Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
80099
posts in
586.1
ms
Polynomial-Time Solutions for Longest Common
Subsequence
Related Problems Between a Sequence and a
Pangenome
Graph
arxiv.org
·
4d
🪢
Rope Data Structures
TrapSuffix
: Proactive Defense Against Adversarial
Suffixes
in Jailbreaking
arxiv.org
·
1d
🏷️
Memory Tagging
Database
Schema
as Code Intelligence
dev.to
·
1d
·
Discuss:
DEV
📈
Query Optimization
Intersection
of Two Linked
Lists
dev.to
·
3d
·
Discuss:
DEV
⏭️
Skip Lists
*Author(s): [Redacted]* *
Affiliation
(s): [Redacted]* *Date: [Redacted]* — ### Abstract We introduce a fully
commercializable
framework that leverages h...
freederia.com
·
3d
🏛️
Elm Architecture
**Abstract:** This paper presents a novel framework for
rigorously
verifying
algorithms claiming to efficiently predict prime number distributions. Current v...
freederia.com
·
6d
🧮
Combinator Calculus
Zero trust in practice: A deep technical dive into going fully
passwordless
in hybrid enterprise
environments
csoonline.com
·
5d
🛡️
Capability Security
When cost models hit the wall
clock
futhark-lang.org
·
6d
🔄
Tail Call Analysis
The
Gumbel-Max
Trick
blog.quipu-strands.com
·
6d
·
Discuss:
Hacker News
🔍
Type Inference
Super speed, super quality: lessons from the
Aptos
Network site launch—Martian Chronicles, Evil
Martians
’ team blog
evilmartians.com
·
6d
💬
Smalltalk VMs
Too Simple To Fail:
Marrying
Nomad,
Caddy
, and Wireguard
blog.tjll.net
·
6d
🛡️
Capability VMs
Stepshield
Achieves 75% Earlier Intervention, Advancing
Rogue
Agent Detection Benchmarks
quantumzeitgeist.com
·
6d
🌊
Gradual Effects
4
self-contained
databases
for your apps
infoworld.com
·
5d
💾
Minimal Databases
RAG Poisoning: How
Attackers
Corrupt
AI Knowledge Bases
instatunnel.my
·
5d
·
Discuss:
r/programming
🛡️
Parser Security
varshithkarkera/cryptofetch
:
CryptoFetch
is a powerful command-line tool that downloads historical cryptocurrency price data from Binance. It features a clean terminal interface with real-time progress tracking and supports all USDT trading pairs available on Binance.
github.com
·
5d
·
Discuss:
DEV
🔢
Bit Manipulation
qcc4cp/qcc
: Source code for the book "Quantum Computing for
Programmers
", Cambridge University Press
github.com
·
5d
·
Discuss:
Hacker News
🔬
Nanopasses
Digital ID done right:
verifiable
claims without the
surveillance
willhackett.uk
·
6d
·
Discuss:
Hacker News
🛡️
Capability Security
The
Heartbeat
of Tetris 🟥🟥🟥🟥: What a
1x1
Pixel Taught Me About Concurrency
qianarthurwang.substack.com
·
6d
·
Discuss:
r/programming
⏱️
Real-Time GC
CP
Systems Explained: The Hidden Cost of Strong
Consistency
blog.ahmazin.dev
·
6d
·
Discuss:
Hacker News
🎯
Ring Buffers
Confused
about Go's escape analysis for
dynamically-sized
values, my test shows they don't escape
go.dev
·
6d
·
Discuss:
r/golang
🗑️
Stack Scanning GC
Loading...
Loading more...
« Page 15
•
Page 17 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help