Adapting classical deception theory to cyber counterintelligence: challenges and opportunities
tandfonline.comΒ·5h
πŸ‡ΈπŸ‡ͺSwedish Cryptanalysis
The Why of PGP Authentication
articles.59.caΒ·1d
πŸ”‘Cryptographic Protocols
Show HN: Built a complete personal finance app with AI at 18
wealth-ai.inΒ·5hΒ·
Discuss: Hacker News
πŸ”—Data Provenance
OBCache: Optimal Brain KV Cache Pruning for Efficient Long-Context LLM Inference
arxiv.orgΒ·1d
πŸ’»Local LLMs
In-Depth Analysis: "Attention Is All You Need"
dev.toΒ·1dΒ·
Discuss: DEV
🧠Intelligence Compression
πŸš€ From Rejection to Reinvention: How I Built an AI That Finds My Jobs
dev.toΒ·10hΒ·
Discuss: DEV
πŸ‡¨πŸ‡³Chinese Computing
Why Self-Host?
romanzipp.comΒ·2dΒ·
Discuss: Hacker News
🏠Personal Archives
Relational Database Distillation: From Structured Tables to Condensed Graph Data
arxiv.orgΒ·2d
πŸ“ŠGraph Databases
Context Engineering for Coding Agents
hackernoon.comΒ·12h
🌳Incremental Parsing
AI Reddit Sensational Video Summarizer & Shorts Extractor:
dev.toΒ·18hΒ·
Discuss: DEV
πŸ€–Archive Automation
Show HN: Lore Engine – Turn 10-hour lectures into 2 hours of comprehensive notes
github.comΒ·1dΒ·
Discuss: Hacker News
πŸ“„Document Streaming
Differential Privacy for Adaptive Weight Aggregation in Federated Tumor Segmentation
arxiv.orgΒ·2d
🀐Secure Multiparty
GoMem is a high-performance memory allocator library for Go
github.comΒ·1d
🧠Memory Allocators
Memgoose – An In-Memory Mongoose Impersonator
github.comΒ·5hΒ·
Discuss: Hacker News
πŸ”„Sync Engine
Zelos Tech Manages Hundreds of Millions of Files for Autonomous Driving with JuiceFS
dev.toΒ·1dΒ·
Discuss: DEV
πŸ’ΎProxmox Storage
Dynamic Adaptive Redundancy Allocation via Hierarchical Bayesian Optimization
dev.toΒ·20hΒ·
Discuss: DEV
πŸ’ΎStorage Replication
Building an AI Internal Linking Plugin for WordPress
dev.toΒ·4hΒ·
Discuss: DEV
πŸŒ€Brotli Internals
Fast-Convergent Proximity Graphs for Approximate Nearest Neighbor Search
arxiv.orgΒ·3d
πŸ“Range Queries