🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🛡️ Preservation Proofs

Formal Archival, Storage Verification, Media Correctness, Durability Logic

Sneaky swirls: 'Hidden' vortices could influence how soil and snow move
phys.org·7h
🏺Computational Archaeology
Job Posting: Systems and Security Administrator
citizenlab.ca·1h
🏠Homelab Security
Is Math Discovered or Invented?
curtispoe.org·9h
🔲Proof Irrelevance
Bmssp: A New Shortest Path Algorithm
rohanparanjpe.substack.com·21h·
Discuss: Substack
🔗Topological Sorting
A Model for all Ranges
qt.io·1h·
Discuss: Lobsters, Hacker News
🧩SQLite Extensions
Sets & Heaps in Haskell and Rust
mmhaskell.com·1d
🔒Type Safety
Nine Rules for Managing Humans Managing Nuclear Reactors
asteriskmag.com·3h·
Discuss: Hacker News
🏛️Byzantine Archival
TRIM: Accelerating High-Dimensional Vector Similarity Search with Enhanced Triangle-Inequality-Based Pruning
arxiv.org·12h
🗂️Vector Databases
How Retrieval Algorithms Shape Better LLM Responses?
dev.to·15h·
Discuss: DEV
🔍Information Retrieval
k-NN Classification and Model Evaluation
dev.to·8h·
Discuss: DEV
🧠Machine Learning
An Efficient Recommendation Filtering-based Trust Model for Securing Internet of Things
arxiv.org·12h
🎯Content Recommendation
Chatting with Unmesh about building language with LLMs
martinfowler.com·2h
💻Programming languages
TOMATO: Assessing Visual Temporal Reasoning Capabilities in Multimodal Foundation Models
arxiv.org·12h
🤖Advanced OCR
The Deployment Error That Nearly Took Down My App
dev.to·5h·
Discuss: DEV
👁️Observatory Systems
Literature Review of the Effect of Quantum Computing on Cryptocurrencies using Blockchain Technology
arxiv.org·12h
🔐Quantum Security
Analysis and Detection of RIS-based Spoofing in Integrated Sensing and Communication (ISAC)
arxiv.org·12h
⚖️RISC-V Formal
Antirez/sds: Simple Dynamic Strings library for C
github.com·1d·
Discuss: Hacker News
✅Format Verification
Propose and Rectify: A Forensics-Driven MLLM Framework for Image Manipulation Localization
arxiv.org·12h
🖼️JPEG Forensics
Using panic metadata to recover source code information from Rust binaries | cxiao.net
cxiao.net·2h
🦀Rust Macros
Recurrent Transformer U-Net Surrogate for Flow Modeling and Data Assimilation in Subsurface Formations with Faults
arxiv.org·12h
⚡Incremental Computation
Loading...Loading more...
AboutBlogChangelogRoadmap