#SilentSunday
johnjohnston.info·9h
🖼️JPEG XL
Flag this post
Drawn to Danger: Windows Graphics Vulnerabilities Lead to Remote Code Execution and Memory Exposure
research.checkpoint.com·9h
💣ZIP Vulnerabilities
Flag this post
Registry Analysis
🔍NTLM Archaeology
Flag this post
Recently
macwright.com·23h
🧬Bitstream Evolution
Flag this post
Physicists Have Mathematically Proven the Universe Is Not a Simulation
🧮Theoretical Computer Science
Flag this post
Making Every 5x5 Nonogram: Part 1
🧮Z3 Solver
Flag this post
Improving Emacs' iCalendar Support
🌳Incremental Parsing
Flag this post
Reactive Tree Management in Nuxt 4: How I Modeled Complex Hierarchies with Pinia
🗄️Database Internals
Flag this post
Neither Consent nor Property: A Policy Lab for Data Law
arxiv.org·2d
🧲Magnetic Philosophy
Flag this post
Smaller Surfaces
📏Code Metrics
Flag this post
Advanced FEP Tube Degradation Modeling via Stochastic Process Calibration
🌡️Preservation Entropy
Flag this post
Bio-Inspired Microvascular Scaffold Optimization via Algorithmic Topology Grading
🌐Computational Topology
Flag this post
Neural active manifolds: nonlinear dimensionality reduction for uncertainty quantification
arxiv.org·2d
🌀Riemannian Computing
Flag this post
Automated Verification of Terrestrial Ecosystem Resilience via Hyperdimensional Network Analysis
🕸️Algebraic Topology
Flag this post
From Classical Models to AI: Forecasting Humidity for Energy and Water Efficiency in Data Centers
towardsdatascience.com·9h
📈Time Series
Flag this post
Loading...Loading more...