Active
Recent
Comments
Search
Login
Login
ieeexplore.ieee.org: 30 stories from 22 submitters
2
The Bandwagon
☶
culture
ieeexplore.ieee.org
via
kaycebasques
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
My Time With the JFEAC
historical
ieeexplore.ieee.org
via
ztoz
7 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Defining, Measuring, and Managing Technical Debt
programming
ieeexplore.ieee.org
via
etagwerker
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Safer Linux Kernel Modules Using the D Programming Language
d
linux
ieeexplore.ieee.org
via
jmiven
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
-1
On the generation of high-quality random numbers by two-dimensional cellular automata
cryptography
programming
ieeexplore.ieee.org
via
LenFalken
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
Weird Machines, Exploitability, and Provable Unexploitability
security
ieeexplore.ieee.org
via
df
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
How Fast Do Algorithms Improve?
performance
ieeexplore.ieee.org
via
fernplus
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
Evolution of the Unix System Architecture: An Exploratory Case Study
☶
pdf
unix
ieeexplore.ieee.org
via
dbremner
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Evolution of the Unix System Architecture: An Exploratory Case Study
freebsd
unix
ieeexplore.ieee.org
via
nixcraft
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
Evolution of the Unix System Architecture: An Exploratory Case Study
historical
unix
ieeexplore.ieee.org
via
GeoffWozniak
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
A Review of Physics Simulators for Robotic Applications
ai
ieeexplore.ieee.org
via
friendlysock
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Reverse Engineering of Intel Microcode Update Structure
reversing
ieeexplore.ieee.org
via
calvin
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
The Origin of the “MIT License”
historical
law
ieeexplore.ieee.org
via
j11g
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
A CFI Countermeasure Against GOT Overwrite Attacks
pdf
security
ieeexplore.ieee.org
via
fro
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
The LISP 2 Project
☶
historical
ieeexplore.ieee.org
via
GeoffWozniak
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
A Survey of Research on Runtime Rerandomization Under Memory Disclosure
pdf
security
ieeexplore.ieee.org
via
fro
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
DOPdefenderPlus: A Data-Oriented Programming Attack Mitigation Technique for Complex Software
pdf
security
ieeexplore.ieee.org
via
fro
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Leakage Is Prohibited: Memory Protection Extensions Protected Address Space Randomization
pdf
security
ieeexplore.ieee.org
via
fro
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
HW-CDI: Hard-Wired Control Data Integrity
pdf
security
ieeexplore.ieee.org
via
fro
6 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
BoundShield: Comprehensive Mitigation for Memory Disclosure Attacks via Secret Region Isolation
pdf
security
ieeexplore.ieee.org
via
fro
6 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
10
The First Public Discussion of the Secret Colossus Project
☶
pdf
historical
ieeexplore.ieee.org
via
mjn
6 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game
practices
security
ieeexplore.ieee.org
via
cleong
6 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
Weird machines, exploitability, and provable unexploitability
☶
compsci
security
ieeexplore.ieee.org
via
koomi
7 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
PAPAC-00, a Do-It-Yourself Paper Computer
pdf
compsci
hardware
ieeexplore.ieee.org
via
friendlysock
7 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Resurrecting the CDC 6500 Supercomputer
☶
hardware
historical
ieeexplore.ieee.org
via
friendlysock
7 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
Page 2 >>