Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🔧 Scheme
Specific
Lisp Dialects, Continuations, Macros, SICP, Guile
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
152155
posts in
24.7
ms
Functional repository pattern in Scheme? Decoupling and
abstracting
the data layer in
Lisp
💎
PureScript
jointhefreeworld.org
·
12h
·
Lobsters
,
Hacker News
Clojure
on
Fennel
part one: Persistent Data Structures
λ
Functional Programming
andreyor.st
·
3d
·
Lobsters
,
Hacker News
State-of-the-Art
Arabic
Language Modeling with Sparse
MoE
Fine-Tuning and Chain-of-Thought Distillation
🔗
Parser Combinators
arxiv.org
·
1d
Little
LaTeX
Pearls
📄
Typst
ionathan.ch
·
2d
udem-dlteam/ribbit
: A portable, compact and extensible Scheme implementation that is fully
R4RS
compliant. This includes closures, I/O, tail calls, first-class continuations and a Read Eval Print Loop (REPL). The
R4RS
Scheme REPL fits inside 6.5Kb !
🎾
Racket
github.com
·
3d
MCP security:
Logging
and
runtime
security measures
🔌
WASI
redhat.com
·
2d
The Many Faces of
flet
:
cl-flet
, cl-labels, and
cl-letf
🔗
Parser Combinators
emacsredux.com
·
4d
Separator-Based
Participation Commitments for Post-Quantum
Attestation
Aggregation
🔄
CRDT
ethresear.ch
·
1d
ClickFix
Malware Uses macOS Script Editor to Deliver Atomic
Stealer
Threat Labs
🔌
WASI
jamf.com
·
2d
Spath
and
Splan
📊
Denotational Semantics
sumato.ai
·
6d
·
Hacker News
,
r/golang
A new highly discriminatory typing scheme for
Treponema
pallidum
reveals similar levels of genetic variability across lineages
🔤
Type Theory
journals.asm.org
·
2d
Massively
parallel in-sensor
skinomorphic
computing
💾
Embedded Systems
nature.com
·
2d
Reformulating
the
SNOVA
Signature Scheme
λ
Functional Programming
eprint.iacr.org
·
6d
A convergence rate for the
entropic
JKO
scheme
🔍
Refinement Types
arxiv.org
·
17h
Using
cgn
+ . instead of
macros
for small repeated edits
✨
Effect Handlers
youtu.be
·
6d
·
r/vim
scan-for-secrets
0.1.1
🔬
Closure Analysis
simonwillison.net
·
5d
Opus's Schelling Steganography Has
Amplifiable
Secrecy Against Weaker
Eavesdroppers
🔢
Modular Arithmetic
lesswrong.com
·
3d
Anamorphic
Encryption with
CCA
Security: A Standard Model Construction
λ
Lambda Calculus
arxiv.org
·
17h
Error Analysis of a
Conforming
FEM for
Multidimensional
Fragmentation Equations
🔬
Closure Analysis
arxiv.org
·
17h
An Efficient Identity-Based Blind
Signature
Scheme from
SM9
🔢
Modular Arithmetic
eprint.iacr.org
·
3d
Loading...
Loading more...
Page 2 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help