Enhancing Vector Signal Generator Accuracy with Adaptive Polynomial Regression Calibration
dev.toยท16hยท
Discuss: DEV
๐Ÿ“กAudio Modulation
An enough week
blog.mitrichev.chยท1dยท
๐Ÿ“ˆLinear programming
Erlang-Red Walkthrough โ€“ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.comยท15hยท
Discuss: Hacker News
๐ŸŒProtocol Synthesis
Modern C and initializing an array
subethasoftware.comยท1d
๐Ÿ—‚Data structures
From Static Rate Limiting to Adaptive Traffic Management in Airbnbโ€™s Key-Value Store
medium.comยท1d
๐ŸŒŠStreaming Systems
Exponential Error Bounds for Information Bottleneck Source Coding Problems
arxiv.orgยท1d
๐Ÿ“Compression Bounds
APRS over LoRa with RNode | unsigned.io
unsigned.ioยท18h
๐Ÿ“ปHomebrew Protocols
The Why of PGP Authentication
articles.59.caยท16h
๐Ÿ”‘Cryptographic Protocols
Metasploit Wrap Up 10/09/2025
rapid7.comยท1d
๐Ÿ›ก๏ธeBPF Security
Complex networks-based anomaly detection for financial transactions in anti-money laundering
sciencedirect.comยท2d
๐ŸงฌPostgreSQL Forensics
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.orgยท1dยท
Discuss: Hacker News
๐Ÿ”ขReed-Solomon Math
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing
thezdi.comยท2d
๐ŸงชBinary Fuzzing
Cryptography for the Everyday Developer: Number Theory for Public Key Cryptography
sookocheff.comยท3d
๐Ÿ”ขReed-Solomon Math
Learning from software errors โ€“ Part 3: A Mars probe gets out of control
heise.deยท21h
๐Ÿ“žSession Types
Linux SBCs for development + RE
zetier.comยท1d
๐ŸŽฏEmulator Accuracy
XProc 3 Steps as XSpec Test Helper Functions
medium.comยท12h
๐Ÿ”€XSLT
BQN "Macros" with โ€ขDecompose (2023)
saltysylvi.github.ioยท7hยท
Discuss: Hacker News
๐Ÿฆ€Rust Macros
The Day I Hacked XCTrack
blog.syrac.orgยท14hยท
Discuss: Hacker News
๐Ÿ”PKI Archaeology
Sorting encrypted data without decryption: a practical trick
dev.toยท13hยท
Discuss: DEV
๐Ÿ”Hash Functions
Open Lineage
usenix.orgยท1d
๐Ÿ”ŒInterface Evolution