๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”ง Hamming Codes

Linear Codes, Syndrome Decoding, Parity Bits, Error Detection

PQCSA: A Gentle Introduction to Code Based PKE
esat.kuleuven.beยท2d
โš—๏ธAlgebraic Coding
Unicode and endianness
sjoerdlangkemper.nlยท21h
๐Ÿ”คCharacter Encoding
An easy-to-implement, arena-friendly hash map
nullprogram.comยท4hยท
Discuss: Lobsters
๐Ÿ”Hash Functions
Automated Mineralogical Classification via Hyperspectral Data Fusion & Bayesian Inference
dev.toยท3hยท
Discuss: DEV
๐ŸบComputational Archaeology
NeuralMorse โ€“ Reinventing Morse Code with Neural Networks
masatohagiwara.netยท1dยท
Discuss: Hacker News
๐Ÿ“Text Compression
Why Computer Science Is No Good, Redux
cacm.acm.orgยท1d
๐ŸŽฏPerformance Proofs
Handling errors in concurrent goroutines with channels
reddit.comยท2hยท
Discuss: r/golang
๐ŸŒŠStream Processing
Some New Nintendo e-Reader Research
nytpu.comยท1d
๐ŸŽฎGameboy Emulation
Cloth (?) fiber in Xeon socket causing memory issues?
i.redd.itยท7hยท
Discuss: r/homelab
๐Ÿ› ๏ธGreaseweazle
My blog on zero-knowledge cryptography
kaw101010.github.ioยท1hยท
Discuss: Hacker News
๐Ÿ”Quantum Security
Unexpected snail mail packages are being sent with scammy QR codes, warns FBI
malwarebytes.comยท1d
๐Ÿฆ Malware Analysis
Microgliaโ€“neuron crosstalk via Hexโ€“GM2โ€“MGL2 maintains brain homeostasis
nature.comยท10h
๐ŸงฒMagnetic Domains
How Hash Maps Work
hackernoon.comยท13h
๐Ÿ”Hash Functions
libsemigroups: C++ library for semigroups and monoids
github.comยท1dยท
Discuss: Hacker News, r/cpp
๐ŸงฎAlgebraic Datatypes
How To Solve Every Programming Problem
blog.codeminer42.comยท7h
๐Ÿ“Interval Arithmetic
Consistency over Availability: How rqlite Handles the CAP theorem
philipotoole.comยท9hยท
Discuss: Hacker News
๐Ÿ›ก๏ธByzantine Fault Tolerance
Smart Air Quality Monitor Using Arduino, Bug-in-Circuit
hackster.ioยท22h
๐Ÿ”ŒSingle Board PC
Automated Code Repair for C/C++ Static Analysis Alerts
arxiv.orgยท22h
๐Ÿ“ŠStatic Analysis
External Network Penetration Testing and Best Practices
hackerone.comยท9h
๐Ÿ•ต๏ธPenetration Testing
Ethernet Overload
blogger.comยท4h
๐Ÿ”ŒOperating system internals
Loading...Loading more...
AboutBlogChangelogRoadmap