[1] Algorithm Showdown: Python vs. JavaScript - Group Anagrams
dev.toยท14hยท
Discuss: DEV
๐ŸŒณTrie Structures
Data Poisoning Attacks
infosecwriteups.comยท2d
๐Ÿ”Vector Forensics
Calculus Made Easy by Silvanus P. Thompson
calculusmadeeasy.orgยท1dยท
Discuss: Hacker News
๐Ÿ“Document Calculus
Hashers (Murmur)
github.comยท6d
๐Ÿ”—Hash Chains
Topological Sort: Managing Mutable Structures in Haskell
mmhaskell.comยท2h
๐Ÿ”—Topological Sorting
Project: Pi Stats
connortumbleson.comยท8h
๐Ÿ•ต๏ธDomain Enumeration
Beyond Traditional Pseudorandomness, Tsotchkes' Quantum Random Number Generation
medium.comยท1dยท
Discuss: Hacker News
๐Ÿ”Quantum Cryptography
A Kevin week
blog.mitrichev.chยท13hยท
๐Ÿ“Linear Algebra
Investigating Feature Attribution for 5G Network Intrusion Detection
arxiv.orgยท6h
๐Ÿ‘๏ธPerceptual Hashing
Narcissisitic Numbers .... The History and Etymology of Math Terms
pballew.blogspot.comยท4hยท
ฮปLambda Encodings
Check if Your Password Has Been Compromised
cubiclenate.comยท1d
๐Ÿ”“Password Cracking
OTW - Bandit Level 4 to Level 5
tbhaxor.comยท5h
๐Ÿ”งKAITAI
On training binary neural networks
kevinmartinjose.comยท15h
๐Ÿ“ŠQuantization
LLM Rerankers for RAG: A Practical Guide
fin.aiยท13hยท
๐Ÿ”Information Retrieval
Cognitive and Gestalt psychology in your code: SMVP pattern
github.comยท11hยท
Discuss: Hacker News
โœ…Format Verification
MCPโ€™s biggest security loophole is identity fragmentation
techradar.comยท2h
๐Ÿ”“Hacking
UTF-8 Is Beautiful
hackaday.comยท5h
๐Ÿ”ฃUnicode
A Dumb Introduction to z3. Exploring the world of constraint solvers with very simple examples.
asibahi.github.ioยท13hยท
๐ŸงฎZ3 Solver
Optimized Modbus RTU Data Validation via Hybrid Markov & Bayesian Filtering
dev.toยท1hยท
Discuss: DEV
๐Ÿ”งHardware Verification