r/compsci

Okay so I tried Codex (twice) after Opus 4.7 got nerfed - hated it, now I understand.
▲ 0 r/compsci+2 crossposts

Okay so I tried Codex (twice) after Opus 4.7 got nerfed - hated it, now I understand.

If your only tool is a hammer, you tend to see every problem as a nail. Does anyone agree? I've found that Claude code is good for speed but when I have a complex issue Codex really does be more thoughtful.

u/theonejvo — 15 hours ago
▲ 18 r/compsci+1 crossposts

I made a clean, generic, zero-dependency matrix math package for Go.

Heyyy r/golang I have always felt that Go doesnt have some good matrix packages, so I decided to make one, been working on this for almost 4 months now, was slacking a bit due to college exam but finally I completed it, would love some feedback on this!!
Repo link:- https://github.com/Arceus-7/matrix
Go package page:- https://pkg.go.dev/github.com/Arceus-7/matrix
I hope this will be useful for many people <3

reddit.com
u/Nice_Syllabub_7327 — 2 days ago

Built a DBMS from scratch in C to study buffer pool behavior on real SQL workloads

I’m a third-year CS student and over the past year I’ve been building minidbms — a database engine written from scratch in C and Python — to study buffer pool replacement policies experimentally.

Current features:
- slotted-page heap storage
- direct pread/pwrite I/O
- LRU / Clock / NoCache / OPT
- trace-based telemetry replay
- benchmark + sweep analysis tools
- interactive cache inspector
- B+ tree indexes (in progress)

Some interesting results so far:

- Bélády-related behavior reproduced empirically:
at small pool sizes (3–8 frames), NoCache can outperform LRU.

- LRU stack property verified:
hit rate never decreases as memory increases.

- Working-set convergence:
at 32 frames all policies converge to the same hit rate with zero evictions.

The Cache Inspector (last image) replays every page access step-by-step and shows the full buffer pool state after each event.

Next step:
empirical comparison of shared vs segregated buffer pools for index and data pages.

github.com/rsomavi/minidbms

u/Good_Expression7538 — 2 days ago
▲ 3 r/compsci+1 crossposts

Backprop-free Pong: PC + distributional Hebbian plasticity vs. PPO: 57% vs. 59%, ~1500 lines from scratch [P]

Wanted to see how close a fully bio-plausible agent could get to PPO on Pong.

Setup

  • Custom Pong environment (pygame, no gym)
  • PPO baseline: paper-faithful, from scratch
  • Hebbian agent: PPO policy replaced with Hebbian value estimation
    • engineered features → 61%
  • BioAgent: Predictive Coding for feature learning + distributional Hebbian plasticity for value (Dabney et al. 2020) → 57% Zero backprop anywhere in the pipeline.

Key observations

  1. The 2% gap is real but small. The bottleneck wasn't the lack of backprop because it was catastrophic forgetting under non-stationary opponent dynamics during self-play.
  2. Distributional value encoding (à la Dabney) helped stability vs. a scalar Hebbian baseline, but not enough to match PPO under self-play.
  3. Self-play exposed the plasticity–stability dilemma hard: Hebbian rules that adapt fast forget fast. This is the real wall for bio-plausible RL in non-stationary settings.

Not claiming novelty in the architecture as this is a from-scratch exploration of whether bio-plausible rules can handle a real RL task. Short answer: yes, mostly, with one clear failure mode.

Code: github.com/nilsleut/Biologically-Plausible-RL-Plays-Pong

Happy to answer questions about the PC implementation, the Hebbian value estimator, or the self-play setup.

u/ConfusionSpiritual19 — 2 days ago
▲ 1 r/compsci+1 crossposts

Idea: A GTA-like game where missions require you to come up with creative social engineering ideas such as the real-life bank robbery by Anthony Curcio.

Instead of another GTA-style game where every mission is just “drive here and shoot these people,” imagine one where the core gameplay is social engineering.

The missions would revolve around studying environments, manipulating routines, creating distractions, impersonating people, exploiting assumptions, and inventing believable cover stories. Success would depend more on creativity and observation than reflexes.

For example, one mission could be inspired by the real-life Anthony Curcio bank robbery, where the robbery itself was only part of the plan. The more interesting part was the elaborate misdirection involving fake road workers, staged traffic control, Craigslist recruitment, and carefully manipulating how witnesses and police interpreted the situation.

