Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81123
posts in
536.7
ms
**Pulse‑Sequence Tuning for Fault‑Tolerant
Exponentiation
in
Shor
’s Algorithm on Transmon Qubits**
dev.to
·
1d
·
Discuss:
DEV
🔬
Nanopasses
Building
Reliable
AI Applications: A
Validation
Strategy
dev.to
·
22h
·
Discuss:
DEV
✅
Configuration Validation
Tip of the Week #158:
Abseil
Associative
containers and contains()
abseil.io
·
1d
🗂️
Type Indexing
TechTok
#12. Navigating privacy in a data-driven world: Simple steps for
protecting
your data and fine-tuning your VPN
adguard.com
·
3d
🔐
Security Types
DFlash
: Block Diffusion for Flash
Speculative
Decoding
arxiv.org
·
3d
📋
JSON Parsing
Straggler-Aware
Coded
Polynomial
Aggregation
arxiv.org
·
5d
🔢
Algebraic Datatypes
Tip
of the Week #148:
Overload
Sets
abseil.io
·
1d
🔗
Borrowing Extensions
How to become a
degenerate
hacker
... a beginner's guide
youtube.com
·
3d
📚
Self-Documenting Code
Sampling the
Oxford
CS
Library
blog.computationalcomplexity.org
·
4d
·
Discuss:
blog.computationalcomplexity.org
🗑️
Stack Scanning GC
fast, content-based search for
visited
websites
"
hister.org
·
3d
·
Discuss:
Hacker News
,
Hacker News
🔍
Search Algorithms
Flow-Based Programming:
Seminal
Texts and
Theoretical
Foundations
repolex.ai
·
3d
·
Discuss:
Hacker News
🌊
Reactive Languages
I Solved an
OhSint
TryHackMe
Challenge as a Beginner — Here’s Everything I learned
medium.com
·
1d
🛡️
Security Type Systems
Show HN:
TalentLyt
– A Forensic AI Built by a Staff Engineer to Catch
AI-Proxies
talentlyt.cloud
·
3d
·
Discuss:
Hacker News
🏰
Capability Machines
**Abstract:** This paper introduces a novel framework, Automated Protocol Verification and Optimization via Multi-Modal Data Fusion and
Recursive
HyperScore
...
freederia.com
·
2d
💓
Live Variable Analysis
19
Shades
of
LockBit
5.0, Inside the Latest Cross-Platform Ransomware: Part 3
levelblue.com
·
3d
🛡️
Security Type Systems
**Abstract:** This paper proposes a novel approach to anomaly detection in financial transaction networks leveraging
Hypergraph
Neural Networks (
HGNNs
) and F...
freederia.com
·
3d
🏷️
Attribute Grammars
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
3d
·
Discuss:
Hacker News
🛡️
Security Type Systems
Data-Oriented
Programming for
Java
: Beyond Records
openjdk.org
·
3d
📊
Row Polymorphism
Mastering
Zcash
maxdesalle.com
·
4d
⏱️
Real-Time GC
Protecting
Triton
kernel deployments with
cryptographic
signatures
next.redhat.com
·
3d
💾
Caching Compilers
Loading...
Loading more...
« Page 8
•
Page 10 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help