Cryptographic Algorithms Identification in Java Bytecode
binarly.io·3d
📏Code Metrics
Flag this post
Multi-Table Predictions in Data Cloud: Enabling Machine Learning Across Related Data Objects
engineering.salesforce.com·2d
🗄️Database Internals
Flag this post
HigherOrderCO/Bend2
github.com·1d
🔗Functional Compilers
Flag this post
Using DynamoDB Secondary Indexes
🗄️Database Internals
Flag this post
Building a Geospatial Lakehouse with Open Source and Databricks
towardsdatascience.com·2d
📏Range Queries
Flag this post
Trap Bots on Your Server
🔄Burrows-Wheeler
Flag this post
Rebuilding Search: Velocity Unlocks Correctness, Not the Other Way Around
⚙️Build Archaeology
Flag this post
TURBOTEST: Learning When Less is Enough through Early Termination of Internet Speed Tests
arxiv.org·10h
🧮Kolmogorov Complexity
Flag this post
Continuous profiling with Parca: finally seeing which functions burn CPU in prod
📊Performance Profiling
Flag this post
"The Future of Digital Asset Recovery: Dexdert Net Pro Recovery"
💾Persistence Strategies
Flag this post
11 problems I have noticed building Agents (and fixes nobody talks about)
⚡Proof Automation
Flag this post
Unsplittable Cost Flows from Unweighted Error-Bounded Variants
arxiv.org·10h
🧮Algebraic Datatypes
Flag this post
Automated Anomaly Detection in Cryo-EM Density Maps via Multi-Scale Fourier Analysis and Bayesian Calibration
📄Document Digitization
Flag this post
Automated Insight Amplification via Multi-Modal Graph Analytics and Reinforcement Learning
🤖AI Curation
Flag this post
Excision Score: Evaluating Edits with Surgical Precision
arxiv.org·10h
⛏️File Carving
Flag this post
VOA : mini secrets manager
🚀Indie Hacking
Flag this post
Loading...Loading more...