🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
⚗️ Galois Fields

Finite Field Arithmetic, Reed-Solomon Math, Polynomial Codes, Algebraic Coding

The Danger of Half-Implementing Raft: Why Consensus Shortcuts Fail
binwang.me·1d
🤝Consensus Protocols
Good Justifications Write Themselves
oblique.security·1d·
Discuss: Hacker News
🔐Capability Systems
What’s Wrong With ARDC?
perens.com·1d·
Discuss: Hacker News
📻Homebrew Protocols
I built a pipeline for automatically translating Chinese news
bednarskiwsieci.pl·1d·
Discuss: Hacker News
🇨🇳Chinese Computing
Vibecoding is skeuomorphic because code generation is slow
whoo.ps·1d·
Discuss: Hacker News
📏Code Metrics
The Benefits of Self-Hosting Critical Infrastructure to Reduce Latency in Gaming
fusionauth.io·1d·
Discuss: Hacker News
🖥️Self-hosted Infrastructure
Hiring >> Senior Software Engineer (Go)
dev.to·1d·
Discuss: DEV
🌀Brotli Internals
derive_hash_fast: Over 2x faster hashing than #[derive(Hash)]
reddit.com·1d·
Discuss: r/rust
🦀Rust Borrowing
Fusion-Based Brain Tumor Classification Using Deep Learning and Explainable AI, and Rule-Based Reasoning
arxiv.org·2d
🧠Machine Learning
Conversational DNA: A New Visual Language for Understanding Dialogue Structure in Human and AI
arxiv.org·2d
🔲Cellular Automata
When Is Prior Knowledge Helpful? Exploring the Evaluation and Selection of Unsupervised Pretext Tasks from a Neuro-Symbolic Perspective
arxiv.org·2d
🧠Intelligence Compression
An Iterative Reconstruction Method for Dental Cone-Beam Computed Tomography with a Truncated Field of View
arxiv.org·2d
🏺Computational Archaeology
MiGrATe: Mixed-Policy GRPO for Adaptation at Test-Time
arxiv.org·1d
🧮SMT Solvers
Description and Comparative Analysis of QuRE: A New Industrial Requirements Quality Dataset
arxiv.org·1d
📏Code Metrics
Everything I Know About GitHub Copilot Instructions — From Zero to Onboarded (For Real) ⚡
dev.to·20h·
Discuss: DEV
🔗Concatenative Programming
Wisdom of the Crowd, Without the Crowd: A Socratic LLM for Asynchronous Deliberation on Perspectivist Data
arxiv.org·4h
🔲Cellular Automata
Leveraging GNN to Enhance MEF Method in Predicting ENSO
arxiv.org·2d
📈Time Series
Automated Comparative Analysis of Materials Degradation via Multi-Modal Sensor Fusion & Recursive Bayesian Inference
dev.to·2d·
Discuss: DEV
💾Floppy Imaging
U.S. CISA adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.com·7h
🔓Hacking
Patch Now: Attackers Target OT Networks via Critical RCE Flaw
darkreading.com·15h
🔓Hacking
Loading...Loading more...
AboutBlogChangelogRoadmap