Active
Recent
Comments
Search
Login
Login
cl.cam.ac.uk: 25 stories from 41 submitters
3
Exploring New Attack Vectors for Exploitation of Smartphones (2017)
pdf
android
programming
security
cl.cam.ac.uk
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
The Notion of Proof in Hardware Verification (draft) (1989)
pdf
formalmethods
hardware
historical
cl.cam.ac.uk
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
28
ML For The Working Programmer, 2nd ed.
☶
book
pdf
ml
cl.cam.ac.uk
via
pushcx
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
13 comments
13
9
Network Semantics
formalmethods
networking
cl.cam.ac.uk
via
pushcx
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
38
Full text of "ML for the Working Programmer" now online!
ml
cl.cam.ac.uk
via
sergeyb
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
5
Firmament: Fast, Centralized Scheduling at Scale (2016)
☶
pdf
compsci
distributed
cl.cam.ac.uk
via
nickpsecurity
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
43
Some Were Meant for C: The Endurance of an Unmanageable Language
pdf
c
programming
cl.cam.ac.uk
via
wrs
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
14 comments
14
2
A Generic Synthesisable Test Bench
hardware
testing
cl.cam.ac.uk
via
pushcx
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
ALEXANDRIA: Large-Scale Formal Proof for the Working Mathematician
☶
compsci
formalmethods
math
ml
cl.cam.ac.uk
via
c-cube
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
3
Understanding the Basis of the Kalman Filter
pdf
compsci
cl.cam.ac.uk
via
Dawny33
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
12
Algebraic Subtyping
☶
pdf
ml
cl.cam.ac.uk
via
lojikil
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
4
Algebraic Subtyping [pdf]
pdf
compsci
cl.cam.ac.uk
via
akalin
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Custom ELF program headers—what, why and how
unix
cl.cam.ac.uk
via
mjn
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Debugging with the natives, part 2
debugging
cl.cam.ac.uk
via
PuercoPop
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
9
The Operating System: Should There Be One? (2013)
pdf
programming
cl.cam.ac.uk
via
pushcx
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
18
OCaml inside: a drop-in replacement for libtls
pdf
ml
security
cl.cam.ac.uk
via
dwc
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
8
Into the Depths of C: Elaborating the De Facto Standards
pdf
c
compilers
cl.cam.ac.uk
via
gandro
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Malfunctional Programming
☶
pdf
compilers
ml
cl.cam.ac.uk
via
dwc
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Into the Depths of C: Elaborating the De Facto Standards
pdf
c
cl.cam.ac.uk
via
pyk
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Pipelines are lazy functional composition with recombination (2011)
programming
unix
cl.cam.ac.uk
via
mjn
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Practical memory safety for C
pdf
c
cl.cam.ac.uk
via
calvin
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
A position on licensing research software
law
practices
cl.cam.ac.uk
via
mjn
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Fun with Semirings: A Functional Pearl on the Abuse of Linear Algebra
pdf
compsci
haskell
cl.cam.ac.uk
via
grace
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
9
What is C in practice?
c
cl.cam.ac.uk
via
sanxiyn
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
4
Security Analysis of Android Factory Resets
pdf
android
security
cl.cam.ac.uk
via
inactive-user
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
<< Page 1
|
Page 3 >>