons Can There Be: Brain Reconstruction and Big Numbers”
http://www.aleph.se/andart/archives/2012/04/how_many_persons_can_there_be_brain_reconstruction_and_big_numbers.html
: “How many persons can there be: brain reconstruction and big numbers” (backlinks)
“To What Extent Should One Trust a Statement That a Program Is Free of Trojan Horses? Perhaps It Is More Important to Trust the People Who Wrote the Software.”
http://users.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf
: “To what extent should one trust a statement that a program is free of Trojan horses? Perhaps it is more important to trust the people who wrote the software.” (backlinks)
“2.2. 1 Case out of 45: Powerful Language = Exploitable Language”
http://undeadly.org/cgi?action=article&sid=20150619071929
: “2.2. 1 case out of 45: powerful language = exploitable language” (backlinks)
“Dolan 2013”
http://stedolan.net/research/mov.pdf
: “Dolan 2013” (backlinks)
“Turing-Complete Chess Computation”
http://sigbovik.org/2019/proceedings.pdf#page=90
: “Turing-Complete Chess Computation” ( ; backlinks)
“Timm S. Mueller”
http://schulze-mueller.de/
: “Timm S. Mueller” (backlinks)
“Cellphone Guts for the Curious ...”
http://boston.conman.org/2013/01/22.2
: “Cellphone guts for the curious ...” (backlinks)
“Working With Generators - John Nash's Cipherer”
http://blog.practical-scheme.net/gauche/20120715-nash-cipherer
: “Working with generators - John Nash's Cipherer” (backlinks)
“StarCraft: Remastered—Emulating a Buffer Overflow for Fun and Profit”
http://0xeb.net/wp-content/uploads/2018/02/StarCraft_EUD_Emulator.pdf
: “StarCraft: Remastered—Emulating a buffer overflow for fun and profit” (backlinks)
“Zend Framework: 36.6. Document Info and Metadata”
zend-manual-pdfmetadata.html
: “Zend Framework: 36.6. Document Info and Metadata” ( ; backlinks)
“Building a 4-bit Adder in Cities: Skylines”
2019-07-15-danielbali-citiesskylineisturingcomplete.html
: “Building a 4-bit adder in Cities: Skylines” (backlinks)
“Original: Plus.google.com/114134834346472219368/posts/8vmpA9fgRMq”
2012-terencetao-anonymity.html
: “Original: plus.google.com / 114134834346472219368 / posts / 8vmpA9fgRMq” (backlinks)
“Wikimedia Proves Greenspun’s Tenth Law”
2006-jared-wikimediaprovesgreenspunstenthlaw.html
: “Wikimedia Proves Greenspun’s Tenth Law” (backlinks)
“5 Commandments [technology Laws and Rules of Thumb]”
2003-ross.pdf
: “5 Commandments [technology laws and rules of thumb]” (backlinks)
Miscellaneous
-
2021-koomey.pdf
, Jonathan Koomey, Eric Masanet (2021-06-24) -
2017-denning.pdf
: “/docs/cs/2017-denning.pdf
”, (2017):Moore’s Law is one small component in an exponentially growing planetary computing ecosystem.
