Active
Recent
Comments
Search
Login
Login
people.csail.mit.edu: 34 stories from 26 submitters
3
Resilient Distributed Datasets: A Fault-Tolerant Abstraction for In-Memory Cluster Computing (2012)
pdf
compsci
distributed
people.csail.mit.edu
via
vector_spaces
14 days ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Algorithms for Finding Long Paths
pdf
math
people.csail.mit.edu
via
teymour
7 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
PACMAN: Attacking ARM Pointer Authentication with Speculative Execution
pdf
security
people.csail.mit.edu
via
lattera
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
13
On relational compilation
compilers
formalmethods
plt
people.csail.mit.edu
via
brendan
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
7 comments
7
18
Design and Implementation of a 256-Core BrainFuck Computer
pdf
hardware
programming
people.csail.mit.edu
via
Wryl
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
9
Going from Bad to Worse: From Internet Voting to Blockchain Voting
☶
pdf
cryptography
security
people.csail.mit.edu
via
mjec
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
Automated lost language deciphering using Phonetic Prior
pdf
ai
people.csail.mit.edu
via
inactive-user
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
8
The SIEUFERD Project
databases
people.csail.mit.edu
via
alexkorban
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
21
Introduction to Program Synthesis
education
plt
people.csail.mit.edu
via
zxtx
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Advanced Scheme: Some Naughty Bits
education
lisp
people.csail.mit.edu
via
zge
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Safecracker: Leaking Secrets through Compressed Caches
pdf
security
people.csail.mit.edu
via
fro
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Systems for Collective Human Curation of Online Discussion
pdf
culture
web
people.csail.mit.edu
via
enkiv2
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Sound and Robust Solid Modeling via Exact Real Arithmetic and Continuity
☶
pdf
formalmethods
hardware
plt
people.csail.mit.edu
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
5
Kendo: Efficient, Deterministic Multithreading in Software (2009)
☶
pdf
c
c++
compsci
linux
people.csail.mit.edu
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Configuration Synthesis for Programmable Analog Devices with Arco
pdf
compilers
hardware
people.csail.mit.edu
via
Forty-Bot
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors
pdf
security
people.csail.mit.edu
via
fro
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
Algebra and the Lambda Calculus
math
programming
people.csail.mit.edu
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
Log(Graph): A Near-Optimal High-Performance Graph Representation
☶
pdf
compsci
performance
programming
people.csail.mit.edu
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
2
Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement
☶
pdf
programming
people.csail.mit.edu
via
fcbsd
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Algorand: Scaling Byzantine Agreements for Cryptocurrencies (2017)
☶
pdf
merkle-trees
people.csail.mit.edu
via
atondwal
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Speculative Buffer Overflows: Attacks and Defenses
pdf
security
people.csail.mit.edu
via
lattera
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
A Brief Introduction to Adversarial Examples
ai
people.csail.mit.edu
via
mjn
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors
pdf
scaling
people.csail.mit.edu
via
jtfmumm
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
Give in to Procrastination and Stop Prefetching
pdf
networking
programming
people.csail.mit.edu
via
beyang
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
6
Systematic Synthesis of Elliptic Curve Cryptography Implementations
☶
pdf
assembly
cryptography
people.csail.mit.edu
via
pushcx
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
Page 2 >>