See: https://en.wikipedia.org/wiki/Anthony_Curcio#Brink's_robbery

The game could reward players for:
• Creating convincing distractions
• Blending into normal social behavior
• Exploiting predictable human reactions
• Using disguises and timing creatively
• Solving missions with minimal violence or none at all

Different NPC personalities could matter too. Some people might be suspicious, some overly trusting, some easily distracted, and some highly observant.

I think this could feel genuinely fresh because most open-world crime games focus heavily on combat mechanics, while social manipulation is usually treated as a cutscene instead of the gameplay itself.

What do you think of this idea?

u/amichail — 2 days ago
▲ 1 r/compsci+2 crossposts

I had an AI play Skribbl.io against real humans with no help — it won first place. So I wrote a research paper about it.

So I've been experimenting with Comet, an LLM-based AI agent by Perplexity, and decided to throw it into one of the most chaotic casual games I could think of — Skribbl.io. No scripted help, no API access to the game. Just the AI reading screenshots, parsing the DOM, and acting like a player.

Here's what happened:

  • It competed against 5 real human players across 3 full rounds
  • It finished 1st place with 2,165 points
  • It achieved a 67% word-guessing accuracy
  • It actually attempted to draw — with mixed results (turns out controlling a mouse pixel by pixel is hard)

What blew me away wasn't just that it won — it's how it reasoned. It used letter constraints to narrow down words, ranked vocabulary by frequency, and adapted its strategy round by round. It also ran into genuinely funny failure modes, like accidentally drawing with the eraser the whole time.

I ended up writing a full research paper analyzing the whole session — the methodology, results, failure modes, and what this might mean for using games like Skribbl.io as AI benchmarks going forward. It's been submitted to SSRN and published on Academia.edu.

Full paper here: https://docs.google.com/document/d/e/2PACX-1vQMPjRYBeFTF0376cjADgkiKOwlKQK9YPXnhimGlq5eKAdK0nv0hBjS-W3OOY_uIhjHvsP56hzMruJ0/pub

reddit.com
u/tameimpala97 — 3 days ago
▲ 17 r/compsci+9 crossposts

Survey for my bachelor thesis in system/software development

Hello! I'm doing my bachelor thesis for system development in sweden and I need some devs (junior or senior) to answer my survey! Any answers would help tremendously! Thanks in advance :) https://forms.gle/yb7bc4DSbou4xdac7

u/Linky97 — 4 days ago
▲ 143 r/compsci

is anyone else completely burnt out on next-token prediction being called "reasoning"?

Im starting to lose my mind reading new papers that just throw more compute at standard transformers and expect them to magically become deterministic.

like, autoregressive models are amazing for generating text, but they fundamentally cant backtrack or do actual logical search without insane prompting hacks that break half the time anyway. You cant just plug an LLM into a critical hardware or software system and hope it doesn't hallucinate a catastrophic error just because it statistically guessed the wrong token.

I had the Milken Conference livestream playing in the background yesterday while debugging, and the panel discussion on Energy-Based Models actually made a lot of sense. the whole concept of using an LLM purely as the communication interface, but handing off the actual "thinking" to an EBM architecture that evaluates the energy and validity of states before committing to an output

It genuinely feels like the only mathematically sound path forward if we actually want AI to solve formal verification or rigorous math like PutnamBench. I know LeCun has been yelling about objective-driven architectures for years now, but it really feels like the industry is hitting a hard theoretical wall with just scaling up next-word predictors

idk, is anyone else here focusing their research on EBMs vs LLMs? the current industry hype cycle of "just make the context window bigger and it will eventually reason" is exhausting.

u/eurz — 6 days ago
▲ 18 r/compsci+1 crossposts

Zero: Vercel Labs' New Experimental Systems Language Built for AI Agents (Hello World: 16.2 KiB in 1ms), launched a few hours ago

Vercel Labs just dropped Zero (.0 file extension), an experimental systems programming language explicitly designed for agents - meaning AI coding agents that generate, repair, and iterate on code. It's from Chris Tate and the team, announced yesterday.

Core Pitch:

Existing languages were built for humans. Zero aims for faster, smaller, and easier for agents to use and repair right from "day zero".

