🐿️ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
🔲 Proof Irrelevance

Squash Types, Proposition Equality, Setoid Model, Type Theory

Response to Gentry
tandfonline.com·8h
🇸🇪Swedish Cryptanalysis
Registration
dcc.ac.uk·8h
🏛️PREMIS Metadata
The 90s UNIX Utility That Fell Out of Favour
blog.alexellis.io·10h
📟Terminal Forensics
The Problem Of Uncertain Significance
stetson.substack.com·2d·
Discuss: Substack
🧬Copy Number Variants
The Tragedy of the Computer Science Major
nationalreview.com·1d·
Discuss: Hacker News
💻CS
Finding MLB Player Types with K-Means Clustering
runningonnumbers.com·3d·
Discuss: Hacker News
🌊Spectral Clustering
Apple’s Private Cloud Compute vs. Confidential Computing
thenewstack.io·6h
🌊Stream Ciphers
LOL GitHub (2018)
jwz.org·20h·
Discuss: Hacker News
🐧FOSS
This Memecoin Coin Could Be 2025’s Best Crypto to Buy (DogeCoin Flashbacks )
hackernoon.com·20h
🔗Hash Chains
Navigating the Cybersecurity Budget Tug-of-War
darkreading.com·1d
🛡Cybersecurity
OASIS INTERNSHIP
dev.to·1d·
Discuss: DEV
🏴󠁧󠁢󠁳󠁣󠁴󠁿Scottish Computing
Poaching Hotspot Identification Using Satellite Imagery
arxiv.org·1d
🤖Advanced OCR
Gradient-Direction-Aware Density Control for 3D Gaussian Splatting
arxiv.org·1d
🌈Color Science
The Rise of Specialized AI Agents: How to Architect, Deploy, and Manage Them on AWS
dev.to·1d·
Discuss: DEV
🏠Homelab Orchestration
Scalable intelligent document processing using Amazon Bedrock Data Automation
aws.amazon.com·1d
🤖Archive Automation
Automated Knowledge Synthesis Network for Dynamic Scientific Discovery (AKS-DSD)
dev.to·2d·
Discuss: DEV
🏺Computational Archaeology
An Introduction to Web Development
dev.to·2d·
Discuss: DEV
🛠Language Design
Real-Time eBPF Intrusion Detection via Dynamic Kernel Graph Pruning & Anomaly Scoring
dev.to·1d·
Discuss: DEV
🔍eBPF
I'm Building an AI Agent to Write My Unit Tests
dev.to·1d·
Discuss: DEV
⚡Proof Automation
GS4Buildings: Prior-Guided Gaussian Splatting for 3D Building Reconstruction
arxiv.org·3d
🏺Computational Archaeology
Loading...Loading more...
AboutBlogChangelogRoadmap