Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
π Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
80236
posts in
646.3
ms
Distributed
Knowledge in
Simplicial
Models
arxiv.org
Β·
1d
πΈοΈ
Tarjan Algorithms
FCDP
: Fully
Cached
Data Parallel for Communication-Avoiding Large-Scale Training
arxiv.org
Β·
1d
β‘
Cache-Aware Algorithms
Hyperparameter
Search in Machine Learning
dev.to
Β·
3d
Β·
Discuss:
DEV
π
Search Algorithms
Mastering
the art of
frontend
performance optimization
dev.to
Β·
1d
Β·
Discuss:
DEV
π
Performance Tools
Tip of the Week #158:
Abseil
Associative
containers and contains()
abseil.io
Β·
2d
ποΈ
Type Indexing
Tip
of the Week #148:
Overload
Sets
abseil.io
Β·
2d
π
Borrowing Extensions
TechTok
#12. Navigating privacy in a data-driven world: Simple steps for
protecting
your data and fine-tuning your VPN
adguard.com
Β·
4d
π
Security Types
How to become a
degenerate
hacker
... a beginner's guide
youtube.com
Β·
4d
π
Self-Documenting Code
Clojure
βs Persistent Data Structures:
Immutability
Without the Performance Hit
javacodegeeks.com
Β·
4d
π³
Persistent Data
fast, content-based search for
visited
websites
"
hister.org
Β·
4d
Β·
Discuss:
Hacker News
,
Hacker News
π
Search Algorithms
Flow-Based Programming:
Seminal
Texts and
Theoretical
Foundations
repolex.ai
Β·
4d
Β·
Discuss:
Hacker News
π
Reactive Languages
Show HN:
TalentLyt
β A Forensic AI Built by a Staff Engineer to Catch
AI-Proxies
talentlyt.cloud
Β·
4d
Β·
Discuss:
Hacker News
π°
Capability Machines
19
Shades
of
LockBit
5.0, Inside the Latest Cross-Platform Ransomware: Part 3
levelblue.com
Β·
4d
π‘οΈ
Security Type Systems
**Abstract:** This paper proposes a novel approach to anomaly detection in financial transaction networks leveraging
Hypergraph
Neural Networks (
HGNNs
) and F...
freederia.com
Β·
3d
π·οΈ
Attribute Grammars
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
Β·
4d
Β·
Discuss:
Hacker News
π‘οΈ
Security Type Systems
Redis/Valkey
Replication
Internals
: The Architecture Behind Zero-Copy Command Propagation
frostzt.com
Β·
5d
Β·
Discuss:
Hacker News
,
r/programming
πΎ
Zero-Copy
**Abstract:** This paper explores a novel approach to enhancing key security in
Elliptic
Curve Cryptography (
ECC
) by leveraging insights from the geometric i...
freederia.com
Β·
4d
π
Hash Functions
Mastering
Zcash
maxdesalle.com
Β·
5d
β±οΈ
Real-Time GC
Protecting
Triton
kernel deployments with
cryptographic
signatures
next.redhat.com
Β·
4d
πΎ
Caching Compilers
Three
Investigative
Bottlenecks
β Three New Baseline Capabilities
forensicfocus.com
Β·
3d
β¨
Effect Inference
Loading...
Loading more...
« Page 10
β’
Page 12 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help