Ruh-roh. DDR5 memory vulnerable to new Rowhammer attack
theregister.comยท1h
๐Ÿท๏ธMemory Tagging
Nunchuk founder, Hugo, on filter debate: Believe in PoW
stacker.newsยท1dยท
Discuss: X
๐Ÿ”„Deduplication
LiveNews.co.nz | Page 1044
livenews.co.nzยท1d
๐Ÿ“กErlang BEAM
Data Seeps Out of Us (furialog)
furia.comยท14h
๐Ÿ indieweb
Is IP fragmentation still considered vulnerable?
blog.apnic.netยท1d
๐Ÿ“กProtocol Stacks
User Agreement
accesswdun.comยท1d
๐Ÿ”Ownership Types
Bitrig's Swift Interpreter: From Code to Bytecode
bitrig.appยท13hยท
Discuss: Hacker News
๐Ÿฆ‰Swift Interpreters
System Instruction Fixed Point
funcall.blogspot.comยท11hยท
๐Ÿ’ฌInteractive REPLs
Myth Busting: Why "Innocent Clicks" Don't Exist in Cybersecurity
unit42.paloaltonetworks.comยท7h
๐Ÿ›ก๏ธParser Security
Topological Sort: Managing Mutable Structures in Haskell
mmhaskell.comยท1d
๐ŸชขRope Data Structures
Spring Batch Tutorial Part #5
dev.toยท18hยท
Discuss: DEV
๐ŸงตForth Threading
Modern Data Visualization Tools: A Comprehensive Guide to Streamlit, Dash, and Bokeh
dev.toยท5hยท
Discuss: DEV
๐Ÿ“ˆEarley Parsing
ResidualViT for Efficient Temporally Dense Video Encoding
arxiv.orgยท2h
๐Ÿ”Lens Libraries
Interpretable Data Mining of Follicular Thyroid Cancer Ultrasound Features Using Enhanced Association Rules
arxiv.orgยท2h
โœจEffect Inference
High-Energy Concentration for Federated Learning in Frequency Domain
arxiv.orgยท2h
๐Ÿ”ML Language
Unlock 'Magic' Optimization: Smarter Search When Blindfolded by Arvind Sundararajan
dev.toยท1dยท
Discuss: DEV
๐Ÿ”Fuzzy Indexing
A Novel Recurrent Neural Network Framework for Prediction and Treatment of Oncogenic Mutation Progression
arxiv.orgยท2h
โœจEffect Inference
Publishing to PyPI: My ML Preprocessing Package for Newbies
dev.toยท16hยท
Discuss: DEV
๐Ÿ”ML Language
Pleasant Imperative Program Proofs with GallinaC
arxiv.orgยท2h
๐Ÿ“œProof Languages