Active
Recent
Comments
Search
Login
Login
cs.columbia.edu: 13 stories from 12 submitters
8
Brief Notes on Computer Word and Byte Sizes
historical
cs.columbia.edu
via
fanf
22 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
ZeRØ: Zero-Overhead Resilient Operation Under Pointer Integrity Attacks
pdf
security
cs.columbia.edu
via
fro
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
5
The Early History of Usenet
☶
culture
historical
cs.columbia.edu
via
sebboh
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
The Early History of Usenet
culture
historical
cs.columbia.edu
via
calvin
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Certified concurrent abstraction layers (2018)
☶
pdf
c
formalmethods
osdev
cs.columbia.edu
via
nickpsecurity
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
FontCode: Embedding Information in Text Documents using Glyph Perturbation
pdf
ai
cryptography
security
cs.columbia.edu
via
Pushups
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
5
Bitcoin—The Andromeda Strain of Computer Science Research
merkle-trees
cs.columbia.edu
via
GeoffWozniak
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
10
Apple2fpga: Reconstructing an Apple II+ on an FPGA
hardware
historical
cs.columbia.edu
via
adamo
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
16
Posix Has Become Outdated (2016)
pdf
linux
unix
cs.columbia.edu
via
av
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
I Am Robot: (Deep) Learning to Break Semantic Image CAPTCHAs
pdf
cogsci
security
cs.columbia.edu
via
calvin
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
POSIX Abstractions in Modern OSes: The Old, The New, The Missing
☶
pdf
api
c
cs.columbia.edu
via
hao
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
You Can Type, but You Can’t Hide: A Stealthy GPU-based Keylogger (2013)
pdf
security
cs.columbia.edu
via
antifuchs
7 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
5
What Must We Trust?
security
cs.columbia.edu
via
inactive-user
8 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1