๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
โœ… Document Verification

Format Proofs, Archive Correctness, Preservation Logic, Type-safe Storage

PAIRS: Parametric-Verified Adaptive Information Retrieval and Selection for Efficient RAG
arxiv.orgยท3h
๐Ÿ“ŠMulti-vector RAG
Detection Engineering: Practicing Detection-as-Code โ€“ Validation โ€“ Part 3
blog.nviso.euยท2d
โœ…Archive Validation
My blog on zero-knowledge cryptography
kaw101010.github.ioยท6hยท
Discuss: Hacker News
๐Ÿ”Quantum Security
AI-Driven Artifact Deconstruction & Reconstruction via Multi-Modal Knowledge Graph Harmonization
dev.toยท2hยท
Discuss: DEV
๐ŸบComputational Archaeology
How To Solve Every Programming Problem
blog.codeminer42.comยท12h
๐Ÿ“Interval Arithmetic
Testing PowerSync with Jepsen for Causal Consistency and More
github.comยท11hยท
Discuss: Hacker News
๐Ÿ—„๏ธPostgreSQL WAL
An easy-to-implement, arena-friendly hash map
nullprogram.comยท10hยท
Discuss: Lobsters
๐Ÿ”Hash Functions
CFP: Ethical AI in GLAM: Challenges and Opportunities for Digital Stewardship
archivespublishing.comยท1d
๐Ÿ›Digital humanities
Analysing Snapshot Isolation
muratbuffalo.blogspot.comยท1dยท
Discuss: www.blogger.com
๐ŸŒณPersistent Data Structures
PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.beยท2d
โš—๏ธAlgebraic Coding
A do-or-die moment for the scientific enterprise โ€“ Reese Richardson
reeserichardson.blogยท1h
๐ŸŽ“Academic Torrents
We went from unauthenticated to arbitrary RCE in CyberArk Conjur
cyata.aiยท27mยท
Discuss: Hacker News
๐ŸŽซKerberos Attacks
Relative Completeness of Incorrectness Separation Logic
arxiv.orgยท2d
๐Ÿง Separation Logic
Three challenges in machine-based reasoning
amazon.scienceยท1dยท
Discuss: Hacker News
๐ŸงฎTheorem Proving
A Snapshot of IIIF 2025: Key Takeaways from the Annual Conference
dpconline.orgยท23h
๐Ÿ›๏ธPREMIS
Hierarchical Verification of Speculative Beams for Accelerating LLM Inference
arxiv.orgยท3h
๐Ÿ’ปLocal LLMs
Qualifiers on Hypertext Links (1991)
w3.orgยท12hยท
Discuss: Hacker News
๐Ÿ”—Hypertext Systems
Accelerating FedRAMP Compliance with Docker Hardened Images
docker.comยท16h
๐Ÿ“ฆContainer Security
Generating Inputs for Grammar Mining using Dynamic Symbolic Execution
arxiv.orgยท3h
๐Ÿฆ€Rust Macros
Consistency over Availability: How rqlite Handles the CAP theorem
philipotoole.comยท14hยท
Discuss: Hacker News
๐Ÿ›ก๏ธByzantine Fault Tolerance
Loading...Loading more...
AboutBlogChangelogRoadmap