Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
🧮 SMT Solvers
Specific
Z3, CVC5, Satisfiability, Constraint Solving, Automated Reasoning
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
170876
posts in
12.4
ms
Toward a
Uniform
Algorithm and
Uniform
Reduction for
Constraint
Problems
🧩
Constraint Programming
arxiv.org
·
5d
A
Dumb
Introduction to
z3
🔮
Folly Futures
ar-ms.me
·
1d
·
Lobsters
,
Hacker News
A
perfectable
programming
language
🔨
Compiler Design
news.ycombinator.com
·
1d
·
Hacker News
The Lean Programming Language and
Theorem
Prover
🏗️
Cranelift
leodemoura.github.io
·
3d
·
Hacker News
From
bytecode
to bytes: automated magic
packet
generation
🔍
Linux BPF
blog.cloudflare.com
·
6d
·
Hacker News
Jamming as a topological
satisfiability
transition with contact number
hyperuniformity
and criticality
🔢
Homomorphic Encryption
pnas.org
·
6d
Public Key Encryption from High-Corruption
Constraint
Satisfaction
Problems
🔢
Homomorphic Encryption
arxiv.org
·
14h
Planted-solution
SAT and Ising benchmarks from integer
factorization
⚖️
Y-Fast Tries
arxiv.org
·
14h
Hypergraph
Neural Networks Accelerate
MUS
Enumeration
📊
HyperLogLog
arxiv.org
·
1d
FM-Agent: Scaling
Formal
Methods to Large Systems via LLM-Based
Hoare-Style
Reasoning
📐
TLA+
arxiv.org
·
14h
Learning from
Contrasts
:
Synthesizing
Reasoning Paths from Diverse Search Trajectories
🎯
Vector Search
arxiv.org
·
14h
A
parallel
and distributed fixed-point quantum search algorithm for solving
SAT
problems
⚛️
Quantum Computing
arxiv.org
·
14h
SMB algebras II: On the Constraint Satisfaction Problem over
Semilattices
of Mal'
cev
Blocks
🧩
Constraint Programming
arxiv.org
·
6d
Guiding
Symbolic
Execution with Static Analysis and LLMs for Vulnerability Discovery
🔍
KLEE
arxiv.org
·
5d
A Multi-Agent Framework for Automated Exploit Generation with
Constraint-Guided
Comprehension
and Reflection
🛡️
AI Security
arxiv.org
·
6d
Symetra
: Visual Analytics for the Parameter Tuning Process of
Symbolic
Execution Engines
🔍
KLEE
arxiv.org
·
6d
Program Analysis Guided LLM Agent for
Proof-of-Concept
Generation
🎭
Program Synthesis
arxiv.org
·
4d
Inference-Time Code Selection via Symbolic
Equivalence
Partitioning
🌳
Instruction Selection
arxiv.org
·
5d
Broken Quantum: A
Systematic
Formal
Verification Study of Security Vulnerabilities Across the Open-Source Quantum Computing Simulator Ecosystem
⚛️
Quantum Computing
arxiv.org
·
5d
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Save / unsave
s
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help