Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐๏ธ Hash Tables
Robin Hood Hashing, Cuckoo Hashing, Open Addressing, Load Factors
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
185124
posts in
13.2
ms
Consistent
Hashing
dev.to
ยท
9h
ยท
Discuss:
DEV
๐
Hash Algorithms
Distinguishing
Power of
4-Legendrian
Permutation Racks
arxiv.org
ยท
23h
๐จ
Graph Coloring
Recurrent Private Set Intersection for Unbalanced Databases with
Cuckoo
Hashing and Leveled
FHE
papers.cool
ยท
1d
๐ธ
Bloom Indexing
Introduction to
Bloom
Filters
hur.st
ยท
1d
ยท
Discuss:
DEV
๐ธ
Bloom Filters
Efficient algorithms for mining top-k high
occupancy
itemsets
sciencedirect.com
ยท
1d
๐ธ
Bloom Indexing
Analytics
By
Ashbo3n
medium.com
ยท
6h
๐ก๏ธ
Taint Analysis
komrad36/CRC
: Fastest
CRC32
for x86, Intel and AMD, + comprehensive derivation and discussion of various approaches
github.com
ยท
1d
๐ฆ
Compact Data
NSHEDB
: Noise-Sensitive
Homomorphic
Encrypted Database Query Engine
arxiv.org
ยท
23h
๐
Hash Functions
๐ The
Evasion
of Simple File
Hashing
dev.to
ยท
3d
ยท
Discuss:
DEV
๐
Hash Algorithms
๐ฅ Optimizing
nested
array operations in PHP: from O(
3n
) to O(n)
yellowduck.be
ยท
1d
๐ณ
Tree Shaking
Efficient and
Portable
Mixture-of-Experts
Communication
research.perplexity.ai
ยท
7h
๐
JSON Parsing
digital
forensics
โ
torrent
file analysis for windows!
medium.com
ยท
2h
๐
Deduplication
Show HN: Break past
cryptography
in
seconds
stateofutopia.com
ยท
1d
ยท
Discuss:
Hacker News
๐
Hash Functions
All your (data)base are belong to us:
Characterizing
Database Ransom(
ware
) Attacks
papers.cool
ยท
1d
๐ก๏ธ
Security Type Systems
IaC
in AWS with
canned
templates, price estimates, low-code, CLI
stacktape.com
ยท
13h
๐ฌ
Smalltalk VMs
The
unreasonable
effectiveness of
S-Expressions
nim-lang.org
ยท
1d
ยท
Discuss:
Hacker News
๐
Symbol Tables
Optimizing
Recommendation Systems with
JDK
โs Vector API
netflixtechblog.com
ยท
2h
๐
SIMD Programming
The
185-Microsecond
Type
Hint
blog.sturdystatistics.com
ยท
6h
ยท
Discuss:
Lobsters
,
Hacker News
,
r/programming
โก
Interpreter Optimization
PSI-COMMIT โ Cryptographic commitment scheme with
HMAC-SHA256
and Bitcoin timestamps, all crypto runs client-side (MIT licensed)
psicommit.com
ยท
6h
ยท
Discuss:
r/coding
๐
Hash Functions
How to Check 10 Million
Usernames
in Under 1
Millisecond
github.com
ยท
1d
ยท
Discuss:
DEV
๐ธ
Bloom Filters
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help