🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔲 Proof Irrelevance

Squash Types, Proposition Equality, Setoid Model, Type Theory

Dissecting My Recent Argument (Are Error Theories Offensive?)
nakedcapitalism.com·1d
⚔️Lean Theorem
FLINT: Fast Library for Number Theory
flintlib.org·1d
🧮Algebraic Datatypes
Where to Go After TypingClub?
typequicker.com·1d·
Discuss: Hacker News
🎯Gradual Typing
Fair Auctions, Automata Routing, and Rebalancing for Distributed Mobility‑On‑Demand Assignment
hackernoon.com·21h
🎯Performance Proofs
Show HN: DataCompose – Prevent downstream data failures with composite functions
datacompose.io·23h·
Discuss: Hacker News
✅Format Validation
Making MCP Tool Use Feel Natural with Context-Aware Tools
ragie.ai·36m·
Discuss: Hacker News
🔗Constraint Handling
Variations on Knuth’s Twindragon
johndcook.com·1d·
Discuss: Hacker News
📐Mathematical Art
QueryBandits for Hallucination Mitigation: Exploiting Semantic Features for No-Regret Rewriting
arxiv.org·15h
🌀Brotli Internals
Barking Up The Ratchet Tree – MLS Is Neither Royal Nor Nude
soatok.blog·1d·
Discuss: Lobsters, Hacker News, r/programming
🔑Cryptographic Protocols
My thoughts on Vertical Slices, CQRS, Semantic Diffusion and other fancy words
architecture-weekly.com·1d·
Discuss: Hacker News, r/programming
🔌Interface Evolution
Safe Is What We Call Things Later: Some Software Engineering Folklore
worksonmymachine.ai·2d·
Discuss: Hacker News
⚙️Proof Engineering
Make and SQL: An old new way for Data Science workloads
vasvir.wordpress.com·1h·
Discuss: Hacker News
🦀Rust Macros
Constrained Prompt Enhancement for Improving Zero-Shot Generalization of Vision-Language Models
arxiv.org·15h
🧠Neural Codecs
L-XAIDS: A LIME-based eXplainable AI framework for Intrusion Detection Systems
arxiv.org·15h
🔍Vector Forensics
WOMAC: A Mechanism For Prediction Competitions
arxiv.org·15h
🔲Cellular Automata
Semantic Embedding in RAG: why close vectors still miss meaning and how to fix it
dev.to·13h·
Discuss: DEV
🧮Vector Embeddings
noble-curves: audited and minimal elliptic curve cryptography in JavaScript
github.com·1d·
Discuss: Hacker News
🔱Galois Cryptography
Using Real Survey Data to Create Authentic AI Personas for Extended Research
askrally.com·6h·
Discuss: Hacker News
🏛Digital humanities
MC3G: Model Agnostic Causally Constrained Counterfactual Generation
arxiv.org·15h
🔍BitFunnel
Go 1.25 Highlights: How Generics and Performance Define the Future of Go
dev.to·4h·
Discuss: DEV
🔌Interface Evolution
Loading...Loading more...
AboutBlogChangelogRoadmap