-
https://www.teamten.com/lawrence/writings/coding-machines/
( ; backlinks) -
https://www.quantamagazine.org/researchers-defeat-randomness-to-create-ideal-code-20211124/
-
https://www.quantamagazine.org/quantum-mischief-rewrites-the-laws-of-cause-and-effect-20210311/
-
https://www.nayuki.io/page/designing-better-file-organization-around-tags-not-hierarchies
( ) -
https://www.lesswrong.com/posts/J6gktpSgYoyq5q3Au/benchmarking-an-old-chess-engine-on-new-hardware
( ; backlinks) -
https://www.lesswrong.com/posts/4MLBK7iCW3vYd93Mn/a-closer-look-at-chess-scalings-into-the-past
( ; backlinks) -
https://www.amazon.com/Turings-Cathedral-Origins-Digital-Universe/dp/1400075998/
( ; backlinks) -
https://oldvcr.blogspot.com/2022/06/prior-art-dept-proletext-encoding-html.html
-
https://nickdrozd.github.io/2022/01/10/another-self-cleaning-turing-machine.html
-
https://jvns.ca/blog/2022/02/20/things-that-used-to-be-hard-and-are-now-easy/
-
https://jix.one/proving-50-year-old-sorting-networks-optimal-part-1/
-
https://google-research.github.io/self-organising-systems/2022/diff-fsm/
-
https://dustri.org/b/horrible-edge-cases-to-consider-when-dealing-with-music.html
( ) -
https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.648.1155
( ) -
https://arstechnica.com/science/2019/06/its-possible-to-build-a-turing-machine-within-magic-the-gathering/
(backlinks) -
https://arstechnica.com/information-technology/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/
(backlinks) -
https://arstechnica.com/gaming/2011/08/accuracy-takes-power-one-mans-3ghz-quest-to-build-a-perfect-snes-emulator/
(backlinks) -
https://ai.googleblog.com/2018/07/machine-learning-in-google-bigquery.html
(backlinks) -
https://agtb.wordpress.com/2012/02/17/john-nashs-letter-to-the-nsa/#comment-5465
(backlinks) -
https://agtb.wordpress.com/2012/02/17/john-nashs-letter-to-the-nsa/#comment-5458
(backlinks) -
https://agtb.wordpress.com/2012/02/17/john-nashs-letter-to-the-nsa/#comment-5455
(backlinks) -
https://agtb.wordpress.com/2012/02/17/john-nashs-letter-to-the-nsa/
(backlinks) -
https://aaronrandall.com/blog/cracking-the-adventure-time-cipher/
-
http://www.syssec-project.eu/m/page-media/3/sp14_srop.pdf
(backlinks) -
http://www.d20srd.org/srd/spells/contactOtherPlane.htm
(backlinks) -
http://tomwildenhain.com/PowerPointTM/PowerPointTM.pptx
(backlinks) -
http://think-maths.co.uk/sites/default/files/2018-01/Think%20Maths%20-%20Domino%20Computer%20Worksheets_0.pdf
(backlinks) -
http://tcipg.org/sites/default/files/papers/2014_q3_tfs1.pdf
(backlinks) -
http://taeb-nethack.blogspot.com/2009/03/predicting-and-controlling-nethacks.html
-
http://pepijndevos.nl/2022/01/30/predicting-the-tide-with-an-analog-computer-made-from-lego.html
( ) -
http://math.andrej.com/2007/09/28/seemingly-impossible-functional-programs/
-
http://mainisusuallyafunction.blogspot.com/2014/02/x86-is-turing-complete-with-no-registers.html
(backlinks) -
http://esoteric.sange.fi/essie2/download/choon/choon.html
( ; backlinks) -
http://dwarffortresswiki.org/index.php/User:BaronW#The_Almighty_Dwarven_Calculator
(backlinks) -
http://courses.csail.mit.edu/6.857/2012/files/nash.py
(backlinks) -
http://courses.csail.mit.edu/6.857/2012/files/H02-ps1.pdf
(backlinks) -
http://blog.tyrannyofthemouse.com/2008/11/my-plan-to-destroy-universe-wont-work.html
(backlinks) -
http://blog.sigfpe.com/2012/12/shuffles-bayes-theorem-and-continuations.html
( ) -
http://blog.sigfpe.com/2009/05/three-projections-of-doctor-futamura.html
(backlinks) -
http://blog.sigfpe.com/2006/11/from-l-theorem-to-spreadsheet.html
-
http://blog.schauderhaft.de/2009/06/18/building-a-turing-engine-in-oracle-sql-using-the-model-clause/
(backlinks) -
http://beza1e1.tuxen.de/articles/accidentally_turing_complete.html
(backlinks) -
http://aurellem.org/vba-clojure/html/total-control.html
(backlinks) -
http://aaronsadventures.blogspot.com/2012/02/amazing-new-declassified-document.html
(backlinks) -
2005-04-shirky-ontologyisoverratedcategorieslinksandtags.html
( ) -
2002-pelc.pdf
( ; backlinks) -
2012-02-12-arvindnarayanan-iswritingstylesufficienttodeanonymizematerialonline.html
-
2010-nordhaus-nordhaus2007twocenturiesofproductivitygrowthincomputing-appendix.xlsx
( ; backlinks) -
2001-12-02-treginaldgibbons-isyoursonacomputerhacker.html
( )