Skip to content

Investment Policy

  • Science
  • Analytics
  • Who is Denis Avetisyan?

Science

Beyond Arithmetic: How Logic Networks Weather Data Corruption

25.03.2026 by Ray Dalio

A neural network architecture utilizes layers of binary lookup tables, where successive layers are addressed by prior outputs, ultimately culminating in a population count that determines class activations.

A new approach to neural network design, leveraging Boolean logic instead of continuous values, dramatically improves resilience to bit-flip errors in parameters.

Categories Science

Beyond Confidence Scores: Gauging true AI Prediction Reliability

25.03.2026 by Ray Dalio

Classification performance on dataset D4, achieved using the Naive Bayes Classifier (NBC), is visualized through a point cloud where correct predictions are indicated in green and incorrect predictions in red, revealing the distribution of classification accuracy across the dataset.

New research explores how combining robustness and uncertainty quantification offers a more comprehensive approach to evaluating the dependability of machine learning models.

Categories Science

Outsourcing Control with Secure Computation

25.03.2026 by Ray Dalio

The modified [latex]\mathsf{Mult}.\mathsf{Online}[/latex] subroutine processes signals according to a defined flow, with the time index τ intentionally omitted to enhance clarity and focus on the core computational steps.

A new protocol enables secure and efficient outsourcing of control computations using cryptographic techniques.

Categories Science

Building Secure Systems: A Blueprint for Cryptographic Upgrades

25.03.2026 by Ray Dalio

Modern software relies heavily on cryptography, and keeping those systems secure requires a proactive, architecture-driven approach to managing and migrating cryptographic components.

Categories Science

Hidden Errors in Encrypted Data: A Critical Weakness in Homomorphic Encryption

25.03.2026 by Ray Dalio

Homomorphic encryption, while promising for secure data processing, exhibits a critical fragility; even a single-bit hardware fault can induce a precipitous decline in accuracy, as demonstrated in a cancer detection service, highlighting the inherent vulnerability of complex systems to subtle degradation over time.

New research reveals that fully homomorphic encryption, despite its promise of secure computation, is surprisingly susceptible to subtle data corruption arising from hardware faults.

Categories Science

Securing Control: Quantum Encryption for Next-Gen Systems

25.03.2026 by Ray Dalio

A system of quantum-encrypted Model Predictive Control distributes computation-sensor identification and encryption of state and affine offset, cloud-based evaluation of the encrypted affine law, and actuator decryption via shared quantum keys-to extend operational lifespan through secure, distributed processing.

A new approach combines quantum key distribution with model predictive control to enhance privacy and reduce computational demands in networked control applications.

Categories Science

Orchestrating Microservices with Quantum Inspiration

25.03.2026 by Ray Dalio

The system, subjected to a simulated shock, initiates a safeguard mode as cross-system trust [latex]\bar{\lambda}(t)[/latex] diminishes, while the Q-GARS mechanism effectively contains queue backlog surges and rapidly restores capacity to near-zero levels, demonstrating resilience under stress.

A new framework leverages the principles of quantum optimization to enhance the speed and reliability of microservice deployments across cloud and edge environments.

Categories Science

When AI Forgets Truthfully: Poisoning the Memories of Intelligent Agents

25.03.2026 by Ray Dalio

As artificial intelligence systems increasingly rely on learned memories, a new vulnerability emerges: the deliberate corruption of those memories, with potentially devastating consequences.

Categories Science

Beyond Orchestration: Building Resilient Microservices with Choreography

25.03.2026 by Ray Dalio

A new runtime system, Accompanist, leverages decentralized sagas to improve the performance and scalability of microservice architectures.

Categories Science

Beyond Bounds: Tighter Memory Safety with PRISM

25.03.2026 by Ray Dalio

The performance of SPEC benchmarks reveals the inevitable accrual of memory overhead as systems mature, a characteristic indicative not of failure, but of the persistent entropy inherent in all computational processes.

A new approach to object bounds protection, PRISM, offers a compelling balance between performance and precision in safeguarding against memory errors.

Categories Science
Older posts
Newer posts
← Previous Page1 … Page5 Page6 Page7 … Page155 Next →
© 2026 Investment Policy • Built with GeneratePress