🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎼 Acoustic Analysis

Sound Authentication, Audio Verification, Voice Forensics, Frequency Investigation

Why Generative AI Needs A New Kind of Security Solution
thenewstack.io·54m
🏠Homelab Security
Commodore 64 on New FPGA
hackaday.com·1d
🕹️Hardware Emulation
Using dimensional analysis to estimate the energy released by an atomic bomb
physicsteacher.blog·4h·
Discuss: Hacker News
🌡️Archive Physics
Rao Reading Algorithm
raohacker.com·2h·
Discuss: Hacker News
🧠Intelligence Compression
The Joy of Being on Call for Payment Systems
news.alvaroduran.com·8h·
Discuss: Hacker News
👁️System Observability
Sploitlight: Analyzing a Spotlight-based macOS TCC vulnerability
microsoft.com·23h·
Discuss: Lobsters, Hacker News
🏺ZIP Archaeology
Visual Object Tracking Challenge: How to Offer a Working Solution in 24 Hours Using Multimodal LLM
cacm.acm.org·2h
🎬Video Codecs
Automatic Cough Analysis for Non-Small Cell Lung Cancer Detection
arxiv.org·1d
🧠Machine Learning
Mastering NLP with spaCY — Part 1
towardsdatascience.com·1h
📝Text Parsing
AI Relies on Human-Expertise and Instructions
labs.adaline.ai·7h·
Discuss: Hacker News
⚡Proof Automation
SCORPION: Addressing Scanner-Induced Variability in Histopathology
arxiv.org·11h
📄Document Digitization
DeepJIVE: Learning Joint and Individual Variation Explained from Multimodal Data Using Deep Learning
arxiv.org·11h
🌀Riemannian Computing
Python OpenAI API create Pinecone embeddings from PDF documents and RAG examples
github.com·20h·
Discuss: Hacker News
⚡Proof Automation
NIRS: An Ontology for Non-Invasive Respiratory Support in Acute Care
arxiv.org·11h
🗂️Information Architecture
Show HN: Whisper at 1.58 bits with custom kernels for edge inference
medium.com·1d·
Discuss: Hacker News
📊Quantization
Pic2Diagnosis: A Method for Diagnosis of Cardiovascular Diseases from the Printed ECG Pictures
arxiv.org·11h
👁️OCR Verification
Scattered Spider targets VMware ESXi in using social engineering
securityaffairs.com·1d
🎫Kerberos Exploitation
The Subtle Art of Herding Cats: Why AI Agents Ignore Your Rules (Part 1 of 4)
dev.to·1d·
Discuss: DEV
⚡Proof Automation
SwiftPad: AI Powered Transcription with AssemblyAI
dev.to·1d·
Discuss: DEV
🎙️Whisper
aakash's data mining(therotical)
dev.to·1d·
Discuss: DEV
📄Text Mining
Loading...Loading more...
AboutBlogChangelogRoadmap