Active
Recent
Comments
Search
Login
Login
dl.acm.org: 71 stories from 46 submitters
12
Beyond Relooper: recursive translation of unstructured control flow to structured control flow
pdf
compilers
plt
dl.acm.org
via
Corbin
9 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
22
On the Dangers of Stochastic Parrots: Can Language Models Be Too Big? (2021)
☶
pdf
ai
dl.acm.org
via
fcbsd
2 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
13 comments
13
3
RegCPython: A Register-based Python Interpreter for Better Performance
performance
python
dl.acm.org
via
asb
3 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
PiDRAM: A Holistic End-to-end FPGA-based Framework for Processing-in-DRAM
☶
pdf
hardware
dl.acm.org
via
calvin
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Faster general parsing through context-free memoization (PLDI 2020)
☶
compilers
compsci
dl.acm.org
via
vrthra
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
1
Fail-Slow at Scale: Evidence of Hardware Performance Faults in Large Production Systems (2018)
hardware
performance
dl.acm.org
via
sknebel
5 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
C to Checked C by 3C
c
compilers
formalmethods
dl.acm.org
via
pushcx
6 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
1
How to design a good API and why it matters (2006)
api
java
practices
dl.acm.org
via
carlmjohnson
7 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
TAG: Tagged Architecture Guide
pdf
hardware
security
dl.acm.org
via
indolering
8 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
5
Smalltalk and Exploratory Programming (1988)
historical
dl.acm.org
via
mpweiher
9 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
BaGuaLu: targeting brain scale pretrained models with over 37 million cores
ai
dl.acm.org
via
Yogthos
11 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
List processing in real time on a serial computer (1978)
pdf
compsci
hardware
lisp
dl.acm.org
via
calvin
11 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Concepts of the Text Editor Lara (1985)
programming
dl.acm.org
via
lorddimwit
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Embedding Information in Text Documents Using Glyph Perturbation
pdf
programming
dl.acm.org
via
epilys
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
6
The Pushback Effects of Race, Ethnicity, Gender, and Age in Code Review
practices
programming
dl.acm.org
via
thrgamon
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
Does Transparency in Moderation Really Matter?: User Behavior After Content Removal Explanations on Reddit
pdf
culture
dl.acm.org
via
ngoldbaum
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
5
Less is more: multiparty session types revisited
formalmethods
dl.acm.org
via
pmonson711
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
10
Using Lightweight Formal Methods to Validate a Key-Value Storage Node in Amazon S3
formalmethods
dl.acm.org
via
pushcx
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
14
LAPD: Hidden Spy Camera Detection using Smartphone Time-of-Flight Sensors
pdf
security
dl.acm.org
via
fcbsd
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
DIFUZE: Interface Aware Fuzzing for Kernel Drivers (2017)
☶
linux
security
dl.acm.org
via
dbremner
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Efficient Tree-Traversals: Reconciling Parallelism and Dense Data Representations
☶
compsci
dl.acm.org
via
calvin
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
5
Enabling Personal Computational Handweaving with a Low-Cost Jacquard Loom
pdf
hardware
dl.acm.org
via
napkindrawing
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
15
The Unwritten Contract of Solid State Drives
☶
databases
hardware
dl.acm.org
via
kuijsten
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Characterizing, Exploiting, and Detecting DMA Code Injection Vulnerabilities in the Presence of an IOMMU
pdf
security
dl.acm.org
via
fro
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
14
Accelerometer data from smartphones can reveal people's location, passwords, and much more
security
dl.acm.org
via
Yogthos
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
Page 2 >>