๐ฟ๏ธ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ค AI
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Intel's New LLM-Scaler Beta Update Brings Whisper Model & GLM-4.5-Air Support
phoronix.com
ยท
2d
ยท
Discuss:
r/LocalLLaMA
๐ต
Threat intelligence
Netskope Has Filed for an IPO
sec.gov
ยท
2d
ยท
Discuss:
Hacker News
๐
Cyber security
New Tests and Devices for Early Cancer Detection (2020)
embs.org
ยท
1d
ยท
Discuss:
Hacker News
๐
Cyber security
Rambling reflections one year after quitting my job
experimentallearning.substack.com
ยท
1d
ยท
Discuss:
Substack
๐
Cyber security
x times y
federicopereiro.com
ยท
2d
ยท
Discuss:
Hacker News
๐ต
Threat intelligence
The lottery ticket hypothesis: why neural networks work
nearlyright.com
ยท
6d
ยท
Discuss:
Hacker News
๐ต
Threat intelligence
Designing AI tools that support critical thinking
vaughntan.org
ยท
4d
ยท
Discuss:
Hacker News
๐ต
Threat intelligence
Starting Go (Golang) as My First Language โ Need Help with Beginner Resources
reddit.com
ยท
2d
ยท
Discuss:
r/golang
๐
Cyber security
Iโm creating an open-source application to manage deployment strategies for applications.
reddit.com
ยท
22h
ยท
Discuss:
r/kubernetes
๐
Cyber security
Is Qwen-Image-Edit the 2025 Breakthrough Image-Editing AI
dev.to
ยท
3d
ยท
Discuss:
DEV
๐ต
Threat intelligence
WTF is Hierarchical Temporal Memory.?
dev.to
ยท
14h
ยท
Discuss:
DEV
๐ต
Threat intelligence
ReaLM: Reflection-Enhanced Autonomous Reasoning with Small Language Models
arxiv.org
ยท
5d
๐ต
Threat intelligence
Collaborative Learning-Enhanced Lightweight Models for Predicting Arterial Blood Pressure Waveform in a Large-scale Perioperative Dataset
arxiv.org
ยท
5d
๐ต
Threat intelligence
The Why Bot
dev.to
ยท
5d
ยท
Discuss:
DEV
๐ต
Threat intelligence
Evals Are All You Need: The Definitive Guide to AI Agent Evaluation for Developers
dev.to
ยท
5d
ยท
Discuss:
DEV
๐ต
Threat intelligence
EMNLP: Educator-role Moral and Normative Large Language Models Profiling
arxiv.org
ยท
2d
๐
Cyber security
Active Fault Identification and Robust Control for Unknown Bounded Faults via Volume-Based Costs
arxiv.org
ยท
5d
๐ต
Threat intelligence
Long Chain-of-Thought Reasoning Across Languages
arxiv.org
ยท
3d
๐ต
Threat intelligence
Effect of Data Augmentation on Conformal Prediction for Diabetic Retinopathy
arxiv.org
ยท
3d
๐ต
Threat intelligence
Implicit Hypergraph Neural Network
arxiv.org
ยท
3d
๐ต
Threat intelligence
Loading...
Loading more...
« Page 46
โข
Page 48 »