Becoming a Core Developer
stefaniemolin.com·18h
🦀Rust
Flag this post
Understanding the Worst .NET Vulnerability
🛡️Security
Flag this post
Gated DeltaNet (Linear Attention variant in Qwen3-Next and Kimi Linear)
🏗️Language Design
Flag this post
X-Request-Purpose: Identifying "research" and bug bounty related scans?, (Thu, Oct 30th)
isc.sans.edu·3d
🦀Rust
Flag this post
AI-Driven Spectrum Allocation Optimization via Bayesian Federated Learning on Edge SDR Platforms
🐳Container Orchestration
Flag this post
Beyond Visualization: Building Decision Intelligence Through Iterative Dashboard Refinement
arxiv.org·5h
🎨UX, UI
Flag this post
Enhancing ECG Classification Robustness with Lightweight Unsupervised Anomaly Detection Filters
arxiv.org·3d
🦀Rust
Flag this post
Can MLLMs Read the Room? A Multimodal Benchmark for Verifying Truthfulness in Multi-Party Social Interactions
arxiv.org·5h
✅Formal Verification
Flag this post
Evaluating Learning Congestion control Schemes for LEO Constellations
arxiv.org·4d
🏗️Language Design
Flag this post
Loading...Loading more...