.NET: Avoid Using Guid.CreateVersion7
๐ฆBinary Formats
Flag this post
**Automated Tractographic Atlas Generation via Iterative Refinement of Diffusion Tensor Fields**
๐ฌDeep Learning
Flag this post
Building a Secure DAL: Composable Multi-Tenancy Filtering with C# and Linq2Db
๐งMaterialize
Flag this post
Everyone has a plan until they get lied to the face
lesswrong.comยท1h
๐ฆFolly
Flag this post
Confidentiality in a Card-Based Protocol Under Repeated Biased Shuffles
arxiv.orgยท4d
#๏ธโฃHash Tables
Flag this post
Show HN: FPGA Based IBM-PC-XT
๐Hardware Security
Flag this post
MongoDB Drivers and Network Compression
๐
WiredTiger
Flag this post
How Does Digital Trust Actually Work? A Deep Dive into the Science of Secrecy
๐Cryptography
Flag this post
SoK: Systematizing a Decade of Architectural RowHammer Defenses Through the Lens of Streaming Algorithms
arxiv.orgยท3d
๐งMemory Barriers
Flag this post
Odd-Cycle-Packing-treewidth: On the Maximum Independent Set problem in odd-minor-free graph classes
arxiv.orgยท4h
๐ณFenwick Trees
Flag this post
Adaptive Data Analysis for Growing Data
arxiv.orgยท1d
๐Time-Series Databases
Flag this post
An Efficient and Almost Optimal Solver for the Joint Routing-Assignment Problem via Partial JRA and Large-{\alpha} Optimization
arxiv.orgยท4h
๐Dynamic Programming
Flag this post
Separating QMA from QCMA with a classical oracle
arxiv.orgยท1d
โ๏ธQuantum Computing
Flag this post
Loading...Loading more...