๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ›๏ธ Byzantine Archiving

Distributed Preservation, Fault Tolerance, Consensus Protocols, Archive Replication

The 19th's Strategic Plan
werd.ioยท4h
๐Ÿ“กFeed Security
Hereโ€™s what could happen if CISA 2015 expires next month
cyberscoop.comยท8h
๐Ÿ›กCybersecurity
How space is becoming the new battlefield between world powers
euronews.comยท18h
๐Ÿ‡ท๐Ÿ‡บRussian Computing
Customizing Lisp REPLs
aartaka.meยท20hยท
Discuss: Lobsters, Hacker News, r/programming
๐ŸšNordic Shell
The Bidirectional Stream Processor: Why Pull Beats Push for Crash Recovery
blog.epsiolabs.comยท4dยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
An Exploratory Study on Crack Detection in Concrete through Human-Robot Collaboration
arxiv.orgยท14h
๐ŸบComputational Archaeology
rook-ceph and replicas
reddit.comยท4dยท
Discuss: r/kubernetes
๐Ÿ”„Sync Engine
Use of a genetic algorithm to find solutions to introductory physics problems
arxiv.orgยท14h
๐Ÿ”ฒCellular Automata
Buy Naver Account in 2025 โ€” And Why You Ought to Too
dev.toยท2hยท
Discuss: DEV
๐Ÿ“ฐRSS Archaeology
Conditional Independence Estimates for the Generalized Nonparanormal
arxiv.orgยท14h
๐Ÿ“Information Geometry
GhostObjects: Instructing Robots by Manipulating Spatially Aligned Virtual Twins in Augmented Reality
arxiv.orgยท14h
๐ŸบComputational Archaeology
Boosting the Robustness-Accuracy Trade-off of SNNs by Robust Temporal Self-Ensemble
arxiv.orgยท14h
๐Ÿง Machine Learning
A Cross-Modal Rumor Detection Scheme via Contrastive Learning by Exploring Text and Image internal Correlations
arxiv.orgยท14h
๐ŸงญContent Discovery
What Two Years of Bootstrapping an AI Startup in India Taught Us
dev.toยท10hยท
Discuss: DEV
๐Ÿ”ŒInterface Evolution
Defects4Log: Benchmarking LLMs for Logging Code Defect Detection and Reasoning
arxiv.orgยท14h
๐Ÿ‘๏ธSystem Observability
Automated Anomaly Detection in Industrial CT Scans via Hyperdimensional Pattern Matching
dev.toยท2dยท
Discuss: DEV
๐Ÿ”Vector Forensics
Multiple Reachability in Linear Dynamical Systems
arxiv.orgยท3d
๐Ÿ”„Finite State Machines
EncryptHub abuses Brave Support in new campaign exploiting MSC EvilTwin flaw
securityaffairs.comยท2d
๐Ÿ”“Hacking
Scalable intelligent document processing using Amazon Bedrock Data Automation
aws.amazon.comยท4d
๐Ÿค–Archive Automation
Humanโ€“AI Copilots for Executives: Building Trustworthy Decision Support
dev.toยท1dยท
Discuss: DEV
๐ŸŒCultural Algorithms
Loading...Loading more...
AboutBlogChangelogRoadmap