How We Integrated Downstream Processes and Workflows
Table of Links
Abstract and 1 Introduction
2 Survey with Industry Professionals
3 RQ1: Real-World use cases that necessitate output constraints
4 RQ2: Benefits of Applying Constraints to LLM Outputs a...
What Would a Decentralized Internet Look Like?
\
Many algorithms in today's internet infrastructure are designed to collect and analyze user data, often competing to see who can spy the best. That’s the price we pay to participate in a centraliz...
FreeEval: The Ethical Concerns
Table of Links
Abstract and 1 Introduction
2 Background and 2.1 Automatic Evaluation Methods for LLMs
2.2 Meta-Evaluation of LLMs
3 Design and Implementation and 3.1 Design Principles
3.2 FreeEval Arc...
Reclaiming Control Over Your Digital Identity and Privacy
Photo by Ben Sweet on Unsplash
\
About seven years ago, I worked with digital identity on blockchain. It was an interesting challenge—using smart contracts with federated Ethereum to create a self-s...