๐ฟ๏ธ Scour
Browse
Login
Sign Up
You are offline. Trying to reconnect...
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
โ๏ธ TLA+
Specification Language, Distributed Systems, Temporal Logic, System Modeling
Hot
Past Hour
Today
This Week
This Month
Subscribed Feeds
All Feeds
CVE-2024-12029 โ InvokeAI Deserialization of Untrusted Data vulnerability
offsec.com
ยท
20h
๐
WASI
AwesomeAssertions/AwesomeAssertions
github.com
ยท
1d
โ
Format Verification
NIH Is Far Cheaper Than The Wrong Dependency
lewiscampbell.tech
ยท
13h
ยท
Discuss:
Lobsters
,
Hacker News
๐
Code Metrics
Reversing Google's New VM-Based Integrity Protection: PairIP
blog.byterialab.com
ยท
2d
ยท
Discuss:
Hacker News
๐
WASI
A Wide Reduction Trick (2022)
words.filippo.io
ยท
1d
ยท
Discuss:
Lobsters
,
Hacker News
,
r/programming
๐ณ
Archive Merkle Trees
Differentiable Programming for Learnable Graphs: Optimizing LLM Workflows W DSPy
viksit.substack.com
ยท
4d
ยท
Discuss:
Substack
โก
Incremental Computation
How to avoid that your post about AI helps the hype
hidde.blog
ยท
43m
ยท
Discuss:
Hacker News
โ๏ธ
Emulation Ethics
Vertex-Guided Redundant Constraints Identification for Unit Commitment
arxiv.org
ยท
3d
๐
Linear programming
Claude Code Unleashed
ymichael.com
ยท
2d
ยท
Discuss:
Hacker News
โก
Proof Automation
Compliance is evolving โ Is your resilience ready?
techradar.com
ยท
6h
โ๏ธ
Legal Compliance
How I Got 100/100 From GPT-4, Gemini, Grok, and MoreโUsing Just a .txt File
dev.to
ยท
1d
ยท
Discuss:
DEV
โ๏ธ
Lean Tactics
The Rise of Agentic AI: How Autonomous Systems Are Transforming Industries
dev.to
ยท
1d
ยท
Discuss:
DEV
๐
Stream Processing
Why AI Agent Implementations Keep Failing (and the Patterns That Work)
davidlambauer.de
ยท
4d
ยท
Discuss:
Hacker News
โก
Proof Automation
๐ง When Will ChatGPT-5 Be Released? (July 2025 Update)
dev.to
ยท
6h
ยท
Discuss:
DEV
๐ฅ๏ธ
Terminal Renaissance
My Participation in the METR AI Productivity Study
domenic.me
ยท
2d
ยท
Discuss:
Hacker News
๐๏ธ
Observatory Systems
How to Develop a Web Application for 10K+ Users, Heavily Performing I/O-Bound Operations
dev.to
ยท
58m
ยท
Discuss:
DEV
๐
Stream Processing
Post-Quantum Cryptography in Kubernetes
kubernetes.io
ยท
13h
๐
Quantum Security
Iterative Augmentation with Summarization Refinement (IASR) Evaluation for Unstructured Survey data Modeling and Analysis
arxiv.org
ยท
1d
โ๏ธ
Compression Benchmarking
Improving Data and Parameter Efficiency of Neural Language Models Using Representation Analysis
arxiv.org
ยท
1d
๐งฎ
Kolmogorov Complexity
Deep Generative Methods and Tire Architecture Design
arxiv.org
ยท
1d
๐
Riemannian Computing
Loading...
Loading more...
« Page 13
โข
Page 15 »