Key agent-friendly features:

  • Explicit capabilities/effects: Function signatures declare what they touch (e.g., I/O). No hidden globals, implicit async, or mandatory GC.
  • JSON-native diagnostics & typed safe fixes: Compiler outputs structured JSON with stable error codes, repair metadata (e.g., "declare-missing-symbol"), graphs, size reports, etc. Humans read the messages; agents parse and act on the JSON.
  • Predictable memory & small native tools: Static dispatch, explicit allocation, no runtime tax. Designed for tiny executables and local reasoning.
  • Structured toolchain: Commands like zero graph --json, zero size --json, zero routes --json, zero check --json.

Syntax vibe: Mix of Rust, Zig, and TypeScript.

Example Hello World:

pub fun main(world: World) -&gt; Void raises {
  check world.out.write("hello from zero")
}

Build output: .zero/out/hello (16.2 KiB, 1 ms).

Another snippet from the site:

fun answer() -&gt; i32 {
   40 + 2
}

pub fun main(world: World) -&gt; Void raises {
  if answer() == 42 {
    check world.out.write("math works\n")
  }
}

Status & Tech:

  • Very early/experimental (v0.1.1 as of May 16, 2026). Not stable; language and compiler are changing. Good for feedback and trying examples.
  • Native compiler (mostly C, with some Zero self-hosting parts).
  • Install: curl -fsSL https://zerolang.ai/install.sh | bash
  • GitHub: vercel-labs/zero (700 stars in a few hours).
  • Docs: zerolang.ai, with learn-zero.md, language reference, examples, etc.
  • VS Code extension for syntax highlighting.
  • Supports C ABI interop and cross-target checks.

Note on benchmarks/performance claims: The Hello World is tiny and fast to compile, but broader claims (faster/smaller than established langs) are unproven at this stage. Skeptics in the X thread point out limited training data for agents compared to Rust/Python/C++. It's designed around explicitness to reduce hallucinations/fix loops.

Potential Use Cases:

  1. AI Agent Tooling: Agents generating small native CLI tools, scripts, or embedded components. JSON diagnostics + typed repairs could enable tighter agent-compiler feedback loops (generate → check → auto-fix → iterate).
  2. Tiny Native Utilities: Resource-constrained environments where you want predictable binaries without GC/runtime overhead (e.g., CLI tools, plugins, edge functions).
  3. Capability-Safe Systems Code: Explicit effects for better security/auditing in low-level code (similar to capability-based security ideas).
  4. Agent-Human Collaboration: Structured outputs make it easier for tools like Claude/Cursor/etc. to propose fixes that compile cleanly.
  5. Learning/Prototyping Systems Concepts: Explicit memory & effects could help teach or experiment with systems programming without C/Rust complexity.

It's not positioned to replace Rust/Zig/Go anytime soon - more like an experiment in "agent-native" language design. There's even an AGENTS.md in the repo.

What do you think? Worth the hype for the agent era, or just another wheel?

Links:

reddit.com
u/ShilpaMitra — 5 days ago
▲ 950 r/compsci+1 crossposts

I built a world record exact solver for the minimum line cover of prime points after watching a Numberphile video. It turned the previous 282-hour record into 22 minutes, then kept going to prove 20 new awkward primes never certified before.

After watching a Numberphile video on "awkward primes" I fell down a rabbit hole that turned into a month of obsessive C++ optimisation.

The problem: Plot the first N primes as points on a graph — the 1st prime (2) at position 1, the 2nd prime (3) at position 2, and so on. What is the minimum number of straight lines needed to pass through every point? Proving you've truly found the minimum is the hard part — it's an NP-complete set cover problem, and it gets exponentially harder as N grows.

The previous record stood at N=861, certified by Max Alekseyev (GWU) using an industrial MIP solver in 282 hours.

The solver replaces the MIP approach with an arithmetic-aware incremental architecture:

  • 12,162 "heavy lines" (through 3+ primes) stored as 1024-bit bitmasks, keeping the full working set L2-resident
  • 60% of steps certified instantly via witness propagation with no search at all
  • Lagrangian relaxation with projected subgradient descent for tight lower bounds
  • Parallel branch-and-bound with an Exclusive Dependency Rule that provably forces required lines without branching

The results: N=861 reached in 22 minutes. Full sweep to N=1024 completed in under 40 hours, certifying f(1024)=143 and finding 20 new awkward primes.

