🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎯 Performance Proofs

Complexity Analysis, Algorithm Verification, Formal Bounds, Optimization Theory

Pocket Pixel
hackster.io·3h
📼Retro Games
My AI Workflow for Understanding Any Codebase
steipete.me·3d
⚡Proof Automation
Understanding Prolly Tree Balance
dolthub.com·2d·
Discuss: Hacker News
🌲B-tree Variants
Building a Hacker News OAuth Provider from First Principles
hn.simplerauth.com·1d·
Discuss: Hacker News
🚀Indie Hacking
Institutional Knowledge Is Walking Out the Door–Capture It Before It's Gone
ordinalforgov.com·1d·
Discuss: Hacker News
🔗Constraint Handling
Why Should AI Review Your Code? Can writer be reviewer also?
getpanto.ai·2d·
Discuss: Hacker News
📏Code Metrics
How AI Agents Gather Data
blog.dust.tt·1d·
Discuss: Hacker News
📥Feed Aggregation
Be Aware of News Mirages
hackernoon.com·4h
📰Content Curation
How much slower is random access, really?
samestep.com·5d·
Discuss: Hacker News, r/programming
📼Tape Encoding
Design Decisions Behind app.build, a Prompt-to-App Generator
neon.com·2d·
Discuss: Hacker News
🌊Streaming Systems
🐳Longest Subsequence Repeated k Times – LeetCode 2014 (C++ | Python | JavaScript)
dev.to·1d·
Discuss: DEV
λLambda Encodings
Regular Tree Search for Simulation Optimization
arxiv.org·4d
🌲B-tree Variants
Hypercubical manifolds in homotopy type theory
arxiv.org·3d
🔶Cubical Type Theory
Image Optimization in Jamstack: Static vs Dynamic Approaches
dev.to·9h·
Discuss: DEV
🖼️JPEG XL
Implementing Multi-tenancy with Keycloak and NestJS
dev.to·18h·
Discuss: DEV
🏺Kerberos Archaeology
Security news weekly round-up - 27th June 2025
dev.to·19h·
Discuss: DEV
🔓Hacking
⚔️ The Josephus Problem Explained: Constant-Time Solution for k = 2
dev.to·2d·
Discuss: DEV
🌳Trie Structures
Computing Betti tables and minimal presentations of zero-dimensional persistent homology
arxiv.org·4d
🕸️Algebraic Topology
On the fast convergence of minibatch heavy ball momentum
arxiv.org·4d
🧮Kolmogorov Complexity
Generative Adversarial Evasion and Out-of-Distribution Detection for UAV Cyber-Attacks
arxiv.org·1d
🧠Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap