๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ‘๏ธ Document OCR

Text Recognition, Historical Manuscripts, Character Segmentation, Paleographic Processing

Thailand: Sex scandal shakes Buddhist faithful
france24.comยท7h
๐ŸŒCultural Computing
Big Ten football projections: Penn State, Ohio State lead the pack ahead of upside surprises
mercurynews.comยท4h
๐ŸงฎKolmogorov Bounds
Claiming warranty service on Apple accessories
sixcolors.comยท4h
๐ŸŽApple Computing
How Exposure Management Can Turn a Torrent of Data into Insight
tenable.comยท9h
๐Ÿ›กCybersecurity
Cauchy coup
leancrew.comยท1d
๐Ÿ“Linear Algebra
Revisiting k-Means: 3 Approaches to Make It Work Better
machinelearningmastery.comยท5d
๐Ÿ“ŠVector Quantization
Netflix uses AI effects for first time to cut costs
madcornishprojectionist.co.ukยท14h
๐Ÿค–Paleographic AI
Iran's capital and surrounding province will shut for a day due to a heat wave
the-independent.comยท6h
โฌœMinimalism
Letters from Our Readers
newyorker.comยท12h
๐Ÿ›๏ธPhilosophy
UK, France and 23 other countries say the war in Gaza โ€˜must end nowโ€™
the-independent.comยท8h
๐Ÿ”Information Retrieval
โ€˜You can make really good stuff โ€“ fastโ€™: new AI tools a gamechanger for film-makers
madcornishprojectionist.co.ukยท14h
๐Ÿ—œ๏ธLZW Variants
Navigating AI Dementia: Strategies for Safe Rollback
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ’พPersistence Strategies
Study reveals foot traffic as surprising driver of river pollution
phys.orgยท6h
๐Ÿ“œDocument Physics
Building Doclyft: An AI-Powered Documentation Generator for Devs
dev.toยท1dยท
Discuss: DEV
๐Ÿš€Indie Hacking
More reliable bioinformatics tools for the study of proteins
phys.orgยท3d
๐ŸงฌCopy Number Variants
SurgeryLSTM: A Time-Aware Neural Model for Accurate and Explainable Length of Stay Prediction After Spine Surgery
arxiv.orgยท4d
๐Ÿง Machine Learning
Foreign overfishing fuels Senegal's deadly migration crisis to Europe
phys.orgยท2h
๐Ÿ“ฐRSS Archaeology
**Essential Python Security Practices: Advanced Techniques to Protect Your Applications from Threats**
dev.toยท1dยท
Discuss: DEV
๐Ÿ›ก๏ธWASM Security
NOCTA: Non-Greedy Objective Cost-Tradeoff Acquisition for Longitudinal Data
arxiv.orgยท4d
โง—Information Bottleneck
Mitigating Object Hallucinations via Sentence-Level Early Intervention
arxiv.orgยท4d
๐Ÿ‘‚Psychoacoustic Coding
Loading...Loading more...
AboutBlogChangelogRoadmap