Feeds to Scour
SubscribedAll
Scoured 72637 posts in 488.8 ms
Building Tamper-Evident Audit Trails for Algorithmic Trading: A Deep Dive into VCP v1.1
dev.to·2d·
Discuss: DEV
🌳Merkle Trees
Preview
Report Post
"Range as a Key" is the Key! Fast and Compact Cloud Block Store Index with RASK
arxiv.org·1d
📋Columnar Storage
Preview
Report Post
Experiments on Reward Hacking Monitorability in Language Models
lesswrong.com·52m
🔓Binary Exploitation
Preview
Report Post
Anticoncentration in Clifford Circuits and Beyond: From Random Tensor Networks to Pseudomagic States
link.aps.org·22h
⚛️Quantum Computing
Preview
Report Post
understanding LSM trees via read, write, and space amplification
bitsxpages.com·6h
🌲LSM Trees
Preview
Report Post
allisson/go-pwdhash: Modern, extensible, and secure password hashing for Go.
github.com·3d·
Discuss: r/golang
⚖️Consistent Hashing
Preview
Report Post
Support me with advice and feedback
hash-scanner-1.onrender.com·3h·
Discuss: DEV
🌐IndieWeb
Preview
Report Post
Free papers, get your free papers here!
esat.kuleuven.be·10h
🔢Homomorphic Encryption
Preview
Report Post
Beyond the Geometric Curse: High-Dimensional N-Gram Hashing for Dense Retrieval
arxiv.org·48m
🎯Locality-Sensitive Hashing
Preview
Report Post
Build Your Own Key-Value Storage Engine—Week 6
read.thecoder.cafe·16h
#️⃣Hash Tables
Preview
Report Post
Postmortem on TreeTracker Join: Simple, Optimal, Fast
zhu45.org·1d·
Discuss: Hacker News
🔗Join Algorithms
Preview
Report Post
Vulnerability-Lookup
db.gcve.eu·54m
🛡️Error Handling
Preview
Report Post
Hornet UTXO(1): A custom, constant-time, highly parallel UTXO database
delvingbitcoin.org·3d
🌲CedarDB
Preview
Report Post
Show HN: A real-time poker chip tracker built as a PWA (No signup required)
poker.beavergrow.com·11h·
Discuss: Hacker News
🎚️PAPI
Preview
Report Post
How Static Analysis Can Expose Personal Data Hidden in Source Code
hackernoon.com·17h
🔬Static Analysis
Preview
Report Post
Introducing VulHunt: A High-Level Look at Binary Vulnerability Detection
binarly.io·1d
📊Criterion.rs
Preview
Report Post
Alice and Bob in Wonderland - Identity and authority without servers (2024)
herbcaudill.com·23h·
Discuss: Hacker News
🔒Security
Preview
Report Post
A Novel Side-channel Attack That Utilizes Memory Re-orderings (U. of Washington, Duke, UCSC et al.)
semiengineering.com·11h
🔄Hardware Transactional Memory
Preview
Report Post
Retrieve and Rerank: Personalized Search Without Leaving Postgres
paradedb.com·1d
📊Vectorized Query Execution
Preview
Report Post
SignHash: The Future of Contracts
osradar.com·14h
xxHash
Preview
Report Post

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help