Cyber Humanities for Heritage Security
cacm.acm.org·1d
🎭Cultural Informatics
Flag this post
A Bayesian Analysis of Biblical Prophesies
📊HyperLogLog
Flag this post
Python Certifi and Custom CAs
🧪CBOR Fuzzing
Flag this post
A Reverse Engineer's Anatomy of the macOS Boot Chain and Security Architecture
🔌Operating system internals
Flag this post
eBPF Rootkit
🛡️eBPF Security
Flag this post
Hachi: An Image Search Engine
🌐Federated Search
Flag this post
Metadata: How data about your data is optimal for AI
datasciencecentral.com·4d
🤖AI Curation
Flag this post
Trying Out C++26 Executors
🦀Rust Macros
Flag this post
Show HN: LexiForge – Auto-generate vocabulary flashcards from Kindle lookups
🌀Brotli Dictionary
Flag this post
[R] Privacy Preserving In-Context-Learning Framework for Large Language Models
💻Local LLMs
Flag this post
The Sacrilegious Coder
🎯Gradual Typing
Flag this post
Perennial Technical Reading List
🔩Systems Programming
Flag this post
NLP Datasets for Idiom and Figurative Language Tasks
arxiv.org·2d
📊HyperLogLog
Flag this post
Show HN: Onlymaps, a Python Micro-ORM
🧩SQLite Extensions
Flag this post
A Developer's Guide to Test Case Generation with Genetic Algorithms
🧪Property-Based Testing
Flag this post
Probabilistic Graph Neural Inference for coastal climate resilience planning with ethical auditability baked in
⚡Incremental Computation
Flag this post
Rust Isn't the Future of Systems Programming – It's Just the Hype Cycle
🦀Rust Borrowing
Flag this post
Loading...Loading more...