๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒณ Trie Structures

Prefix Trees, String Indexing, Compressed Tries, Text Processing

NEWS ROUNDUP โ€“ 30TH July 2025
digitalforensicsmagazine.comยท2h
๐Ÿ“ฐRSS Archaeology
Racksetup feedback and inspiration
i.redd.itยท16hยท
Discuss: r/homelab
๐Ÿ”ŒOperating system internals
Cobalt Strike Beacon delivered via GitHub and social media
securelist.comยท3h
๐ŸŽซKerberos Exploitation
Updates 2025 H1
mudkip.meยท1d
๐Ÿ”ŒOperating system internals
Sendblue (YC S23) is hiring senior engineers
ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿ“กFeed Archaeology
Reclaim Access to Your Stolen Digital Funds Use Blockchain Cyber Retrieve
news.ycombinator.comยท4hยท
Discuss: Hacker News
๐Ÿ”—Hash Chains
Bringing Together Clazy and Clang-Tidy
alex1701c.github.ioยท2dยท
Discuss: Lobsters, Hacker News, r/cpp
๐Ÿฆ€Rust Macros
60% of Americans Use AI for Search, Only 37% for Workplace Tasks, New Poll Finds
slashdot.orgยท18h
๐ŸงญContent Discovery
A local, portable, single-file web server in C
macrobean.siteยท13hยท
Discuss: Hacker News
๐Ÿ•ธ๏ธWebAssembly
Mathematical Typesetting in TeXmacs
texmacs.github.ioยท20hยท
Discuss: Hacker News
๐Ÿ“Document Algebra
Show HN: Empromptu.ai โ€“ No code, AI app builder with RAG, model, evals etc.
news.ycombinator.comยท11hยท
Discuss: Hacker News
๐ŸŒ€Brotli Internals
Privacy-Preserving Anonymization of System and Network Event Logs Using Salt-Based Hashing and Temporal Noise
arxiv.orgยท8h
๐Ÿ•ต๏ธNetwork Forensics
Stop Using Vulnerability Counts to Measure Software Security
cacm.acm.orgยท21h
๐Ÿ”“Hacking
InsurTech innovation using natural language processing
arxiv.orgยท8h
๐Ÿ“ABNF Parsing
Towards Locally Deployable Fine-Tuned Causal Large Language Models for Mode Choice Behaviour
arxiv.orgยท8h
๐Ÿ’ปLocal LLMs
Model-free Speculative Decoding for Transformer-based ASR with Token Map Drafting
arxiv.orgยท8h
๐ŸŒŠStreaming Compression
SoK: A Systematic Review of Context- and Behavior-Aware Adaptive Authentication in Mobile Environments
arxiv.orgยท8h
๐ŸŽฏThreat Hunting
Image Captioning via Compact Bidirectional Architecture
arxiv.orgยท8h
๐Ÿค–Advanced OCR
Diversity-Enhanced Reasoning for Subjective Questions
arxiv.orgยท1d
๐ŸŽ›๏ธFeed Filtering
Cross-Architecture Distillation Made Simple with Redundancy Suppression
arxiv.orgยท8h
๐Ÿ’ŽInformation Crystallography
Loading...Loading more...
AboutBlogChangelogRoadmap