Skip to content

Investment Policy

  • Science
  • Analytics
  • Who is Denis Avetisyan?

Science

Draining the Pool: How Intent-Based Bridges Face New Cross-Chain Attacks

23.02.2026 by Ray Dalio

Across protocol experienced a quantifiable degradation in service during a liquidity exhaustion attack, as evidenced by a rejection of user intents-a direct consequence of constrained resources.

A novel class of ‘liquidity exhaustion’ attacks threatens the security of emerging intent-based cross-chain bridges by exploiting temporary capital shortages.

Categories Science

Modeling Dynamic Systems with Physics-Informed Networks

23.02.2026 by Ray Dalio

A new framework, PHAST, leverages the principles of port-Hamiltonian systems to create stable and interpretable models of complex temporal dynamics from limited observations.

Categories Science

Beyond the Standard Model: Rewriting Quantum Chemistry with Light

23.02.2026 by Ray Dalio

A new analysis reveals that fully accounting for light-matter interactions in quantum chemistry requires a fundamental shift in how we apply coherent-state transformations within coupled cluster theory.

Categories Science

Squeezing More From Less: Sharpening Language Model Performance with Adaptive Scaling

23.02.2026 by Ray Dalio

LATMiX minimizes quantization error by strategically distributing energy both within and between matrix blocks, effectively mitigating the influence of outlier features.

A new quantization technique intelligently reshapes activation distributions to minimize information loss in highly compressed language models.

Categories Science

Beyond Encryption: Securing LINE’s Messaging Future

23.02.2026 by Ray Dalio

A key derivation function establishes a secure and repeatable process for generating cryptographic keys from a seed value, ensuring consistent key generation across different system instantiations and safeguarding sensitive data.

A rigorous analysis of the LINE protocol reveals critical vulnerabilities, prompting the development of a fortified version with enhanced forward secrecy.

Categories Science

Unlocking the Secrets of Exotic Pentaquarks

23.02.2026 by Ray Dalio

New calculations reveal insights into the structure and properties of hidden-charm pentaquarks, potentially explaining recent experimental observations and predicting new states.

Categories Science

Beyond Broadcast: Modeling Distributed Systems with History Constraints

23.02.2026 by Ray Dalio

A new framework for analyzing distributed systems leverages history constraints to define communication protocols and assess their computational complexity.

Categories Science

Squeezing Performance from Reasoning AI on Huawei Hardware

23.02.2026 by Ray Dalio

Quantization of Llama3-8B and DeepSeek-R1-Distill-Qwen-7B models to 4-bit precision, as assessed by layer-wise mean squared error loss, demonstrates a substantial increase in quantization error when deployed on NPU hardware compared to X2000, indicating a performance divergence attributable to the underlying architectural differences between the processors and their impact on numerical precision during inference.

A new study explores how to efficiently run complex artificial intelligence models on Huawei’s Ascend NPUs by reducing the precision of their calculations.

Categories Science

Beyond Isolation: Building Trustworthy Distributed Systems

23.02.2026 by Ray Dalio

Over a forty-five year period, the evolution of distributed security has progressed from early cryptographic protocols-initially focused on confidentiality using techniques like [latex] DES [/latex]-to increasingly complex architectures addressing integrity, availability, and resilience against evolving adversarial threats, culminating in modern approaches leveraging blockchain and zero-knowledge proofs.

A new perspective on distributed security argues for integrated architectures that move beyond treating core properties like privacy and accountability as separate concerns.

Categories Science

Poison Control: Certifiably Robust Machine Learning

23.02.2026 by Ray Dalio

Label flipping attacks on the Halfmoons dataset demonstrate vulnerability to minimal perturbations - specifically, an optimal attack requires only five label flips to significantly disrupt classification accuracy.

New research delivers a complete framework for verifying that machine learning models are truly protected against malicious data manipulation during training.

Categories Science
Older posts
Newer posts
← Previous Page1 … Page18 Page19 Page20 … Page131 Next →
© 2026 Investment Policy • Built with GeneratePress