๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐ŸŒ Web Archives

WARC Format, Internet Archive, Browser History, Digital Heritage

Show HN: AI Agent in Jupyter โ€“ Runcell
runcell.devยท1dยท
Discuss: Hacker News
๐Ÿ“„Document AI
What is this? The case for continually questioning our online experience
systems-souls-society.comยท4dยท
Discuss: Hacker News
๐ŸงฒMagnetic Philosophy
Asking questions with context
rubenerd.comยท22h
๐ŸŽฏThreat Hunting
Where LLMs Have Been Useful (For Rebuilding a Car)
outruncarbon.comยท16hยท
Discuss: Hacker News
๐ŸงฉWASM Components
Explaining the Need for Strongly Happens Before in C++
nekrozqliphort.github.ioยท1dยท
Discuss: Hacker News, r/cpp
โœจEffect Handlers
The Argentine hunt for a painting stolen by the Nazis 80 years ago
france24.comยท1d
๐Ÿ”Tape Forensics
ChatGPT has its uses, but I still hate it โ€“ and Iโ€™ll tell you why | Imogen West-Knights
theguardian.comยท2d
๐Ÿš€Indie Hacking
Dual-scale chemical ordering for cryogenic properties in CoNiV-based alloys
nature.comยท2d
๐ŸงฒMagnetic Domains
Was Language a Parental Invention?
theatlantic.comยท1d
๐Ÿ”ฒCellular Automata
Floods affect 1.2 million, displace nearly 250,000 in eastern Pakistan
the-independent.comยท1d
๐ŸŒŠStream Processing
FBI, Dutch cops seize fake ID marketplace that sold identity docs for $9
theregister.comยท1dยท
Discuss: Hacker News
๐Ÿ•ต๏ธVector Smuggling
What will happen to the legal status of โ€˜sinkingโ€™ nations when their land is gone?
theconversation.comยท1dยท
Discuss: Hacker News
๐Ÿ’ฐPreservation Economics
An ancient signpost: Minute fossils tell big story about arthropod evolution
phys.orgยท1d
๐ŸฆดDatabase Paleontology
Radiocarbon dating suggests Jerusalem's Siloam Dam was built in 800 BCE to face climate crisis
phys.orgยท1d
๐Ÿ“ธTIFF Archaeology
MSP denies hiding camera in Scottish Parliament toilets
the-independent.comยท4h
๐Ÿ”ฌArchive Forensics
MTalk-Bench: Evaluating Speech-to-Speech Models in Multi-Turn Dialogues via Arena-style and Rubrics Protocols
arxiv.orgยท3d
๐ŸŽ™๏ธWhisper
L-XAIDS: A LIME-based eXplainable AI framework for Intrusion Detection Systems
arxiv.orgยท3d
๐Ÿ”Vector Forensics
Disentangling Polysemantic Neurons with a Null-Calibrated Polysemanticity Index and Causal Patch Interventions
arxiv.orgยท3d
๐Ÿ”Vector Forensics
Risky Bulletin: FCC removes 1,200 voice providers from US phone network
news.risky.bizยท2d
๐ŸŽซKerberos Attacks
scI2CL: Effectively Integrating Single-cell Multi-omics by Intra- and Inter-omics Contrastive Learning
arxiv.orgยท2d
๐Ÿง Machine Learning
Loading...Loading more...
AboutBlogChangelogRoadmap