Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81667
posts in
269.5
ms
FCDP
: Fully
Cached
Data Parallel for Communication-Avoiding Large-Scale Training
arxiv.org
·
20h
⚡
Cache-Aware Algorithms
Practical
Refinement
Session Type Inference (
Extended
Version)
arxiv.org
·
20h
📞
Session Types
Mastering
the art of
frontend
performance optimization
dev.to
·
1d
·
Discuss:
DEV
📈
Performance Tools
**Pulse‑Sequence Tuning for Fault‑Tolerant
Exponentiation
in
Shor
’s Algorithm on Transmon Qubits**
dev.to
·
2d
·
Discuss:
DEV
🔬
Nanopasses
TechTok
#12. Navigating privacy in a data-driven world: Simple steps for
protecting
your data and fine-tuning your VPN
adguard.com
·
4d
🔐
Security Types
Tip of the Week #176:
Prefer
Return Values to Output
Parameters
abseil.io
·
2d
⚡
Interpreter Optimization
How to become a
degenerate
hacker
... a beginner's guide
youtube.com
·
4d
📚
Self-Documenting Code
What Should Go Into the C++
Standard
Library
abseil.io
·
2d
🧸
Toy Compilers
fast, content-based search for
visited
websites
"
hister.org
·
4d
·
Discuss:
Hacker News
,
Hacker News
🔍
Search Algorithms
Show HN:
TalentLyt
– A Forensic AI Built by a Staff Engineer to Catch
AI-Proxies
talentlyt.cloud
·
4d
·
Discuss:
Hacker News
🏰
Capability Machines
19
Shades
of
LockBit
5.0, Inside the Latest Cross-Platform Ransomware: Part 3
levelblue.com
·
4d
🛡️
Security Type Systems
**Abstract:** This paper proposes a novel approach to anomaly detection in financial transaction networks leveraging
Hypergraph
Neural Networks (
HGNNs
) and F...
freederia.com
·
3d
🏷️
Attribute Grammars
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
4d
·
Discuss:
Hacker News
🛡️
Security Type Systems
Redis/Valkey
Replication
Internals
: The Architecture Behind Zero-Copy Command Propagation
frostzt.com
·
5d
·
Discuss:
Hacker News
,
r/programming
💾
Zero-Copy
**Abstract:** This paper explores a novel approach to enhancing key security in
Elliptic
Curve Cryptography (
ECC
) by leveraging insights from the geometric i...
freederia.com
·
4d
🔗
Hash Functions
Mastering
Zcash
maxdesalle.com
·
5d
⏱️
Real-Time GC
Protecting
Triton
kernel deployments with
cryptographic
signatures
next.redhat.com
·
4d
💾
Caching Compilers
Three
Investigative
Bottlenecks
– Three New Baseline Capabilities
forensicfocus.com
·
3d
✨
Effect Inference
Data-Oriented
Programming for
Java
: Beyond Records
openjdk.org
·
4d
📊
Row Polymorphism
Mastering
millisecond
latency
and millions of events: The event-driven architecture behind the Amazon Key Suite
aws.amazon.com
·
5d
📦
Message Serialization
Loading...
Loading more...
« Page 10
•
Page 12 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help