Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81486
posts in
795.4
ms
SPPAM
: Signature Pattern Prediction and Access-Map
Prefetcher
arxiv.org
·
4d
⚡
Cache-Aware Algorithms
Evaluating and Enhancing the
Vulnerability
Reasoning
Capabilities
of Large Language Models
arxiv.org
·
13h
🔄
Subinterpreters
Mastering
the art of
frontend
performance optimization
dev.to
·
1d
·
Discuss:
DEV
📈
Performance Tools
**Pulse‑Sequence Tuning for Fault‑Tolerant
Exponentiation
in
Shor
’s Algorithm on Transmon Qubits**
dev.to
·
1d
·
Discuss:
DEV
🔬
Nanopasses
Tip of the Week #158:
Abseil
Associative
containers and contains()
abseil.io
·
1d
🗂️
Type Indexing
TechTok
#12. Navigating privacy in a data-driven world: Simple steps for
protecting
your data and fine-tuning your VPN
adguard.com
·
4d
🔐
Security Types
Tip
of the Week #148:
Overload
Sets
abseil.io
·
1d
🔗
Borrowing Extensions
How to become a
degenerate
hacker
... a beginner's guide
youtube.com
·
4d
📚
Self-Documenting Code
Clojure
’s Persistent Data Structures:
Immutability
Without the Performance Hit
javacodegeeks.com
·
4d
🌳
Persistent Data
fast, content-based search for
visited
websites
"
hister.org
·
4d
·
Discuss:
Hacker News
,
Hacker News
🔍
Search Algorithms
Show HN:
TalentLyt
– A Forensic AI Built by a Staff Engineer to Catch
AI-Proxies
talentlyt.cloud
·
4d
·
Discuss:
Hacker News
🏰
Capability Machines
**Abstract:** This paper introduces a novel framework, Automated Protocol Verification and Optimization via Multi-Modal Data Fusion and
Recursive
HyperScore
...
freederia.com
·
3d
💓
Live Variable Analysis
19
Shades
of
LockBit
5.0, Inside the Latest Cross-Platform Ransomware: Part 3
levelblue.com
·
3d
🛡️
Security Type Systems
**Abstract:** This paper proposes a novel approach to anomaly detection in financial transaction networks leveraging
Hypergraph
Neural Networks (
HGNNs
) and F...
freederia.com
·
3d
🏷️
Attribute Grammars
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
3d
·
Discuss:
Hacker News
🛡️
Security Type Systems
Redis/Valkey
Replication
Internals
: The Architecture Behind Zero-Copy Command Propagation
frostzt.com
·
4d
·
Discuss:
Hacker News
,
r/programming
💾
Zero-Copy
Mastering
Zcash
maxdesalle.com
·
5d
⏱️
Real-Time GC
Data-Oriented
Programming for
Java
: Beyond Records
openjdk.org
·
4d
📊
Row Polymorphism
Protecting
Triton
kernel deployments with
cryptographic
signatures
next.redhat.com
·
4d
💾
Caching Compilers
Three
Investigative
Bottlenecks
– Three New Baseline Capabilities
forensicfocus.com
·
3d
✨
Effect Inference
Loading...
Loading more...
« Page 9
•
Page 11 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help