The Dunhuang Culture 敦煌文化 Database
digitalorientalist.com·16h
📜Text Collation
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.com·3d
🔢Reed-Solomon Math
A practical case on why we need the humanities
acoup.blog·1d·
Discuss: Hacker News
🏛Digital humanities
The Library Method: Understanding @cache
dev.to·1d·
Discuss: DEV
Cache Theory
Controlled Release of Microorganisms from Engineered Living Materials
pubs.acs.org·14h·
Discuss: Hacker News
📦METS Packaging
A gentle introduction to Generative AI: Historical perspective
medium.com·4h·
Discuss: Hacker News
🧠Learned Codecs
The Day I Hacked XCTrack
blog.syrac.org·14h·
Discuss: Hacker News
🔐PKI Archaeology
Ship Broken Things
matmul.net·1d·
Discuss: Hacker News
🔗Topological Sorting
Efficient and accurate search in petabase-scale sequence repositories
nature.com·2d·
Discuss: Hacker News
🔄Burrows-Wheeler
Spacetime
en.wikipedia.org·1d·
Discuss: Hacker News
Time Crystals
TCDRM: A Tenant Budget-Aware Data Replication Framework for Multi-Cloud Computing
arxiv.org·1d
💾Storage Replication
Beyond Grid-Locked Voxels: Neural Response Functions for Continuous Brain Encoding
arxiv.org·1d
🧠Neural Codecs
Haskell Weekly Issue 493
haskellweekly.news·1d·
Discuss: Hacker News
🧬Functional Programming
Development of new grouting material offers solution to ancient grotto erosion
phys.org·12h
🏺Computational Archaeology
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org·1d·
Discuss: Hacker News
🔢Reed-Solomon Math