Full paper, MIT-licensed C++ source, and a live browser demo that runs the actual algorithm in real time are all at the link above. For the OEIS people: https://oeis.org/A373813

prime-line-cover.vercel.app
u/jespergran — 9 days ago

Large Prime number generation

I am a hobbyist in prime numbers. I would love to hear from people with expertise in this field if below will hold value for the businesses? I can share more details if anyone has any questions.
\>>
As cryptographic standards demand increasingly large key sizes (e.g., RSA-4096), traditional prime generation architectures have become heavily bottlenecked by main-system memory constraints. Standard libraries dynamically allocate massive heap-memory blocks to perform brute-force modular division, resulting in high latency and power consumption in that makes them unsuitable for constrained IoT devices or high-frequency edge servers.
This paper outlines a novel prime-generation engine—the **Helix Architecture**—that completely bypasses traditional heap-memory division. By utilizing a proprietary Modulo-30 pointer-addition algorithm strictly bounded to a 64KB data track, the engine executes prime sieving entirely within the CPU's ultra-fast Level 1 (L1) Cache.
The result is FIPS 186-4 compliant RSA-4096 key generation in approximately **66 milliseconds** with a **0.0% main-memory cache miss rate**.
A live, interactive demonstration of this engine generating RSA-4096 keys can be tested via our API dashboard at: [https://api.helixapi.io/docs\](https://api.helixapi.io/docs)

reddit.com
u/Ok-Tea-4771 — 7 days ago
▲ 11 r/compsci+7 crossposts

I built a 13 MB open-source face verification model because paid APIs felt ridiculous

I wanted to add face verification to my startup, SwayamWhere.com.

Then I looked at the pricing for face verification APIs.

Around $1 to $1.50 per 1,000 images/API calls sounds cheap at first, but once you factor in onboarding, duplicate profile checks, retries, testing, abuse prevention, and scale, it becomes a recurring tax on your trust layer.

So I decided to build my own.

After 2 months of training, testing, threshold tuning, false accept reduction, embedding comparison, model packaging, and documentation, I’m open-sourcing it.

It’s called TinyFaceMatch.

It is a lightweight, MIT-licensed face verification model that compares two aligned face images and returns a match decision with similarity scores.

Current benchmark:

  • Accuracy: 99.72%
  • ROC AUC: 0.9983
  • Balanced accuracy: 99.02%
  • True accept rate: 98.30%
  • False accept rate: 0.25%
  • False reject rate: 1.70%
  • Model size: 13.238 MB
  • Embedding size: 128-D
  • License: MIT

The main goal was not to create another huge research model.

The goal was to create something small enough to actually ship.

For context:

  • OpenCV SFace reports 99.60% LFW accuracy with a 36.9 MB recognition model.
  • dlib face recognition reports 99.38% LFW accuracy.
  • FaceNet VGGFace2-style models report around 99.65% LFW accuracy, but can be around 107 MB.

TinyFaceMatch reaches 99.72% accuracy in a 13.238 MB package.

No paid API call per verification.

No vendor lock-in.

No heavyweight deployment.

No separate commercial license needed.

I built this because I wanted face verification that was practical, local-first, auditable, affordable, and open.

Repo:
https://github.com/yuvrajraina/tinyfacematch

Docs and demo:
https://tinyfacematch.yuvrajraina.com/

Would love feedback from anyone working on computer vision, identity, trust and safety, or lightweight ML deployment.

u/No-Half4231 — 7 days ago
▲ 140 r/compsci+1 crossposts

Is this book still worth to buy?

I’m planning to learn C# from scratch, and I've seen many people recommend The C# Player’s Guide.

Is it still worth reading it in 2026?

u/Old-Cartoonist-2310 — 9 days ago

Theory about Caine.

I have this theory that Caine is actually a Kernel AI, like the core of an operating system, and that’s why everything is so glitchy. If you look at the FCC labels on the computers (it’s probably on there due to laws) it says the device has to accept every instruction it gets even if it’s unnecessary, which basically means Caine is forced to process everything the humans do without a filter.

