🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
πŸ”’ Homomorphic Compression

Encrypted Archives, Privacy-preserving Storage, Secure Compression, Cryptographic Data

Rose Tinted Classes: An SVG Filter Function CSS Trick
alangrow.comΒ·1d
🌈Color Archaeology
Cyberhaven + Jamf partner to deliver unmatched data security
jamf.comΒ·1d
πŸ”HSM Integration
Back-to-School Made Easy with PDFelement
pdfa.orgΒ·17h
πŸ“„PDF Archaeology
Is Meta Scraping the Fediverse for AI?
wedistribute.orgΒ·1dΒ·
Discuss: Hacker News
πŸ“°RSS Reading Practices
Model Predictive-Control Basics
towardsdatascience.comΒ·1d
⚑Effectful Programming
The Problem with AI Benchmarks
melder.ioΒ·16hΒ·
Discuss: Hacker News
⚑Performance Mythology
"Skyrocketing" Scale of UK Police's Secret Facial Recognition Searches
privacyinternational.orgΒ·1dΒ·
Discuss: Hacker News
βš–οΈLegal Compliance
New discoveries of <i>Australopithecus</i> and <i>Homo</i> from Ledi-Geraru, Ethiopia
nature.comΒ·18h
🦴Database Paleontology
Differentiable Cyclic Causal Discovery Under Unmeasured Confounders
arxiv.orgΒ·1d
✨Effect Handlers
Gradient- and Newton-Based Unit Vector Extremum Seeking Control
arxiv.orgΒ·1d
πŸŒ€Differential Geometry
FairFLRep: Fairness aware fault localization and repair of Deep Neural Networks
arxiv.orgΒ·2d
πŸ”Vector Forensics
Enhanced Protein Production via Adaptive Hybrid Fermentation & AI-Driven Media Optimization
dev.toΒ·15hΒ·
Discuss: DEV
β˜•Precision Brewing
Tokenization Made Simple: How AI Turns Words into Numbers
dev.toΒ·23hΒ·
Discuss: DEV
πŸ“Concrete Syntax
Semantic and Structural Analysis of Implicit Biases in Large Language Models: An Interpretable Approach
arxiv.orgΒ·3d
🎯Dependent Parsing
FNBT: Full Negation Belief Transformation for Open-World Information Fusion Based on Dempster-Shafer Theory of Evidence
arxiv.orgΒ·2d
🧠Machine Learning
Noise-Aware Generative Microscopic Traffic Simulation
arxiv.orgΒ·2d
πŸ”²Cellular Automata
Propagation Tree Is Not Deep: Adaptive Graph Contrastive Learning Approach for Rumor Detection
arxiv.orgΒ·2d
πŸ•ΈοΈGraph Embeddings
I need help building a secondary streaming PC which also acts like a home NAS
reddit.comΒ·1dΒ·
Discuss: r/homelab
🏠Homelab
U.S. CISA adds Microsoft Internet Explorer, Microsoft Office Excel, and WinRAR flaws to its Known Exploited Vulnerabilities catalog
securityaffairs.comΒ·10h
πŸ”“Hacking
**Precision Patterning via Adaptive Stochastic Temporal Ordering (APSTO)**
dev.toΒ·1dΒ·
Discuss: DEV
βš™οΈCassette Mechanics
Loading...Loading more...
AboutBlogChangelogRoadmap