๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒธ Bloom Filters

Probabilistic Data Structures, Set Membership, False Positives, Space Efficiency

Reasoning about Rare-Event Reachability in Stochastic Vector Addition Systems via Affine Vector Spaces
arxiv.orgยท4h
๐ŸŽฏPerformance Proofs
Inverted Indexes: A Step-by-Step Implementation Guide
chashnikov.devยท19hยท
Discuss: Hacker News
๐Ÿ”BitFunnel
Comparing a red-black tree to a B-tree
nibblestew.blogspot.comยท21hยท
Discuss: Hacker News, nibblestew.blogspot.com
๐ŸŒฒB-tree Variants
Radicle Collaborative Objects
radicle.xyzยท12h
๐Ÿ“ฆContent Addressing
Vector Databases for Data Scientists: What, Why, and When to Use Them
dev.toยท1dยท
Discuss: DEV
๐Ÿ—‚๏ธVector Databases
A Practical (and Incomplete) History of Language Models
obrhubr.orgยท1d
๐ŸงฎKolmogorov Complexity
Complex genetic variation in nearly complete human genomes
nature.comยท16h
๐ŸงฌCopy Number Variants
Serializable Isolation for Snapshot Databases
muratbuffalo.blogspot.comยท5hยท
Discuss: www.blogger.com
๐Ÿ”€CRDT
CVE-2025-25200: this Koa ReDoS is not a serious vulnerability
sjoerdlangkemper.nlยท1d
๐Ÿ“ฆContainer Security
A Regular Expression Matcher Code: Rob Pike, exegesis by Brian Kernighan
cs.princeton.eduยท2d
๐Ÿ”RegEx Engines
DeLLMa: Decision Making Under Uncertainty with Large Language Models
dellma.github.ioยท12hยท
Discuss: Hacker News
๐Ÿ”—Constraint Handling
Lessons from scaling PostgreSQL queues to 100k events per second
rudderstack.comยท17hยท
Discuss: Hacker News
๐ŸงฌPostgreSQL Forensics
Evaluating Ensemble and Deep Learning Models for Static Malware Detection with Dimensionality Reduction Using the EMBER Dataset
arxiv.orgยท4h
๐Ÿฆ Malware Analysis
MetaGreenData: Making Code More Sustainable, One Metadata File at a Time
software.ac.ukยท1d
๐Ÿฆ‹Format Metamorphosis
Small world: The revitalization of small AI models for cybersecurity
news.sophos.comยท22h
๐Ÿ’ปLocal LLMs
Recursive Equations For Imputation Of Missing Not At Random Data With Sparse Pattern Support
arxiv.orgยท1d
๐ŸŒธBloom Variants
Optimize Golang Cryptographic Performance: Hardware Acceleration and Parallel Processing Techniques for 8x Speed Gains
dev.toยท13hยท
Discuss: DEV
๐ŸŒŠStream Ciphers
Inlining in the Glasgow Haskell Compiler:Empirical Investigation and Improvement
era.ed.ac.ukยท1dยท
Discuss: Hacker News
๐Ÿ”—Functional Compilers
Can I trust this paper?
link.springer.comยท2hยท
Discuss: Hacker News
๐Ÿ’งManuscript Watermarks
Algos and Code Performance: Your Code Works but Can It Handle Real Traffic?
beon.techยท17hยท
Discuss: Hacker News
๐ŸŒŠStream Processing
Loading...Loading more...
AboutBlogChangelogRoadmap