๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”’ Homomorphic Compression

Encrypted Archives, Privacy-preserving Storage, Secure Compression, Cryptographic Data

How many dimensions is this?
lcamtuf.substack.comยท14hยท
Discuss: Substack
๐Ÿ’ŽInformation Crystallography
Learning Machine Learning in Elixir | zacksiri.dev
zacksiri.devยท23h
๐Ÿ’ปLocal LLMs
Wild Performance Tricks
davidlattimore.github.ioยท1dยท
Discuss: Lobsters, Hacker News, r/programming, r/rust
๐Ÿฆ€Rust Borrowing
Unsupervised Identification and Replay-based Detection (UIRD) for New Category Anomaly Detection in ECG Signal
arxiv.orgยท1d
๐Ÿง Machine Learning
Project for security safe data
reddit.comยท2dยท
Discuss: r/golang
๐Ÿ”Archive Encryption
SectorC: A C Compiler in 512 bytes (2023)
xorvoid.comยท11hยท
Discuss: Hacker News
๐Ÿ”ฉSystems Programming
Exploring the Design Space of Fair Tree Learning Algorithms
arxiv.orgยท2h
๐Ÿง Learned Indexing
๐Ÿ“š My Python Roadmap Journey #3 & #4 - Data Structures & Algorithms
dev.toยท16hยท
Discuss: DEV
๐ŸŒ€Brotli Dictionary
HyPV-LEAD: Proactive Early-Warning of Cryptocurrency Anomalies through Data-Driven Structural-Temporal Modeling
arxiv.orgยท2h
๐Ÿ”—Hash Chains
DiVerify: Hardening Identity-Based Software Signing with Programmable Diverse-Context Scopes
arxiv.orgยท2h
๐Ÿ”PKI Archaeology
Diverse Unionable Tuple Search: Novelty-Driven Discovery in Data Lakes [Technical Report]
arxiv.orgยท1d
๐Ÿ—‚๏ธVector Databases
Build a serverless Amazon Bedrock batch job orchestration workflow using AWS Step Functions
aws.amazon.comยท1d
โš™๏ธBatch Processing
MILO: A Lightweight Perceptual Quality Metric for Image and Latent-Space Optimization
arxiv.orgยท1d
๐Ÿ“ŠRate-Distortion Theory
LatPhon: Lightweight Multilingual G2P for Romance Languages and English
arxiv.orgยท2h
๐ŸŽ™๏ธWhisper
E-PhishGen: Unlocking Novel Research in Phishing Email Detection
arxiv.orgยท1d
๐Ÿ”BitFunnel
Recall Gabor Communication Theory and Joint Time-Frequency Analysis
arxiv.orgยท2h
๐ŸŒˆSpectral Methods
Two Proven Countermeasures to Oracle Attacks on EdDSA
hackernoon.comยท1d
๐ŸŒณArchive Merkle Trees
How big are our embeddings now and why?
newsletter.vickiboykis.comยท9hยท
Discuss: Lobsters, Hacker News
๐Ÿ—‚๏ธVector Databases
Show HN: A unified approach to compute sandboxes
computesdk.comยท10hยท
Discuss: Hacker News
๐Ÿ–ฅ๏ธSelf-hosted Infrastructure
Show HN: A vibe port of security library libinjection from C to Rust
github.comยท15hยท
Discuss: Hacker News
๐Ÿฆ€Rust Verification
Loading...Loading more...
AboutBlogChangelogRoadmap