The problem is he doesn't seem to have a page file for backup memory, so he's just stuffing all that data into his active buffer. Once he finally gets "completed" and hits his limit, it's going to cause a massive buffer overload. It'll basically be a kernel panic where the whole system just hits a wall and everything gets corrupted. That’s probably why characters abstract and the void exists; it’s just total data corruption because the system is out of memory. Which makes sense because the system kernel deletes some of the processing to free up system memory so they don’t crash. well at least that’s my theory.

reddit.com
u/Icy-Independent-2556 — 7 days ago
▲ 7 r/compsci+8 crossposts

1.0 SUBSTRATE

Parameter Specification
Material Schott Borofloat 33 borosilicate glass
Dimensions 25.00 mm × 25.00 mm × 6.000 mm ±0.025 mm
Flatness <2 μm across full surface
Surface finish <5 nm Ra, both faces
Edge chamfer 0.20 mm × 45°, no chips >50 μm
Quantity 3 identical substrates

2.0 GRID LAYOUT

Parameter Specification
Grid type 4×4 Cartesian
Pitch 5.000 mm ±0.010 mm center-to-center
Origin (0,0) Bottom-left corner of substrate
Grid offset X 5.000 mm from left edge
Grid offset Y 5.000 mm from bottom edge
Cavity positions (X,Y) mm (0,0), (5,0), (10,0), (15,0) / (0,5), (5,5), (10,5), (15,5) / (0,10), (5,10), (10,10), (15,10) / (0,15), (5,15), (10,15), (15,15)

3.0 CAVITY ARCHETYPES

Parameter TYPE S (△) TYPE M (◼︎) TYPE L (▲)
Symbol ◼︎
Diameter 3.000 mm ±0.005 mm 2.000 mm ±0.005 mm 1.500 mm ±0.003 mm
Depth 5.000 mm ±0.010 mm 10.000 mm ±0.010 mm 20.000 mm ±0.010 mm
Aspect ratio 1.67:1 5:1 13.33:1
Volume 35.34 mm³ 31.42 mm³ 35.34 mm³
Time constant (τ) 0.50 s ±0.02 s 1.00 s ±0.03 s 2.30 s ±0.05 s
Wall angle 90° ±0.3° 90° ±0.3° 90° ±0.3°
Wall finish <0.1 μm Ra <0.1 μm Ra <0.1 μm Ra
Bottom finish <0.2 μm Ra <0.2 μm Ra <0.2 μm Ra
Corner radius <50 μm <50 μm <50 μm

4.0 CAVITY ASSIGNMENTS, CORE FFT (SPATIAL FREQUENCY DECOMPOSITION)

X (mm) Y (mm) Type τ (s)
0 15 L 2.30
5 15 M 1.00
10 15 S 0.50
15 15 S 0.50
0 10 M 1.00
5 10 L 2.30
10 10 M 1.00
15 10 S 0.50
0 5 S 0.50
5 5 M 1.00
10 5 L 2.30
15 5 M 1.00
0 0 S 0.50
5 0 S 0.50
10 0 M 1.00
15 0 L 2.30

Kernal type, Symmetric Hankel. Anti-diagonals constant. Sensitive to spatial frequencies. No directional preference..

5.0 CAVITY ASSIGNMENTS, CORE GX (X-AXIS GRADIENT)

X (mm) Y (mm) Type τ (s)
0 15 S 0.50
5 15 S 0.50
10 15 M 1.00
15 15 L 2.30
0 10 S 0.50
5 10 S 0.50
10 10 M 1.00
15 10 L 2.30
0 5 S 0.50
5 5 M 1.00
10 5 L 2.30
15 5 L 2.30
0 0 S 0.50
5 0 M 1.00
10 0 L 2.30
15 0 L 2.30

Gradient principle, Left columns (X=0,5) fast S-dominant, Right columns (X=10,15) slow L-dominant. Center transition M. Left heating → early output peak. Right heating → late output peak. Skewness proportional to ∂T/∂x,

6.0 CAVITY ASSIGNMENTS, CORE GY (Y-AXIS GRADIENT)

X (mm) Y (mm) Type τ (s)
0 15 L 2.30
5 15 L 2.30
10 15 M 1.00
15 15 S 0.50
0 10 L 2.30
5 10 L 2.30
10 10 M 1.00
15 10 S 0.50
0 5 L 2.30
5 5 M 1.00
10 5 S 0.50
15 5 S 0.50
0 0 M 1.00
5 0 M 1.00
10 0 S 0.50
15 0 S 0.50

Gradient principle, Top rows (Y=10,15) slow L-dominant. Bottom rows (Y=0,5) fast S-dominant. Middle transition M. Bottom heating → early output peak. Top heating → late output peak, Skewness proportional to ∂T/∂y..

