Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔗 Hash Algorithms
Collision Resistance, Performance, Hash Tables, Cryptographic
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
81141
posts in
1.95
s
**Pulse‑Sequence Tuning for Fault‑Tolerant
Exponentiation
in
Shor
’s Algorithm on Transmon Qubits**
dev.to
·
1d
·
Discuss:
DEV
🔬
Nanopasses
Building
Reliable
AI Applications: A
Validation
Strategy
dev.to
·
20h
·
Discuss:
DEV
✅
Configuration Validation
Tip of the Week #158:
Abseil
Associative
containers and contains()
abseil.io
·
1d
🗂️
Type Indexing
DFlash
: Block Diffusion for Flash
Speculative
Decoding
arxiv.org
·
3d
📋
JSON Parsing
Straggler-Aware
Coded
Polynomial
Aggregation
arxiv.org
·
5d
🔢
Algebraic Datatypes
Tip
of the Week #148:
Overload
Sets
abseil.io
·
1d
🔗
Borrowing Extensions
How to become a
degenerate
hacker
... a beginner's guide
youtube.com
·
3d
📚
Self-Documenting Code
fast, content-based search for
visited
websites
"
hister.org
·
3d
·
Discuss:
Hacker News
,
Hacker News
🔍
Search Algorithms
I Solved an
OhSint
TryHackMe
Challenge as a Beginner — Here’s Everything I learned
medium.com
·
1d
🛡️
Security Type Systems
Show HN:
TalentLyt
– A Forensic AI Built by a Staff Engineer to Catch
AI-Proxies
talentlyt.cloud
·
3d
·
Discuss:
Hacker News
🏰
Capability Machines
**Abstract:** This paper introduces a novel framework, Automated Protocol Verification and Optimization via Multi-Modal Data Fusion and
Recursive
HyperScore
...
freederia.com
·
2d
💓
Live Variable Analysis
19
Shades
of
LockBit
5.0, Inside the Latest Cross-Platform Ransomware: Part 3
levelblue.com
·
3d
🛡️
Security Type Systems
**Abstract:** This paper proposes a novel approach to anomaly detection in financial transaction networks leveraging
Hypergraph
Neural Networks (
HGNNs
) and F...
freederia.com
·
3d
🏷️
Attribute Grammars
The
Trojan
horse
in your cluster: a deep dive into container image security
andreafortuna.org
·
3d
·
Discuss:
Hacker News
🛡️
Security Type Systems
Data-Oriented
Programming for
Java
: Beyond Records
openjdk.org
·
3d
📊
Row Polymorphism
Mastering
Zcash
maxdesalle.com
·
4d
⏱️
Real-Time GC
Protecting
Triton
kernel deployments with
cryptographic
signatures
next.redhat.com
·
3d
💾
Caching Compilers
Mastering
millisecond
latency
and millions of events: The event-driven architecture behind the Amazon Key Suite
aws.amazon.com
·
4d
📦
Message Serialization
MoaV
: Multi-Protocol Internet Censorship
Circumvention
Stack
moav.sh
·
5d
·
Discuss:
Hacker News
🌐
Network Protocols
UDP
vs. TCP in Multiplayer Gaming: State
Synchronization
and Lag Compensation
systemdr.substack.com
·
3d
·
Discuss:
r/programming
🌍
HTTP Servers
Loading...
Loading more...
« Page 8
•
Page 10 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help