[1] Algorithm Showdown: Python vs. JavaScript - Group Anagrams
dev.toยท17hยท
Discuss: DEV
๐ŸŒณTrie Structures
IETF Draft: Authenticated Transfer Repo and Sync Specification
ietf.orgยท3hยท
Discuss: Hacker News
๐ŸŒณArchive Merkle Trees
Data Poisoning Attacks
infosecwriteups.comยท2d
๐Ÿ”Vector Forensics
Sprites mods - Hard disk hacking - Intro
web.archive.orgยท1h
๐ŸŽฎCartridge Archaeology
Topological Sort: Managing Mutable Structures in Haskell
mmhaskell.comยท5h
๐Ÿ”—Topological Sorting
Narcissisitic Numbers .... The History and Etymology of Math Terms
pballew.blogspot.comยท8hยท
ฮปLambda Encodings
Project: Pi Stats
connortumbleson.comยท11h
๐Ÿ•ต๏ธDomain Enumeration
Balance between refactoring and inheritance in your code
github.comยท2hยท
Discuss: Hacker News
โœ…Format Verification
A Kevin week
blog.mitrichev.chยท17hยท
๐Ÿ“Linear Algebra
Investigating Feature Attribution for 5G Network Intrusion Detection
arxiv.orgยท10h
๐Ÿ‘๏ธPerceptual Hashing
Check if Your Password Has Been Compromised
cubiclenate.comยท1d
๐Ÿ”“Password Cracking
Securing and Scaling AI-Powered APIs
capestart.comยท1hยท
Discuss: Hacker News
๐ŸŒŠStreaming Systems
Hashers (Murmur)
github.comยท6d
๐Ÿ”—Hash Chains
OTW - Bandit Level 4 to Level 5
tbhaxor.comยท8h
๐Ÿ”งKAITAI
On training binary neural networks
kevinmartinjose.comยท19h
๐Ÿ“ŠQuantization
Beyond Traditional Pseudorandomness, Tsotchkes' Quantum Random Number Generation
medium.comยท1dยท
Discuss: Hacker News
๐Ÿ”Quantum Cryptography
Calculus Made Easy by Silvanus P. Thompson
calculusmadeeasy.orgยท1dยท
Discuss: Hacker News
๐Ÿ“Document Calculus
Gucci, Balenciaga and Alexander McQueen private data ransomed by hackers
bbc.comยท21m
๐Ÿ”—Data Provenance
LLM Rerankers for RAG: A Practical Guide
fin.aiยท16hยท
๐Ÿ”Information Retrieval