🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🎯 Performance Proofs

Complexity Analysis, Algorithm Verification, Formal Bounds, Optimization Theory

International Conference on Enumerative Combinatorics and Applications ICECA 2025 (August 25-27, 2025)
gilkalai.wordpress.com·1d
🔗Combinatory Logic
First homelab on a fully 3D printed 10” server rack
i.redd.it·5h·
Discuss: r/homelab
🏠HomeLab
Computer Architecture Lessons from the Kitchen
sigarch.org·9h
🧮Algorithmic Cooking
Bringing Cloudflare’s AI to FedRAMP High
blog.cloudflare.com·9h
🌊Stream Processing
How I Approach Performance Investigations – By Rico Mariani
ricomariani.medium.com·1d·
Discuss: Hacker News
🎯Performance Forensics
From Logic to Linear Algebra: How AI Is Rewiring the Computer
journal.hexmos.com·1d·
Discuss: Hacker News, r/programming
🖥️Hardware Architecture
Quality Precision
lesswrong.com·5h·
Discuss: Hacker News
✅FLAC Verification
Paying attention to feature distribution alignment (pun intended)
alexshtf.github.io·14h·
Discuss: Hacker News
📐Linear Algebra
Show HN: SecretMemoryLocker – File Encryption Without Static Passwords
news.ycombinator.com·7h·
Discuss: Hacker News
🔐Archive Encryption
Builder Pattern in CDK
medium.com·4h·
Discuss: Hacker News
🧱Immutable Infrastructure
Distributed Request Assignment with Max‑Min and Deviation Fairness in On‑Demand Mobility
hackernoon.com·2h
📡Network Calculus
Simulation Results of Distributed Fair Assignment and Rebalancing in Mobility‑On‑Demand
hackernoon.com·2h
⚡Incremental Computation
An Efficient Hybridization of Graph Representation Learning and Metaheuristics for the Constrained Incremental Graph Drawing Problem
arxiv.org·19h
🔄Graph Rewriting
Securing Kubernetes Layer by Layer: An OSI Approach
reddit.com·2h·
Discuss: r/kubernetes
📦Container Security
The Science of Intelligent Exploration: Why We Need Exploration in AI
richardcsuwandi.github.io·1d·
Discuss: Hacker News
🔲Cellular Automata
Stable, Mutable References for Ante
antelang.org·10h·
Discuss: Hacker News, r/programming
🔒Type Safety
noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.com·5h·
Discuss: Hacker News
🔱Galois Cryptography
An Intrinsic Barrier for Resolving P = NP (2-SAT as Flat, 3-SAT as High-Dimensional Void-Rich)
arxiv.org·5d
🧮SMT Solvers
WeakC4, or Distilling an Emergent Object
2swap.github.io·2d·
Discuss: Hacker News
🔲Cellular Automata
Complete Guide to Self-Hosting Next.js at Scale
dlhck.com·3h·
Discuss: Hacker News
🔄Sync Engine
Loading...Loading more...
AboutBlogChangelogRoadmap