TopoKnit: Modeling the Topology of Yarns in Weft-Knitted Textiles (2021)
2022-06-13
Cybercriminals use reverse tunneling and URL shorteners to launch ‘virtually
2022-06-13
The Deceptive UX of Cookie Consent (and how to fix it)
2022-06-13
Ask HN: How would you handle pedantic code reviews?
2022-06-13
Discovering the Hidden Vocabulary of Dalle-2
2022-06-13
Tech world weighs options for software supply chain security, a call for urgency
2022-06-13
Ask HN: Is Bookmarking a Form of Procrastination?
2022-06-12
Vision GNN: An Image Is Worth Graph of Nodes
2022-06-12
Neighborhoods Watched: The Rise of Urban Mass Surveillance (2021)
2022-06-12
Tell HN: Laptop Hardware Designers): Put USB-C on Top of Screen
2022-06-11