-
Hey there!
I belong to an open source security research community, and a member (@0xad3l) has found an issue, but doesn’t know the best way to disclose it.
If not a hassle, might you kindly add a `S…
-
Hey there!
I belong to an open source security research community, and a member (@sudheendra17) has found an issue, but doesn’t know the best way to disclose it.
If not a hassle, might you kindly ad…
-
# 🌟 New model addition - Google PG-19 Models
## Model description
Model checkpoints finally released as discussed in "Efficient Content-Based Sparse Attention with Routing Transformers'
Aurko R…
-
## About your team
- Team name: IVC Forms
- OCTO-DE product owner: Premal Shah
- Product manager: Bo Altes
- Designer: Steven Straily
- Accessibility specialist: Rachael Penfil
- Content writer:
- S…
-
Discussion topic:
Credit for open source software development in academia
Brief description of issue/challenge:
Academia gives credit for citations easily. Traditionally, it is hard to get softw…
-
I think we need a what is on this topic
-
Hi there,
I'm a researcher studying software evolution. As part of my current research, I'm studying the implications of open-sourcing a proprietary software, for instance, if the project succeed in…
-
Hi Noam,
Thanks for the good work on Adversarial Examples for Models of Code. I was trying to reproduce your work but I can not find the repo address in your paper. I found this:
![image](https://u…
-
Hey there!
I belong to an open source security research community, and a member (@bananabr) has found an issue, but doesn’t know the best way to disclose it.
If not a hassle, might you kindly add a …
-
### Model/Pipeline/Scheduler description
Text-to-video diffusion models enable the generation of high-quality videos given text prompts, making it easy to create diverse and individual content. How…