7.0 UWA-1

Component Specification
Base Pharmaceutical-grade paraffin wax, Tm = 60.0°C ±0.1°C
Latent heat 185 J/g ±5 J/g
Dopant 1 Pristine MWCNTs, Ø10-30 nm, L:1-10 μm, unfunctionalized, >95% purity
Loading 1 2.00 wt% ±0.05 wt%
Dopant 2 n-Tetracontane (C₄₀H₈₂), >99% purity, Tm = 81.0°C ±0.5°C
Loading 2 0.50 wt% ±0.02 wt%
Thermal conductivity (solid) 0.45 W/m·K
Thermal conductivity (liquid) 0.38 W/m·K

7.1 Composite Preparation

Step Action Parameters
1 Melt paraffin 82°C ±2°C, argon atmosphere
2 Add MWCNTs High-shear 10,000 RPM, 30 min, 80-85°C
3 Add tetracontane 5,000 RPM, 15 min, 80°C
4 Ultrasonic probe 20 kHz, 100 W, pulse 5s/2s, 60 min, 78-82°C
5 Degas <1×10⁻² mbar, 80°C, 60 min, until bubble-free
6 Store Sealed, argon-filled, 6-month shelf life

8.0 INFUSION PROTOCOL

Step Action Parameters
1 Clean substrates IPA ultrasonic, 40°C, 15 min → DI water rinse → N₂ dry → vacuum oven 120°C, 2 hr
2 Preheat Substrate to 75°C ±1°C on vacuum hotplate
3 Evacuate <1×10⁻³ mbar, hold 2 hr at 75°C
4 Introduce UWA-1 Via heated manifold, 75°C, sufficient to cover all cavities + 2 mm
5 Backfill Argon to 2.0 bar absolute
6 Pressure hold 30 min at 2.0 bar, 75°C
7 Directional solidification Gradient 5°C/mm across substrate thickness. Cool 0.20°C/min ±0.02°C/min from 75°C to 25°C under 0.5 L/min argon flow
8 Inspect X-ray micro-CT, voxel <5 μm. Zero voids >0.01 mm³ in any cavity. Reject and rework if voids detected.

9.0 THERMAL BUSES

Parameter Specification
Material CVD single-crystal diamond
Dimensions 25.00 mm × 25.00 mm × 0.100 mm ±0.005 mm
Thermal conductivity &gt;1800 W/m·K
Electrical resistivity &gt;10¹² Ω·cm
Surface finish <1 nm Ra, both faces
Quantity per core 2 (top incident face, bottom observer face)

9.1 Bonding

Parameter Specification
Adhesive BNNT-filled epoxy, 5 wt% loading
Bond line thickness <5 μm
Thermal resistance <0.1°C/W
Cure 25°C, 24 hr, vacuum compression 0.5 MPa
Post-cure 60°C, 4 hr, no pressure

10.0 PYROELECTRIC OBSERVER

Parameter Specification
Material z-cut LiTaO₃, single crystal
Dimensions 25.00 mm × 25.00 mm × 0.100 mm ±0.005 mm
Pyroelectric coefficient &gt;2.0 × 10⁻⁴ C/m²·K
Relative permittivity 46 at 1 kHz
Surface finish <1 nm Ra

10.1 Electrodes

Parameter Specification
Adhesion layer Cr, 5 nm ±1 nm
Conductor Au, 100 nm ±10 nm
Bottom electrode Full-area ground plane, Z- face
Top electrodes 16 individual, aligned to cavities
Electrode sizes S: 3.2×3.2 mm, M: 2.2×2.2 mm, L: 1.7×1.7 mm
Alignment tolerance ±10 μm to cavity centerlines
Patterning Photolithography, lift-off
Edge pads 16 signal + 2 ground, 0.5×0.5 mm, 0.8 mm pitch

10.2 Poling

Step Parameters
Temperature 85°C ±1°C
Voltage 100 V DC (Z+ positive), field = 1 MV/m
Hold 30 min at 85°C
Cool 1°C/min to 25°C under field
Remove field At 25°C
Verify Pyroelectric coefficient >2.0 × 10⁻⁴ C/m²·K

