๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”ง Error Correction

Reed-Solomon, BCH Codes, Hamming Distance, Forward Error Correction

'Microsoft Was Freaking Out': An Oral History of the L0pht
decipher.scยท1dยท
Discuss: Hacker News
๐Ÿ”“Hacking
Should you use AsyncLocalStorage? (2023)
eytanmanor.medium.comยท2dยท
Discuss: Hacker News
๐Ÿ“ฒsyncthing
Inverting the Xorshift128 random number generator
littlemaninmyhead.wordpress.comยท5dยท
Discuss: Hacker News, r/programming
๐ŸŒŠStream Ciphers
Imputation Techniques for Missing Data in R
dev.toยท1dยท
Discuss: DEV
๐Ÿ“ŠCount-Min Sketch
Beyond Correctness: Harmonizing Process and Outcome Rewards through RL Training
arxiv.orgยท2d
๐Ÿ”—Constraint Handling
Advanced spectral clustering for heterogeneous data in credit risk monitoring systems
arxiv.orgยท3d
๐ŸŒŠSpectral Clustering
Multimodal AI: Beyond Single-Mode Intelligence
dev.toยท13hยท
Discuss: DEV
๐Ÿค–Advanced OCR
Federated Learning: An approach with Hybrid Homomorphic Encryption
arxiv.orgยท2d
๐Ÿ”Homomorphic Encryption
Elastic N.V. (ESTC) Presents At Citi's 2025 Global Technology, Media And Telecommunications Conference Transcript
seekingalpha.comยท1d
๐ŸŽฅStreaming Codecs
Online Identification using Adaptive Laws and Neural Networks for Multi-Quadrotor Centralized Transportation System
arxiv.orgยท3d
๐Ÿ“Linear Algebra
Whatโ€™s New In Rails 8.1 And Its Ecosystem
blog.codeminer42.comยท17h
๐Ÿ”„Sync Engine
Automated Scientific Forecasting via Multimodal Knowledge Graph Fusion and HyperScore Validation
dev.toยท3hยท
Discuss: DEV
๐Ÿ“ŠCitation Graphs
Learning Mechanism Underlying NLP Pre-Training and Fine-Tuning
arxiv.orgยท2d
๐Ÿค–Grammar Induction
Dual Target-Mounted RISs-Assisted ISAC Against Eavesdropping and Malicious Interference
arxiv.orgยท3d
๐Ÿ“ŠPCAP Analysis
Benchmarking compression programs
maskray.meยท6dยท
Discuss: Hacker News
๐Ÿ“ฆDeflate
Welcome EmbeddingGemma, Google's new efficient embedding model
huggingface.coยท2dยท
Discuss: Hacker News, Hacker News, r/LocalLLaMA
๐Ÿ“Text Embeddings
AutoDetect: Designing an Autoencoder-based Detection Method for Poisoning Attacks on Object Detection Applications in the Military Domain
arxiv.orgยท2d
๐Ÿ”Vector Forensics
Why 'Clean Code' Is Harder Than It Sounds
dev.toยท2dยท
Discuss: DEV
๐Ÿ“Code Metrics
Cryogenic Spray Drying Optimization via Multi-Modal Data Fusion and Bayesian Hyperparameter Tuning
dev.toยท2dยท
Discuss: DEV
โ˜•Precision Brewing
3 ways to detect iCloud Private Relay traffic and prevent fraud
fingerprint.comยท3d
๐Ÿ•ต๏ธNetwork Forensics
Loading...Loading more...
AboutBlogChangelogRoadmap