Newest Stories by lainon
Home
Recent
Comments
Search
Login
13
Who Left Open The Cookie Jar?
browsers
wholeftopenthecookiejar.eu
via
lainon
10 days ago
|
cached
|
1 comment
1
1
Small Sample Learning in Big Data Era
ai
arxiv.org
via
lainon
11 days ago
|
cached
|
no comments
0
2
uMine: a Blockchain based on Human Miners
cryptocurrencies
eprint.iacr.org
via
lainon
23 days ago
|
cached
|
no comments
0
1
From singularities to graphs
pdf
math
philosophy
arxiv.org
via
lainon
23 days ago
|
cached
|
no comments
0
20
Announcing Rust 1.28
release
rust
blog.rust-lang.org
via
lainon
24 days ago
|
cached
|
no comments
0
2
On the axiomatic foundations of the integrated information theory of consciousness
philosophy
ncbi.nlm.nih.gov
via
lainon
27 days ago
|
cached
|
1 comment
1
9
An infinite descent into pure mathematics
book
math
infinitedescent.xyz
via
lainon
1 month ago
|
cached
|
no comments
0
2
Artificial Intelligence (Stanford Encyclopedia of Philosophy)
ai
philosophy
plato.stanford.edu
via
lainon
1 month ago
|
cached
|
no comments
0
3
Public Accountability vs. Secret Laws: Can They Coexist?
crypto
eprint.iacr.org
via
lainon
1 month ago
|
cached
|
no comments
0
5
A Theory of Reversibility for Erlang
erlang
arxiv.org
via
lainon
2 months ago
|
cached
|
no comments
0
2
Leela Chess Zero: AlphaZero for the PC
ai
games
en.chessbase.com
via
lainon
4 months ago
|
cached
|
no comments
0
4
Fundamental Approaches to Software Engineering
book
programming
link.springer.com
via
lainon
4 months ago
|
cached
|
no comments
0
5
Soft 2D nanoarchitectonics
science
nature.com
via
lainon
4 months ago
|
cached
|
no comments
0
10
Mathematics and Computation
pdf
book
compsci
math
math.ias.edu
via
lainon
6 months ago
|
cached
|
no comments
0
4
ColorMod: Recoloring 3D Printed Objects using Photochromic Inks
design
science
hcie.csail.mit.edu
via
lainon
6 months ago
|
cached
|
no comments
0
5
On the P vs NP question: a proof of inequality
compsci
arxiv.org
via
lainon
6 months ago
|
cached
|
5 comments
5
12
The P-versus-NP page
compsci
win.tue.nl
via
lainon
6 months ago
|
cached
|
2 comments
2
5
Drive-by Key-Extraction Cache Attacks from Portable Code
pdf
crypto
eprint.iacr.org
via
lainon
6 months ago
|
cached
|
no comments
0
2
How to Reveal the Secrets of an Obscure White-Box Implementation
pdf
crypto
eprint.iacr.org
via
lainon
6 months ago
|
cached
|
no comments
0
13
FunTAL: mixing a functional language with assembly
assembly
dbp.io
via
lainon
9 months ago
|
cached
|
1 comment
1
8
Redis Streams and the Unified Log
databases
brandur.org
via
lainon
9 months ago
|
cached
|
3 comments
3
1
Automated Analysis of Cybercriminal Markets
ai
security
evidencebasedsecurity.org
via
lainon
9 months ago
|
cached
|
no comments
0
5
How Adversarial Attacks Work
ai
blog.ycombinator.com
via
lainon
9 months ago
|
cached
|
no comments
0
4
Forensic Analysis of Telegram Messenger on Android Smartphones
pdf
android
security
people.unipmn.it
via
lainon
9 months ago
|
cached
|
no comments
0
1
Codestrates: Literate Computing with Webstrates
programming
codestrates.org
via
lainon
10 months ago
|
cached
|
no comments
0