๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”ง Hamming Codes

Linear Codes, Syndrome Decoding, Parity Bits, Error Detection

How ChatGPT Claude interprets my blog
thomasrigby.comยท1h
๐Ÿ Personal Archives
Comparing the Glove80 and Maltron keyboards
tratt.netยท10hยท
Discuss: Lobsters, Hacker News
โŒจ๏ธMechanical Keyboards
Retirement.exe
hackernoon.comยท15h
๐Ÿ Homelab Automation
A Chapter on Usenet and FidoNet from The Backbone: A History of the Internet
technicshistory.comยท5hยท
Discuss: Hacker News
๐Ÿ“ผCassette Networks
AtCoder Finals Problem Statement
atcoder.jpยท6dยท
Discuss: Hacker News
๐Ÿ‡ฏ๐Ÿ‡ตJapanese Computing
PMs Were Vibe Coders All Along
justinpaulson.comยท46mยท
Discuss: Hacker News
โšกProof Automation
Deeper Theories of Program Design
typesanitizer.comยท2dยท
Discuss: Lobsters, Hacker News, r/programming
๐ŸšShell Calculus
Wah_Ter_Mee
hackster.ioยท19h
๐Ÿ“ฒDigitization
Optimizing Power BI Models: Star Schema vs. Snowflake
dev.toยท15hยท
Discuss: DEV
๐Ÿ”„Schema Evolution
Transformer-based Deep Learning Model for Joint Routing and Scheduling with Varying Electric Vehicle Numbers
arxiv.orgยท17h
๐ŸงฉWASM Components
Enhancing Communications and Sensing Simultaneously by Zero-Order Optimization of MTS
arxiv.orgยท17h
โ„น๏ธInformation Theory
Rethinking Memorization Measures and their Implications in Large Language Models
arxiv.orgยท17h
๐Ÿ’ปLocal LLMs
**Essential Python Security Practices: Advanced Techniques to Protect Your Applications from Threats**
dev.toยท1dยท
Discuss: DEV
๐Ÿ›ก๏ธWASM Security
Python Fundamentals: class variables
dev.toยท1dยท
Discuss: DEV
๐Ÿ›Fuzzing
Developing an AI-Guided Assistant Device for the Deaf and Hearing Impaired
arxiv.orgยท17h
๐Ÿ‘‚Psychoacoustic Coding
Beyond Architectures: Evaluating the Role of Contextual Embeddings in Detecting Bipolar Disorder on Social Media
arxiv.orgยท17h
๐ŸŒ€Brotli Internals
Open source's superior security is a matter of eyeballs: Be kind to the brains behind them
theregister.comยท10hยท
Discuss: Hacker News
๐Ÿš€Indie Hacking
PDEformer-2: A Versatile Foundation Model for Two-Dimensional Partial Differential Equations
arxiv.orgยท17h
๐ŸŒ€Differential Geometry
Combining model tracing and constraint-based modeling for multistep strategy diagnoses
arxiv.orgยท1d
๐ŸงฎConstraint Solvers
Extracting Visual Facts from Intermediate Layers for Mitigating Hallucinations in Multimodal Large Language Models
arxiv.orgยท17h
๐Ÿง Neural Compression
Loading...Loading more...
AboutBlogChangelogRoadmap