🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎵 Acoustic Fingerprinting

Audio Identification, Perceptual Hashing, Music Information Retrieval, Signal Processing

Hard Drive Screwdriver Recognition
hddheadtools.com·1d
💾Disk Utilities
Challenges Facing Information Management in Emerging Countries’ Government Agencies
info.aiim.org·1d
🔄Archival Workflows
Hunting for Secrets in Plain Sight: Leveraging Internal Logging and Monitoring Services
praetorian.com·2d
🏺Kerberos Archaeology
Inside Jeffrey Epstein’s Forgotten AI Summit
wired.com·1h·
Discuss: r/technews
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Spotify's lax privacy means anyone can see the Vice President's song choices
engadget.com·1d
🎵Audio Codecs
Show HN: I built a voice-first tool for Twitter, pivoted to cursor for X
x11.social·19h·
Discuss: Hacker News
📰RSS Archaeology
Privacy-First Research with OpenSAFELY • Eli Holderness & Hannes Lowette
youtube.com·3d
🔒Privacy Archives
Encrypted Client Hello Approved for Publication
feistyduck.com·1d·
Discuss: Hacker News
🌐NetworkProtocols
Researchers map DNA markers tied to stuttering, opening doors for early intervention
phys.org·1h
🤖Grammar Induction
Leading the Charge: Frost & Sullivan Recognizes The Next Phase of MDR Powered by Agentic AI
sentinelone.com·1d
🎫Kerberos History
Among loud noise, a brassy and bright voice can help speakers be understood, study finds
phys.org·3d
📄Document Phonetics
ZeRO by hand with a 4-parameter model
dev.to·3h·
Discuss: DEV
⚡SIMD Optimization
The Compliance Crisis: Why Your Enterprise Meeting Data is a Ticking Time Bomb
dev.to·3h·
Discuss: DEV
⚖️Legal Compliance
Generative imaging for radio interferometry with fast uncertainty quantification
arxiv.org·2d
✅Lossless Bounds
Leveraging Trustworthy AI for Automotive Security in Multi-Domain Operations: Towards a Responsive Human-AI Multi-Domain Task Force for Cyber Social Security
arxiv.org·2d
🔍Vector Forensics
Chain-of-Cooking:Cooking Process Visualization via Bidirectional Chain-of-Thought Guidance
arxiv.org·2d
🧮Algorithmic Cooking
5 Critical Metrics Every AI Evaluation Framework Must Have for Success
dev.to·1d·
Discuss: DEV
🤖AI Curation
Anyone Can Jailbreak: Prompt-Based Attacks on LLMs and T2Is
arxiv.org·2d
🧪Binary Fuzzing
RestoreAI - Pattern-based Risk Estimation Of Remaining Explosives
arxiv.org·3d
🔍Vector Forensics
MapDiffusion: Generative Diffusion for Vectorized Online HD Map Construction and Uncertainty Estimation in Autonomous Driving
arxiv.org·2d
🌊Streaming Algorithms
Loading...Loading more...
AboutBlogChangelogRoadmap