Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Protocol Design
Network Protocols, Message Formats, Error Handling, State Machines
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
74627
posts in
504.7
ms
Efficient
Benchmarking
of
Logical
Magic State
link.aps.org
ยท
4d
โ
Model Checking
The Secret Life of Python: The Safety Net ('
try
' and '
except
')
dev.to
ยท
2d
ยท
Discuss:
DEV
๐ก๏ธ
Error Handling
The
Intelligibility
Advantage in an Era of
Infinite
Code
dev.to
ยท
1d
ยท
Discuss:
DEV
๐จ
Incremental Compilation
The Design
Process
and
Agile
Development: Part 1
8thlight.com
ยท
4d
๐จ
Design Systems
How Network Operations Teams Use
InfluxDB
to Solve Network Monitoring
Gaps
influxdata.com
ยท
4d
๐
eBPF
The Protocol:
Vitalik
Buterin
โs stark warning on layer-2 roadmap
coindesk.com
ยท
5d
๐
MultiPaxos
From
guardrails
to governance: A CEOโs guide for
securing
agentic systems
technologyreview.com
ยท
5d
๐ก๏ธ
AI Security
Boost LLM Security: automated Red
Teaming
at Scale with
Promptfoo
blog.nviso.eu
ยท
4d
๐ก๏ธ
AI Security
Virtual-Tube-Based
Cooperative
Transport Control for
Multi-UAV
Systems in Constrained Environments
arxiv.org
ยท
3d
๐ธ๏ธ
Mesh Networks
Quantum-Based Resilient Routing in Networks:
Minimizing
Latency
Under Dual-Link Failures
arxiv.org
ยท
4d
โ๏ธ
Quantum Computing
Introduction
to SAFE
safe-docs.erlang-solutions.com
ยท
5d
๐
Security
Beyond Giant Models: Why AI
Orchestration
Is the New
Architecture
kdnuggets.com
ยท
6d
๐ญ
Program Synthesis
Multi-layer defense for LLM agents inspired by
immune
systems (seeking
critique
)
gist.github.com
ยท
5d
ยท
Discuss:
Hacker News
๐ก๏ธ
AI Security
gauteh/lieer
: Fast email-fetching, sending, and two-way tag synchronization between notmuch and GMail
github.com
ยท
4d
๐
Poem
**Abstract:** This paper introduces a novel
methodology
, Adaptive Crisis Communication Network Optimization through Multi-Modal Semantic Analysis and
Reinfor
...
freederia.com
ยท
5d
๐ฌ
Gossip Protocols
**Abstract:** International cooperation,
particularly
within humanitarian aid logistics, faces escalating
complexities
due to rapidly changing global events,...
freederia.com
ยท
5d
โฑ๏ธ
Temporal Workflow
Telling the Story of
Chameleon
Hash
Functions: A 27-Year Review
eprint.iacr.org
ยท
5d
๐ฆ
Cuckoo Hashing
Limit concurrent HTTP connections to avoid
crippeling
overload
emcken.dk
ยท
2d
๐
TCP Congestion
Making a Hardware Accelerated Live TV Player from Scratch in C: HLS Streaming,
MPEG-TS
Demuxing
, H.264 Parsing, and Vulkan Video Decoding
blog.jaysmito.dev
ยท
20h
ยท
Discuss:
Hacker News
,
r/programming
๐ฌ
WebCodecs
6 things I always do after
setting
up a new
SBC
(and you should too)
xda-developers.com
ยท
1d
๐
Hardware Security
Loading...
Loading more...
« Page 16
โข
Page 18 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help