Promise based Web Worker Messaging
muffinman.ioΒ·1d
πStream Processing
Flag this post
D.J. Bernstein: The Good News Archive
πHacking
Flag this post
βTruffleNetβ Attack Wields Stolen Credentials Against AWS
darkreading.comΒ·20h
π«Kerberos Attacks
Flag this post
What is SimHash?
πBinary Similarity
Flag this post
AI Models Write Code with Security Flaws 18β50% of the Time, New Study Finds
πCode Metrics
Flag this post
Accumulating Context Changes the Beliefs of Language Models
arxiv.orgΒ·2h
π€Grammar Induction
Flag this post
Automatic Minds: Cognitive Parallels Between Hypnotic States and Large Language Model Processing
arxiv.orgΒ·2h
β¨Effect Systems
Flag this post
Zero-RAG: Towards Retrieval-Augmented Generation with Zero Redundant Knowledge
arxiv.orgΒ·2h
πInformation Retrieval
Flag this post
pg_stat_plans: Track per-plan call counts, execution times and EXPLAIN texts
π§¬PostgreSQL Forensics
Flag this post
Quantum-Resistant Federated Learning: Securing Distributed Model Training Against Post-Quantum Cryptography Threats
πQuantum Security
Flag this post
Wavelet-Based Feature Extraction and Unsupervised Clustering for Parity Detection: A Feature Engineering Perspective
arxiv.orgΒ·2h
πInformation Crystallography
Flag this post
From Evidence to Verdict: An Agent-Based Forensic Framework for AI-Generated Image Detection
arxiv.orgΒ·2h
πVector Forensics
Flag this post
LLM-Driven Cost-Effective Requirements Change Impact Analysis
arxiv.orgΒ·2h
πLanguage Evolution
Flag this post
Show HN: KeyLeak Detector β Scan websites for exposed API keys and secrets
π¦ Malware Analysis
Flag this post
Production-Ready Rate Limiter in Go: From Side Project to Distributed System
πStreaming Systems
Flag this post
On Designing Low-Latency Systems for High-Traffic Environments
hackernoon.comΒ·14h
πStream Processing
Flag this post
ARCS 2.0: Pioneering Data Sovereignty Through Real-World Utility and Cultural Heritage
hackernoon.comΒ·1d
πHash Chains
Flag this post
Loading...Loading more...