Skip to content

Investment Policy

  • Science
  • Analytics
  • Who is Denis Avetisyan?

Science

Taming the Quantum Ghost: Automated Flakiness Detection in Quantum Software

11.03.2026 by Ray Dalio

An automated pipeline systematically identifies and diagnoses quantum errors, dissecting the origins of system instability to pinpoint the root causes of computational failure.

As quantum software grows in complexity, researchers have developed an automated pipeline to identify and diagnose the root causes of unreliable, or ‘flaky’, tests.

Categories Science

Bridging Quantum and Classical Security: A New Link Between Codes

11.03.2026 by Ray Dalio

Researchers have established a surprising connection between quantum error-correcting codes and a class of classically-inspired codes used in secure multi-party computation.

Categories Science

false Positives in Automated Code Repair

11.03.2026 by Ray Dalio

Current methods for evaluating automated vulnerability repair tools are significantly overestimating their success rates, masking critical flaws in patched code.

Categories Science

Sensing Spin: Quantum Geometry Reveals a Hidden Helix

11.03.2026 by Ray Dalio

Spin textures-specifically Rashba, persistent spin helix, and Dresselhaus states-exhibit a striking enhancement of all quantum metric components [latex]g_{\mu\nu}[/latex] when Rashba and Dresselhaus strengths equalize, signaling a unique signature of the persistent spin helix state and demonstrating how geometric properties emerge from spin-orbit interactions.

Researchers have discovered a way to sensitively detect and characterize a persistent spin helix in materials by leveraging the quantum metric, a geometric property of quantum systems.

Categories Science

Resilient Analog Computing: Taming Noise with Minimal Redundancy

11.03.2026 by Ray Dalio

This review explores techniques for building robust analog computing systems by leveraging error-correcting codes that maintain signal integrity with remarkably low overhead.

Categories Science

Shrinking Giants: A New Approach to Efficient Large Language Models

10.03.2026 by Ray Dalio

The study contrasts approaches to linear layer computation, demonstrating that while LLM.int8() and L2QER utilize mixed-precision schemes-INT8/FP16 and INT4/INT8 respectively, with separate computation paths-the proposed SERQ method achieves a unified computation path leveraging a saliency-guided low-rank matrix and either INT4 or mixed-precision FP4, potentially streamlining the process.

Researchers have developed a novel method for dramatically reducing the size of large language models without sacrificing accuracy, paving the way for faster and more accessible AI.

Categories Science

Beyond Software Trust: Securing Embedded Systems from the Ground Up

10.03.2026 by Ray Dalio

Skadi’s architecture compartmentalizes subsystems and employs a specialized loader to establish a robust security model; trusted components-including a fault handler designed for controlled system halts and time-limited trapdoor/proxy mechanisms-operate alongside memory-mapped I/O capabilities delegated by the loader, collectively ensuring system integrity through carefully managed privilege and access control as represented by the flow of calls between subsystems.

A new hardware-software co-design eliminates the need for a runtime software trusted computing base, offering a fundamentally more secure approach to embedded system protection.

Categories Science

Beyond ACID: Securing the Future of Transactional Systems

10.03.2026 by Ray Dalio

The study presents a taxonomy for categorizing research papers focused on transaction security, providing a structured classification of the field's existing literature.

A comprehensive survey reveals the evolving security landscape of transaction processing and proposes a new framework to address the demands of modern, complex applications.

Categories Science

Scaling Post-Quantum Networks: A New Approach to Mempool Propagation

10.03.2026 by Ray Dalio

Researchers have developed a novel attestation relay system that significantly reduces bandwidth overhead, enabling more efficient and scalable post-quantum cryptographic networks.

Categories Science

Finding the Keys: AI-Powered Discovery of Cryptographic Software

10.03.2026 by Ray Dalio

Researchers are leveraging the power of artificial intelligence to automatically identify software components that handle sensitive cryptographic operations.

Categories Science
Older posts
Newer posts
← Previous Page1 … Page23 Page24 Page25 … Page155 Next →
© 2026 Investment Policy • Built with GeneratePress