🐿️ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
👑 Coq Tactics
Dependent Types, Proof Development, Ltac Programming, Mathematical Verification
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
Grammatical errors make prompt injections more likely
heise.de
·
58m
⚡
Proof Automation
Dependency Management with Uv in Kubeflow Pipelines
fabridamicelli.github.io
·
1h
·
Discuss:
Hacker News
📦
Container Security
Adversarial Examples Are Not Bugs, They Are Superposition
livgorton.com
·
19h
·
Discuss:
Hacker News
🧠
Machine Learning
Make and SQL: An old new way for Data Science workloads
vasvir.wordpress.com
·
20h
·
Discuss:
Hacker News
🦀
Rust Macros
Paying attention to feature distribution alignment (pun intended)
alexshtf.github.io
·
2d
·
Discuss:
Hacker News
📐
Linear Algebra
Introduction to Artificial Neural Networks – Part 1 (2013)
theprojectspot.com
·
10h
·
Discuss:
Hacker News
🧠
Machine Learning
Reloading classes in python and shared borders
andrewpwheeler.com
·
1d
·
Discuss:
Hacker News
🦀
Rust Macros
Deep Think with Confidence
arxiviq.substack.com
·
2d
·
Discuss:
Substack
💻
Local LLMs
Context Engineering ( RAG 2.0): The Next Chapter in GenAI
medium.com
·
5h
·
Discuss:
Hacker News
🌀
Brotli Internals
Creating Wikipedia Search Embeddings with a Gaia Node
dev.to
·
1d
·
Discuss:
DEV
🏛
Wikidata
Qt for MOSA: FACE Conformant Qt for Aerospace and Defense Software
qt.io
·
2h
⚡
SMT Applications
Analysis of Harpy's Constrained Trotting and Jumping Maneuver
arxiv.org
·
1d
🌀
Differential Geometry
modelSolver: A Symbolic Model-Driven Solver for Power Network Simulation and Monitoring
arxiv.org
·
1d
✨
Algebraic Effects
A Praxis of Influence: Framing the Observation and Measurement of Information Power
arxiv.org
·
10h
📰
Content Curation
Using AI to build an AI Security Product
dev.to
·
21h
·
Discuss:
DEV
⚡
Proof Automation
SWiFT: Soft-Mask Weight Fine-tuning for Bias Mitigation
arxiv.org
·
10h
📊
Rate-Distortion Theory
Using Gemini CLI as a Subagent for Claude Code
aicodingtools.blog
·
2d
·
Discuss:
Hacker News
⚡
Proof Automation
Auditing Approximate Machine Unlearning for Differentially Private Models
arxiv.org
·
10h
🛡️
Differential Privacy
Benchmarking GPT-5 vs Claude 4 Sonnet on 200 Requests
dev.to
·
23h
·
Discuss:
DEV
⚙️
Compression Benchmarking
Enhanced UAV Path Planning Using the Tangent Intersection Guidance (TIG) Algorithm
arxiv.org
·
10h
📊
Computational Geometry
Loading...
Loading more...
« Page 6
•
Page 8 »