Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🕸️ Graph Theory
Network Structure, Graph Algorithms, Connectivity, Traversal
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
73025
posts in
915.0
ms
The
Condensate
Theorem
: Transformers are O(n), Not $O(n^2)$
arxiv.org
·
1d
🔄
Transducers
Generalized
Schr
\"
odinger
Bridge on Graphs
arxiv.org
·
5d
🕸️
GraphBLAS
Service Mesh Architecture (
Istio/Linkerd
)
dev.to
·
1d
·
Discuss:
DEV
⛵
Istio
Recommendation
Algorithms
: The
Quiet
Engine Behind Every Digital Experience
dev.to
·
3d
·
Discuss:
DEV
📈
Prometheus
*Explainable Predictive Modeling of Settlement
Likelihood
in Small Claims
Arbitration
: A Graph‑Neural‑Network and Transformer‑Based Approach*
freederia.com
·
3d
📱
Edge AI
**Abstract:** This paper introduces a novel framework, Hyperdimensional Topological Constraint Optimization (
HTCO
), for enhancing the resilience and
adaptabi
...
freederia.com
·
6d
🕸️
Mesh Networks
Hardness
of
hinted
ISIS from the space-time
hardness
of lattice problems
eprint.iacr.org
·
4d
🔢
Homomorphic Encryption
RFC 9518 -
Centralization
,
Decentralization
, and Internet Standards
datatracker.ietf.org
·
6d
🔄
Distributed Systems
Infrastructure
Maps
gisgeek.app
·
6d
🗺️
OpenStreetMap
A
Pattern
Language
Index
patternlanguageindex.com
·
6d
⬜
Minimalism
The
Limit
in the
Loop
weaviate.io
·
6d
·
Discuss:
Hacker News
🧠
Memory Models
computer graphics, maths, shaders,
fractals
,
demoscene
iquilezles.org
·
6d
🎨
Computer Graphics
Plan–Code–
Execute
:
Designing
Agents That Create Their Own Tools
towardsdatascience.com
·
5d
🎭
Program Synthesis
The Proximity of the
Inception
Score as an Evaluation
Criterion
towardsdatascience.com
·
6d
👁️
Computer Vision
Cause analysis and evolution
characteristics
of different types of railway
accidents
based on system dynamics theory
sciencedirect.com
·
5d
📋
Protocol Design
Cryptanalytic
Extraction of Neural Networks with Various
Activation
Functions
eprint.iacr.org
·
6d
🛡️
AI Security
How to Use
DEVONthink
's
Graph
View
devontechnologies.com
·
11h
🗺️
Treemaps
akki2825/computational-morphology-lit
: A curated collection of papers on computational
morphology
.
github.com
·
1d
·
Discuss:
Hacker News
🔨
Compilers
Towards self-driving
codebasesWe
're making a part of our multi-agent research
harness
available to try today in preview.research
cursor.com
·
4d
·
Discuss:
Hacker News
,
Hacker News
,
Hacker News
⚓
Anchors
Kazakhstan
enters period of deep transformation, President
Tokayev
says
trend.az
·
18m
🌍
Geopolitics
Loading...
Loading more...
« Page 8
•
Page 10 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help