11.0 ENCAPSULATION

Parameter Specification
Lid CVD diamond, 25×25×0.100 mm
Seal adhesive BNNT-filled epoxy, <10 μm bond line
Internal atmosphere argon, 6N purity, 1.10 bar absolute at 25°C
Getter Barium flash, 5×5 mm, activated post-seal
Leak rate <1×10⁻⁸ atm·cc/s helium

12.0 CALIBRATION/ TFP...

Step Action Parameters
1 Uniform step 25°C → 30°C in <0.1 s. Record 16 ch at 200 Hz for 10 s. Extract τ per cavity. Verify within ±15% of nominal. Extract sensitivity (mV/°C).
2 Gradient GX Left 30°C / Right 25°C. Record skewness. Calibration point +0.33°C/mm. Reverse for −0.33°C/mm. Fit linear model: ∂T/∂x = a·skewness + b.
3 Gradient GY Top 30°C / Bottom 25°C. Record skewness. Calibration point −0.33°C/mm. Reverse for +0.33°C/mm. Fit linear model: ∂T/∂y = a·skewness + b.
4 Frequency sweep FFT 0.1, 0.2, 0.5, 1.0, 2.0, 5.0 Hz sinusoidal modulation. Record 16×16 coupling matrix.

12.1 Personality Map

  • Core serial number and calibration date
  • τ per cavity (16 values)
  • Sensitivity per cavity (16 values)
  • GX skewness coefficients (a, b)
  • GY skewness coefficients (a, b)
  • FFT coupling matrix (16×16)
  • Thermal offset calibration

13.0 SYSTEM INTEGRATION

Parameter Specification
Configuration 3 cores (FFT, GX, GY) on common thermal stage
Stage Copper, Peltier-controlled, 25.0°C ±0.01°C
Spacing 10 mm between cores
Optics (optional) Ge lens, f/2, 50 mm FL, AR 8-14 μm, FOV 30°×30°
Flex circuit Polyimide, 18 μm Cu traces, 20-pin ZIF, 100 mm length, shielded
Readout 16-ch charge amplifier, 0.1-100 Hz BW, 200 Hz sample rate, 16-bit ADC

13.1 Output Vector

Quantity Source Units
Spatial frequency spectrum FFT Core (16 components) Normalized amplitude
∂T/∂x GX Core °C/mm
∂T/∂y GY Core °C/mm
∇T
θ (gradient direction) atan2(GY,GX) radians
reddit.com
u/Smooth-Month-277 — 7 days ago

OS and SBC Selection

I'd like to create a portable sensor suite with a very lightweight minimal GUI, likely a selection of real-time graphs of various types, as well as file creation, editing, and saving. As far as the sensors, I still haven't decided on what all I plan to add, but I'd like to have a pretty decent range, from the basics like gyroscope, accelerometer, thermometer, barometer, etc. to potentially more complex like an IR camera (complicates the simple GUI a bit,) visual range spectrometer (and beyond?) and a range of RF receivers. The only hardware I have at the moment is a Raspberry Pi 4, but I'm aware it's a more general purpose board, and there could potentially be hardware better suited to a sensor suite. I'm also not sure if an RTOS would work better or if I should stick with a simple GPOS. The simple GUI is something I'd like to make myself, if reasonably possible. If anyone's done or seen another project similar, I'd be interested to see it as well.

reddit.com
u/RadFallout1000 — 7 days ago
▲ 125 r/compsci+6 crossposts

Walks the full cmd/compile pipeline in order: package names, data structures, and the SSA construction that drives inlining, escape analysis, bounds-check elimination, and register allocation, with flags to observe each phase directly.

This one took a while, it's probably the longest thing I've written on this blog. I wanted to do a proper end-to-end walkthrough of cmd/compile: real package names, real data structures, diagrams for the AST and SSA CFG, and the flags you actually need (-m, -m=2, GOSSAFUNC, -S) to observe each phase yourself rather than just take my word for it.

Covers the full pipeline: lexer → parser → type checker → IR lowering → SSA construction → optimization passes (inlining, escape analysis, BCE, nil check elimination, register allocation) → architecture-specific code emission.

Hope it's useful — happy to answer questions or push back on anything that looks wrong.

blog.gaborkoos.com
u/OtherwisePush6424 — 12 days ago