๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ”ฒ Lattice Cryptography

Post-quantum Security, Ring-LWE, Archive Encryption, Long-term Confidentiality

Five ways that AI is learning to improve itself
technologyreview.comยท1d
๐ŸŒCultural Algorithms
Sentinel-2 Super Resolution
geodose.comยท1dยท
Discuss: Hacker News
๐Ÿ“ธTIFF Archaeology
Teach Me to Think Like an Operator
5iprojects.comยท4hยท
Discuss: Hacker News
๐ŸšNordic Shell
Debian 13 Trixie Review: 11 Features That Make It the Biggest Release in Years
dtptips.comยท2hยท
Discuss: Hacker News
โ„๏ธNix Adoption
Project Ire autonomously identifies malware at scale
microsoft.comยท1dยท
Discuss: Lobsters, Hacker News
๐Ÿฆ Malware Analysis
How to Improve Availability Using Deployment Patterns โ˜…
newsletter.systemdesign.oneยท1d
โ„๏ธNix Adoption
Software architecture is about spending abstractions
bennett.inkยท1dยท
Discuss: r/programming, r/reactjs
๐ŸงฑImmutable Infrastructure
From face scans to credit checks: how UK age verification works and why itโ€™s a privacy nightmare
techradar.comยท2d
๐Ÿ”Homomorphic Encryption
Let's properly analyze an AI article for once
nibblestew.blogspot.comยท1dยท
Discuss: Hacker News, nibblestew.blogspot.com
๐Ÿง Intelligence Compression
Nation-state group CL-STA-0969 targeted Southeast Asian telecoms in 2024
securityaffairs.comยท2d
๐Ÿ›ฃ๏ธBGP Hijacking
What if Infinity Didnโ€™t Exist?
scientificamerican.comยท2dยท
Discuss: Hacker News
๐Ÿ”ฒProof Irrelevance
Proxmox Virtual Environment 9.0 released!
forum.proxmox.comยท1dยท
Discuss: Hacker News, r/homelab
๐Ÿ’พProxmox Storage
Machine Learning Fundamentals: model evaluation
dev.toยท1dยท
Discuss: DEV
๐ŸŒŠStream Processing
Semi-Supervised Anomaly Detection in Brain MRI Using a Domain-Agnostic Deep Reinforcement Learning Approach
arxiv.orgยท1d
๐Ÿ”Vector Forensics
Measuring Dependencies between Biological Signals with Temporal Self-supervision, and its Limitations
arxiv.orgยท21h
๐Ÿ“ˆMutual Information
Attack Surface Management Software: Top 10 Vendors
heimdalsecurity.comยท13h
๐Ÿ”’WASM Capabilities
TokenSpan: Rethinking Prompt Compression with Aliases and Dictionary Encoding
dev.toยท2dยท
Discuss: DEV
๐Ÿ“Concrete Syntax
Bounded fuzzy logic control for optimal scheduling of green hydrogen production and revenue maximisation
arxiv.orgยท1d
๐Ÿ”—Constraint Handling
ReDSM5: A Reddit Dataset for DSM-5 Depression Detection
arxiv.orgยท21h
๐Ÿ”Information Retrieval
The Silicon Reasonable Person: Can AI Predict How Ordinary People Judge Reasonableness?
arxiv.orgยท21h
๐Ÿ”ฒCellular Automata
Loading...Loading more...
AboutBlogChangelogRoadmap