๐ฟ๏ธ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐จ๐ณ Chinese Computing
GB Character Sets, CJK Text Processing, Cultural Encoding, Great Firewall
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
The Absolute Minimum Every Developer Must Know About Unicode and Character Sets
joelonsoftware.com
ยท
2d
ยท
Discuss:
Hacker News
๐ค
Character Encoding
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Probing Social Identity Bias in Chinese LLMs with Gendered Pronouns and Social Groups
arxiv.org
ยท
1d
๐
Digital humanities
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Build-less manga scanlation workflow: vertical OCR, translation, and layout-preserving typesetting in the browser
dev.to
ยท
4h
ยท
Discuss:
DEV
๐ฏ๐ต
Japanese Computing
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
China issues port crackdown on all Nvidia AI chip imports, says report โ enforcement teams deployed to quash smuggling and investigate data center hardware, tar...
tomshardware.com
ยท
7h
ยท
Discuss:
r/hardware
๐ฅ๏ธ
Terminal Renaissance
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Explicit Lossless Vertex Expanders!
gilkalai.wordpress.com
ยท
9h
๐
Information Crystallography
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
The Dunhuang Culture ๆฆ็ ๆๅ Database
digitalorientalist.com
ยท
6h
๐
Text Collation
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Mind the Gap: Quantifying Vocabulary Mismatch in E-Commerce Site Search
searchhub.io
ยท
1d
ยท
Discuss:
Hacker News
๐
Search Quality
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Turning data into knowledge: How Huawei is upgrading storage for the AI era
techradar.com
ยท
1d
๐พ
Persistence Strategies
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Show HN: Realization Jsmn on a Pure Zig
github.com
ยท
9h
ยท
Discuss:
Hacker News
๐
Concatenative Programming
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
An enough week
blog.mitrichev.ch
ยท
23h
ยท
Discuss:
blog.mitrichev.ch
๐งฎ
Z3 Solver
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
This Week in Security: ID Breaches, Code Smell, and Poetic Flows
hackaday.com
ยท
5h
๐
Hacking
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Hunyuan Image 3.0 โ AI Image Generator (Text-to-Image)
hunyuanimage.online
ยท
1d
ยท
Discuss:
Hacker News
๐ธ
PNG Optimization
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
IASC: Interactive Agentic System for ConLangs
arxiv.org
ยท
15h
๐ณ
Context free grammars
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Senate says Nvidia chips are for America first as China tightens import controls
theregister.com
ยท
2h
ยท
Discuss:
Hacker News
๐ฅ๏ธ
Modern Terminals
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
English - the hottest programming language of the future
dev.to
ยท
1h
ยท
Discuss:
DEV
๐
Language Evolution
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Erlang-Red Walkthrough โ Visual FBP for Telecom: Diameter AAA on Erlang/OTP
blog.tadsummit.com
ยท
5h
ยท
Discuss:
Hacker News
๐
Protocol Synthesis
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Access Control Policy Generation from High-Level Natural Language Requirements
dl.acm.org
ยท
1d
ยท
Discuss:
Hacker News
๐
Language-based security
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
I built a translator for spatial thinking (because I can't interview in Python)
graemefawcett.ca
ยท
10m
ยท
Discuss:
Hacker News
๐
Concatenative Programming
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Love C, Hate C: Web Framework Memory Problems
alew.is
ยท
15h
ยท
Discuss:
Hacker News
๐ฉ
Systems Programming
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Trillion-Scale Goldbach Verification on Consumer Hardware -novel Algorithm [pdf]
zenodo.org
ยท
19h
ยท
Discuss:
Hacker News
๐ข
Reed-Solomon Math
Flag this post
Harmful Content
Off Topic
Low Quality
Spam
Misleading
Duplicate
Loading...
Loading more...
Page 2 »