๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŽ“ Academic Torrents

Research Data Sharing, Scholarly Communication, Dataset Distribution, P2P Archives

The Peculiar Case of Japanese Web Design
sabrinas.spaceยท1dยท
Discuss: r/programming
๐Ÿ‡ฏ๐Ÿ‡ตJapanese Computing
How to Solve a Problem
henrikkarlsson.xyzยท33mยท
Discuss: Hacker News
โ„๏ธNordic Design Philosophy
Zulip 11.0 Team Chat Brings Message Reminders, Channel Folders
linuxiac.comยท3h
๐ŸŒŠApache Kafka
The Enterprise Experience
churchofturing.github.ioยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿ’พPersistence Strategies
Exploration and dispersal are key traits involved in rapid range expansion, urban bird study finds
phys.orgยท40m
๐ŸŒธBloom Variants
AI Is Reshaping Hacking. No One Agrees How Fast
it.slashdot.orgยท1d
๐Ÿ•ต๏ธVector Smuggling
Quarkโ€™s Outlines: Python Complex Numbers
dev.toยท6hยท
Discuss: DEV
๐ŸงฎZ3 Applications
AI That Customizes Every Email-Is This Worth Building?
news.ycombinator.comยท6hยท
Discuss: Hacker News
๐Ÿ“ŠFeed Optimization
New laptop? Don't forget this $2 privacy essential for students
techradar.comยท2d
๐ŸŒBGP Security
Using Bolt.New and Logto to quickly build your custom login flows
dev.toยท1hยท
Discuss: DEV
๐ŸŒWASI
Moving Eyes
hackster.ioยท12h
โœ‹Tactile Computing
Synthetic Data for Robust Stroke Segmentation
arxiv.orgยท9h
๐Ÿ”Vector Forensics
Pakistani-based malware empire 'punished' software pirates with infostealers, earning millions of dollars in just five years - here's how to stay safe
techradar.comยท1d
๐Ÿดโ€โ˜ ๏ธPiracy
A Coarse-to-Fine Human Pose Estimation Method based on Two-stage Distillation and Progressive Graph Neural Network
arxiv.orgยท9h
๐Ÿ“ŠLearned Metrics
Detecting Untargeted Attacks and Mitigating Unreliable Updates in Federated Learning for Underground Mining Operations
arxiv.orgยท3d
๐ŸŒWARC Mining
Enhanced LBM Simulations via Adaptive Mesh Refinement Optimization with Hybrid Neural Network Control
dev.toยท21hยท
Discuss: DEV
โšกIncremental Computation
Day 1 of experimenting with open source (and I'm already confused)
dev.toยท2hยท
Discuss: DEV
๐ŸŒ€Brotli Internals
MCP-Guard: A Defense Framework for Model Context Protocol Integrity in Large Language Model Applications
arxiv.orgยท9h
๐ŸงชCBOR Fuzzing
Yeah I'm Vibe Coding
dev.toยท1dยท
Discuss: DEV
๐ŸŽ™๏ธWhisper
Families' Vision of Generative AI Agents for Household Safety Against Digital and Physical Threats
arxiv.orgยท9h
๐Ÿ Home Automation
Loading...Loading more...
AboutBlogChangelogRoadmap