Probabilistic Data Structures, Set Membership, False Positives, Space Efficiency

Building a Rules Engine from First Principles
towardsdatascience.com·1d
🔗Combinatory Logic
Flag this post
Oops, My UUIDs Collided
alexsci.com·1h·
Discuss: Hacker News
🧪Binary Fuzzing
Flag this post
The Structure of Data
theprogrammersparadox.blogspot.com·55m·
🗂Data structures
Flag this post
Registry Analysis
windowsir.blogspot.com·6h·
🔍NTLM Archaeology
Flag this post
Notes from RIPE 91
blog.apnic.net·21h
🌐DNS over QUIC
Flag this post
Well-Typed.Com: Case Study: Debugging a Haskell space leak
well-typed.com·20h
🔓Decompilation
Flag this post
Your Transformer is Secretly an EOT Solver
elonlit.com·15h·
Discuss: Hacker News
🧮Kolmogorov Complexity
Flag this post
Enhancing ECG Classification Robustness with Lightweight Unsupervised Anomaly Detection Filters
arxiv.org·16h
🧠Machine Learning
Flag this post
Building a Self-Improving RAG System with Smart Query Routing and Answer Validation
dev.to·7h·
Discuss: DEV
🔍Information Retrieval
Flag this post
Stochastic computing
scottlocklin.wordpress.com·3h
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Flag this post
Java Generics and Collections • Maurice Naftalin & Stuart Marks • GOTO 2025
youtube.com·1d
λLambda Formalization
Flag this post
Best Open Source Observability Solutions
clickhouse.com·1h·
Discuss: Hacker News
📊Homelab Monitoring
Flag this post
Place Capability Graphs: A General-Purpose Model of Rust's Ownership & Borrowing
dl.acm.org·1d·
🦀Rust Borrowing
Flag this post
3 Minutes to Start Your Research in Nearest Neighbor Search
romanbikbulatov.bearblog.dev·2d·
Discuss: Hacker News
📏Range Queries
Flag this post
Advanced Threat Protection (ATP): An Ultimate Guide for Modern SOCs
vmray.com·5h
🛡️eBPF Security
Flag this post
Show HN: Front End Fuzzy and Substring and Prefix Search
github.com·2d·
Discuss: Hacker News
🌳Trie Structures
Flag this post
No Cap, This Memory Slaps: Breaking Through the OLTP Memory Wall
danglingpointers.substack.com·1d·
Discuss: Substack
Hardware Transactional Memory
Flag this post
Cut the Noise, Keep the Signal: The Hidden Cost of Duplicate Reports
hackerone.com·2d
Archive Fixity
Flag this post
When AI Agents Go Rogue: Agent Session Smuggling Attack in A2A Systems
unit42.paloaltonetworks.com·10h
🕵️Vector Smuggling
Flag this post
How We Saved 70% of CPU and 60% of Memory in Refinery’s Go Code, No Rust Required.
honeycomb.io·19h·
📊Performance Profiling
Flag this post