Active
Recent
Comments
Search
Login
Login
people.eecs.berkeley.edu: 23 stories from 11 submitters
5
How Futile are Mindless Assessments of Roundoff in Floating-Point Computation? (2006)
pdf
math
people.eecs.berkeley.edu
via
hwayne
4 months ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
Trace Scheduling: A Technique for Global Microcode Compaction (1981)
pdf
compilers
people.eecs.berkeley.edu
via
calvin
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Personal Calculator Has Key To Solve Any Equation f(x)=0 (1979)
pdf
hardware
math
people.eecs.berkeley.edu
via
rtpg
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Roofline: A visual performance model for floating-point programs and multicore architectures
pdf
performance
visualization
people.eecs.berkeley.edu
via
itamarst
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
JQF: Coverage-Guided Property-Based Testing in Java
☶
pdf
java
testing
people.eecs.berkeley.edu
via
nickpsecurity
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
How Futile are Mindless Assessments of Roundoff in Floating-Point Computation ?
pdf
programming
people.eecs.berkeley.edu
via
calvin
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
8
PRaft: Building Provably Safe Distributed Systems using Model Checking
☶
pdf
formalmethods
people.eecs.berkeley.edu
via
ceh
3 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
An Interview with the Old Man of Floating-Point (1998)
hardware
historical
people.eecs.berkeley.edu
via
hwayne
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Bounds for sorting by prefix reversal (1978)
pdf
compsci
people.eecs.berkeley.edu
via
calvin
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
A Hardware Accelerator for Tracing Garbage Collection (2018)
☶
pdf
hardware
java
linux
performance
security
people.eecs.berkeley.edu
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Model-Checking an Entire Linux Distribution for Security Vulnerabilities (2005)
☶
pdf
formalmethods
linux
security
people.eecs.berkeley.edu
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Detect pressed keys via microphone audio capture in real-time
pdf
security
people.eecs.berkeley.edu
via
Yogthos
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
5
Statically-Directed Dynamic Automated Test Generation
☶
pdf
assembly
formalmethods
testing
people.eecs.berkeley.edu
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
MACE: Model-inference-Assisted Concolic Exploration for Protocol and Vulnerability Discovery
☶
pdf
formalmethods
programming
security
people.eecs.berkeley.edu
via
nickpsecurity
4 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
High-Coverage Hint Generation for Massive Courses
☶
pdf
video
compsci
formalmethods
lisp
programming
people.eecs.berkeley.edu
via
bandali
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
Scaling up Superoptimization (2016)
☶
pdf
compilers
performance
people.eecs.berkeley.edu
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
3 comments
3
1
A Design and Verification Methodology for Secure Isolated Regions (2016)
☶
pdf
formalmethods
programming
security
people.eecs.berkeley.edu
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Setuid Demystified (2002)
☶
pdf
formalmethods
security
unix
people.eecs.berkeley.edu
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
An Interview with the Old Man of Floating-Point [1998]
historical
programming
people.eecs.berkeley.edu
via
gerikson
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Synthesis of Statically-Analyzable, Accelerator Networks from Sequential Programs (2016)
pdf
compsci
hardware
performance
programming
people.eecs.berkeley.edu
via
nickpsecurity
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Markov's Inequality for Matrices
math
people.eecs.berkeley.edu
via
pushcx
5 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Numbers Every Programmer Should Know By Year
programming
visualization
people.eecs.berkeley.edu
via
pushcx
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Stuart Russell's Q & A: The future of artificial intelligence
cogsci
compsci
philosophy
people.eecs.berkeley.edu
via
tf
6 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0