🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ’¨ Cache Analysis

Performance Archaeology, Access Patterns, Memory Hierarchies, Optimization Forensics

Vibe Coding Casino: Rise of programming by slot machine
evrim.zoneΒ·12hΒ·
Discuss: Lobsters, Hacker News
πŸš€Indie Hacking
Icechunk 1.0: Production-Grade Cloud-Native Array Storage Is Here
earthmover.ioΒ·9hΒ·
Discuss: Hacker News
🧊Arctic Storage
So why don't we pick the optimal query plan?
vondra.meΒ·2dΒ·
Discuss: Hacker News
πŸš€Query Optimization
You Should Run a Certificate Transparency Log
words.filippo.ioΒ·3dΒ·
Discuss: Lobsters, Hacker News
🌳Archive Merkle Trees
Feint and Attack: Attention-Based Strategies for Jailbreaking and Protecting LLMs
arxiv.orgΒ·2d
🎯Threat Hunting
JECQ: Smart, Open-Source Compression for FAISS Usersβ€”6x Compression Ratio, 85% Accuracy
dev.toΒ·1dΒ·
Discuss: DEV
πŸ“ŠQuantization
Nouveau NAK Lands A Big Improvement For NVIDIA Kepler GPUs: As Much As 2.5x Faster
phoronix.comΒ·12h
🎯Emulator Accuracy
Understanding Garbage Collection: How Modern Programming Languages Manage Memory
dev.toΒ·3dΒ·
Discuss: DEV
🧠Memory Allocators
Machine Learning Fundamentals: confusion matrix with python
dev.toΒ·1dΒ·
Discuss: DEV
πŸ”—Constraint Handling
A Unified Ontology for Scalable Knowledge Graph-Driven Operational Data Analytics in High-Performance Computing Systems
arxiv.orgΒ·2d
πŸ•ΈοΈNeo4j
Machine Learning Fundamentals: cross validation with python
dev.toΒ·12hΒ·
Discuss: DEV
πŸ“Code Metrics
The Impact of Event Data Partitioning on Privacy-aware Process Discovery
arxiv.orgΒ·2d
🧬PostgreSQL Forensics
AI Tooling, Evolution and the Promiscuity of Modern Developers
redmonk.comΒ·13hΒ·
Discuss: Hacker News
πŸ”„Language Evolution
MagiC: Evaluating Multimodal Cognition Toward Grounded Visual Reasoning
arxiv.orgΒ·1h
πŸ“ŠLearned Metrics
LISTEN: Lightweight Industrial Sound-representable Transformer for Edge Notification
arxiv.orgΒ·1h
🎡Audio ML
PotentRegion4MalDetect: Advanced Features from Potential Malicious Regions for Malware Detection
arxiv.orgΒ·1d
🦠Malware Analysis
Data-Star.dev – v1 and Beyond
data-star.devΒ·14hΒ·
Discuss: Hacker News
🏺ZIP Archaeology
$k$-means considered harmful: On arbitrary topological changes in Mapper complexes
arxiv.orgΒ·2d
πŸ•ΈοΈAlgebraic Topology
Time Space Breakthrough, Ancient Memory Systems & An I-Ching Inspired Hyper-Stack Scheduler
hackernoon.comΒ·4d
⚑Cache Theory
Async Ruby Is the Future of AI Apps (and It's Already Here)
paolino.meΒ·1dΒ·
Discuss: Lobsters, Hacker News, Hacker News
🌊Stream Processing
Loading...Loading more...
AboutBlogChangelogRoadmap