🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
📐 Interval Arithmetic

Numerical Analysis, Verified Computing, Error Bounds, Precision

Edge detection robot | Smart Robot | Arduino Robot
hackster.io·8h
🔌Microcontrollers
How To Build an AI Health Care Agent on Amazon Bedrock
thenewstack.io·2h
🔌Archive APIs
Adoption agency leaks over a million records
malwarebytes.com·2h
🔤EBCDIC Privacy
Philips Hue White Ambiance is actually terrible…
wejn.org·3h
🔓Reverse engineering
Benford's Law and the Ahlstrom Conjecture
jamesmccaffrey.wordpress.com·2d·
Discuss: Hacker News
🎯Arithmetic Coding Theory
Urban Green Governance: IoT-Driven Management and Enhancement of Urban Green Spaces in Campobasso
arxiv.org·13h
⚡Incremental Computation
Neural Co-state Regulator: A Data-Driven Paradigm for Real-time Optimal Control with Input Constraints
arxiv.org·13h
🧠Machine Learning
Shaping AI's Mind from the Shadows: My Journey with ArXiv and Alpay Algebra
lightcapai.medium.com·1h·
Discuss: Hacker News
🔲Cellular Automata
Improved Sum-of-Squares Stability Verification of Neural-Network-Based Controllers
arxiv.org·2d
✨Algebraic Effects
Let's Think in Two Steps: Mitigating Agreement Bias in MLLMs with Self-Grounded Verification
arxiv.org·13h
📏Linear Logic
Parsing Protobuf Like Never Before
mcyoung.xyz·1d·
Discuss: Lobsters, Hacker News
🔧Binary Parsers
MT4DP: Data Poisoning Attack Detection for DL-based Code Search Models via Metamorphic Testing
arxiv.org·1d
🧮Z3 Solver
The Architecture of Open Source Applications (Volume 1) Battle for Wesnoth
aosabook.org·56m·
Discuss: Hacker News
🔒WASM Capabilities
Undone Computer Science
undonecs.org·5h·
Discuss: Hacker News
🌍Cultural Algorithms
Sparse Identification of Nonlinear Dynamics with Conformal Prediction
arxiv.org·13h
🧮Kolmogorov Bounds
Class-Proportional Coreset Selection for Difficulty-Separable Data
arxiv.org·1d
🧠Machine Learning
Robust Route Planning for Sidewalk Delivery Robots
arxiv.org·13h
🔗Topological Sorting
Almost Always Auto (2013)
herbsutter.com·7h·
Discuss: Hacker News
🔒Type Safety
How to Optimize Your Python Code Even If You’re a Beginner
kdnuggets.com·3d
🌊Streaming Algorithms
Efficient Private Inference Based on Helper-Assisted Malicious Security Dishonest Majority MPC
arxiv.org·2d
🤐Secure Multiparty
Loading...Loading more...
AboutBlogChangelogRoadmap