bombata053's Top FindsLoading...
Calling Jank from C
mauricio.szabo.link·12h
💣Binary Exploitation
Flag this post
Show HN: Yansu, Serious Coding
twitter.com·1d·
Discuss: Hacker News
💻programming
Flag this post
Mathematics solves problems by pen and paper. CS helps us to go far beyond that
cacm.acm.org·5d·
Discuss: Hacker News
⏱️Computational Complexity
Flag this post
Entropy in algorithm analysis
11011110.github.io·5d
⏱️Computational Complexity
Flag this post
Playing Around with ARM Assembly
blog.nobaralabs.com·3d·
Discuss: Hacker News
💣Binary Exploitation
Flag this post
When Models Lie, We Learn: Multilingual Span-Level Hallucination Detection withPsiloQA
dev.to·7h·
Discuss: DEV
Flag this post
Antarys is a hackable vector database with built in embedding generation that can be directly embedded in any go projects
reddit.com·10h·
Discuss: r/golang
Flag this post
Rasterizer Project - Part 4: Triceratops Wireframe
dev.to·2d·
Discuss: DEV
🎨Computer Graphics
Flag this post
Statistical Properties of Rectified Flow
arxiv.org·1d
🔢Numerical Methods
Flag this post
Beginner’s Guide to .NET Development
dev.to·3d·
Discuss: DEV
🔬Static Analysis
Flag this post
Why Was Programming Created? From Passion to Financial Gain
dev.to·1d·
Discuss: DEV
💻programming
Flag this post
A self-hosted Security Operations Center in a box to avoid vendor lock
github.com·7h·
💣Binary Exploitation
Flag this post
Perceptions of AI Bad Behavior: Variations on Discordant Non-Performance
arxiv.org·11h
λFunctional Programming
Flag this post
Fantastic (small) Retrievers and How to Train Them: mxbai-edge-colbert-v0 TechReport
paperium.net·14h·
Discuss: DEV
📈Optimization
Flag this post
Code Smell 313 - Workslop Code
dev.to·3d·
Discuss: DEV
💻programming
Flag this post
Exceptions in Cranelift and Wasmtime
bytecodealliance.org·1d
🔬Static Analysis
Flag this post
Non-recursively deleting a binary tree in constant space: Traversal with parent pointers
devblogs.microsoft.com·2d·
Discuss: r/cpp
🌳Red-Black Trees
Flag this post