๐Ÿฟ๏ธ ScourBrowse
LoginSign Up
You are offline. Trying to reconnect...
Copied to clipboard
Unable to share or copy to clipboard
๐Ÿ’ป CS

computer science, automata, theory, computation

Post-Quantum Cryptography in Kubernetes
kubernetes.ioยท2d
๐ŸŒNetworkProtocols
Show HN: Made a CD interest for my family
cd-interest-calculator.comยท19hยท
Discuss: Hacker News
โœ“Automated Theorem Proving
Coffeezilla, the YouTuber Exposing Crypto Scams (2022)
newyorker.comยท4hยท
Discuss: Hacker News
๐ŸŽฎVerification Games
Steve Jobs, the Xerox Alto, and computer typography
righto.comยท3dยท
Discuss: Hacker News
๐Ÿ’พRetro Computing
Debcraft โ€“ Easiest way to modify and build Debian packages
optimizedbyotto.comยท1dยท
Discuss: Hacker News
โ„๏ธNixified Development
My thoughts on calculating ROI for AI investment at a Series B startup
hbmartin.substack.comยท1dยท
Discuss: Substack
๐Ÿ‘๏ธSystem Observability
Training a Chunker with Burn
elijahpotter.devยท4dยท
Discuss: Hacker News
๐ŸซEmbedded OCaml
The New Surprising Number of Steam Games That Use GenAI
totallyhuman.ioยท2dยท
Discuss: Hacker News, r/TwoBestFriendsPlay
๐ŸŽฎVerification Games
The Smart Money on How Devs Should Charge for Apps
thenewstack.ioยท1d
โ„๏ธNixified Development
The Boom Is in Data
medium.comยท2dยท
Discuss: Hacker News
๐Ÿ‘๏ธSystem Observability
S2SRec2: Set-to-Set Recommendation for Basket Completion with Recipe
arxiv.orgยท5d
๐Ÿ” Type-Level Programming
Cancellative Convex Semilattices
arxiv.orgยท4d
โžก๏ธCategory Theory
Ask HN: Where is Git for my Claude Code conversations?
news.ycombinator.comยท1dยท
Discuss: Hacker News
๐Ÿค–Program Synthesis
DIY cabinet design for (hopefully) silent-ish homelab
reddit.comยท18hยท
Discuss: r/homelab
๐Ÿ HomeLab
Risk in Stochastic and Robust Model Predictive Path-Following Control for Vehicular Motion Planning
arxiv.orgยท3d
๐Ÿ”„Finite State Machines
Data Fusion and Aggregation Methods to Develop Composite Indexes for a Sustainable Future
arxiv.orgยท5d
๐Ÿ“กNetwork Protocol Design
The Shape of Deceit: Behavioral Consistency and Fragility in Money Laundering Patterns
arxiv.orgยท4d
๐ŸŒNetworkProtocols
PU-Lie: Lightweight Deception Detection in Imbalanced Diplomatic Dialogues via Positive-Unlabeled Learning
arxiv.orgยท5d
๐ŸŒNetworkProtocols
The Bayesian Approach to Continual Learning: An Overview
arxiv.orgยท5d
๐ŸŽฎVerification Games
Bridging Robustness and Generalization Against Word Substitution Attacks in NLP via the Growth Bound Matrix Approach
arxiv.orgยท5d
โžก๏ธCategory Theory
Loading...Loading more...
AboutBlogChangelogRoadmap