Enhancing Vector Signal Generator Accuracy with Adaptive Polynomial Regression Calibration
dev.toยท6hยท
Discuss: DEV
๐Ÿ“กAudio Modulation
An enough week
blog.mitrichev.chยท23hยท
๐Ÿ“ˆLinear programming
Erlang-Red Walkthrough โ€“ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.comยท5hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
Modern C and initializing an array
subethasoftware.comยท1d
๐Ÿ—‚Data structures
From Static Rate Limiting to Adaptive Traffic Management in Airbnbโ€™s Key-Value Store
medium.comยท1d
๐ŸŒŠStreaming Systems
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.orgยท15h
๐Ÿ“Compression Bounds
APRS over LoRa with RNode | unsigned.io
unsigned.ioยท8h
๐Ÿ“ปHomebrew Protocols
The Why of PGP Authentication
articles.59.caยท6h
๐Ÿ”‘Cryptographic Protocols
Metasploit Wrap Up 10/09/2025
rapid7.comยท22h
๐Ÿ›ก๏ธeBPF Security
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.comยท2d
๐ŸงฌPostgreSQL Forensics
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.orgยท19hยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.comยท2d
๐ŸงชBinary Fuzzing
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.comยท3d
๐Ÿ”ขReed-Solomon Math
Learning from software errors โ€“ Part 3: A Mars probe gets out of control
heise.deยท11h
๐Ÿ“žSession Types
Linux SBCs for development + RE
zetier.comยท1d
๐ŸŽฏEmulator Accuracy
XProc 3 Steps as XSpec Test Helper Functions
medium.comยท2h
๐Ÿ”€XSLT
The Day I Hacked XCTrack
blog.syrac.orgยท4hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Sorting encrypted data without decryption: a practical trick
dev.toยท3hยท
Discuss: DEV
๐Ÿ”Hash Functions
Open Lineage
usenix.orgยท15h
๐Ÿ”ŒInterface Evolution
QUIC! Jump to User Space!
hackaday.comยท3h
๐ŸŒNetwork Protocols