The Security Time Capsule: Evolving Beyond Legacy Pen Testing
praetorian.comยท22h
๐Ÿ”Archive Cryptanalysis
More adventures in the land of AI and Open Source
blogs.gnome.orgยท2d
๐Ÿฆ€Rust Macros
What's Got into Stephen King?
notoneoffbritishisms.comยท22hยท
Discuss: Hacker News
๐Ÿ”Text Forensics
How DNS Actually Works
blog.algomaster.ioยท14h
๐ŸŒDNS Security
Geometric and physical interpretation of the action principle
nature.comยท2dยท
Discuss: Hacker News
๐Ÿ“šArchival Mathematics
Sudden deluge of rain floods some streets and halts air and rail traffic in Tokyo
the-independent.comยท10h
๐Ÿ‡ฏ๐Ÿ‡ตJapanese Computing
Axum Backend Series - Introduction | 0xshadow's Blog
blog.0xshadow.devยท3dยท
Discuss: r/rust
โšกgRPC
Parameters and binding forms should be mutually recursive
samestep.comยท6dยท
Discuss: Hacker News
๐Ÿ”—Concatenative Programming
Besting Good--Turing: Optimality of Non-Parametric Maximum Likelihood for Distribution Estimation
arxiv.orgยท1d
๐ŸงฎKolmogorov Bounds
Asymmetry Vulnerability and Physical Attacks on Online Map Construction for Autonomous Driving
arxiv.orgยท2d
๐Ÿ“ŠComputational Geometry
Beyond the Buzzword: How a Web App Development Company in Coimbatore Integrates AI for Smarter User Experiences
dev.toยท1dยท
Discuss: DEV
๐Ÿค–AI Curation
TSPC: A Two-Stage Phoneme-Centric Architecture for code-switching Vietnamese-English Speech Recognition
arxiv.orgยท2d
๐ŸŽ™๏ธWhisper
Deep Learning-driven Community Resilience Rating based on Intertwined Socio-Technical Systems Features
arxiv.orgยท2d
๐Ÿง Machine Learning
Automated Semantic Disentanglement of Hierarchical Visual Features for Pattern Recognition
dev.toยท19hยท
Discuss: DEV
๐Ÿค–Advanced OCR
Outcome-based Exploration for LLM Reasoning
arxiv.orgยท2dยท
Discuss: Hacker News
๐Ÿ”—Constraint Handling
Modeling Visual Hallucination: A Generative Adversarial Network Framework
arxiv.orgยท2d
๐Ÿ“ŠLearned Metrics