🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
👑 Dependent Haskell

Singletons, Type-level Programming, GADTs, Kind Polymorphism

Symbolic-numeric programming in scientific computing
dspace.mit.edu·9h
🧬Functional Programming
Python Fundamentals: comparison chaining
dev.to·1d·
Discuss: DEV
📏Code Metrics
Proving theorems using Julia's types (or, a mini-Lean in Julia)
lmao.bearblog.dev·1d·
Discuss: Hacker News
⚔️Lean Theorem
Fixed-Point-Oriented Programming: A Concise and Elegant Paradigm
arxiv.org·8h
💻Programming languages
Records and the ‘with’ operator, redux
codeblog.jonskeet.uk·16h
🛡️Proof-Carrying Archives
Step-debugging Docker Compose NestJS services
akrabat.com·1d
📦Container Security
Morty: Scaling Concurrency Control with Re-Execution
muratbuffalo.blogspot.com·19h·
Discuss: www.blogger.com
🌳Persistent Data Structures
Your Signal, Their Data: Privacy Analysis of Wireless-Scanning SDKs in Android
dspace.networks.imdea.org·17h·
Discuss: Hacker News
📦Container Security
GHC Developer Blog: GHC 9.10.3-rc1 is now available
haskell.org·2d
🔬Refinement Types
Everything You Need To Know About Redux Down in a hole uncovering why you would use it, no excuses now!
blog.codeminer42.com·16h
🌊Streaming Systems
Bun, WASM and Rust Projects with GitHub Actions
vectronic.io·18h·
Discuss: Hacker News
🦀Rust Macros
haskell/vector
github.com·2d
🧬Functional Programming
How JIT builds of CPython work
savannah.dev·15h·
Discuss: Hacker News
📝Concrete Syntax
Creating and using pass tickets on z/OS.
colinpaice.blog·19h
🛡️eBPF Security
Superimposed codes, take three
blog.sesse.net·4h
🔢Bitwise Algorithms
Contraction Hierarchies: HMC Clinic Project Recap
blog.appliedcomputing.io·1d·
Discuss: Lobsters, Hacker News
🎯Performance Proofs
Strong Goldbach in 2nd-order logic under standard semantics, semantically closed
medium.com·11h·
Discuss: Hacker News
🧮Constraint SMT
A roboticist's journey with JAX: Finding efficiency in optimal control and simulation
developers.googleblog.com·18h
⚡Effectful Programming
Data Leakage and Redundancy in the LIT-PCBA Benchmark
arxiv.org·8h
⚡Performance Mythology
Interprocedural Analysis: Catch nil Dereferences Before They Crash Your Code
blog.jetbrains.com·2d·
Discuss: Hacker News
🔒Type Safety
Loading...Loading more...
AboutBlogChangelogRoadmap