Active
Recent
Comments
Search
Login
Login
Newest
Top
Newest stories submitted by
nickpsecurity
.
30
License Round Up
law
programming
writing.kemitchell.com
via
nickpsecurity
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
9 comments
9
4
Simple and Precise Static Analysis of Untrusted Linux Kernel Extensions (2019)
☶
pdf
assembly
c
formalmethods
security
seahorn.github.io
via
nickpsecurity
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
High Performance Correctly Rounded Math Libraries for 32-bit Floating Point Representations
☶
pdf
c
compsci
math
performance
cs.rutgers.edu
via
nickpsecurity
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Extending Event-B with Discrete, Timing Properties (2012)
☶
pdf
formalmethods
programming
deploy-eprints.ecs.soton.ac.uk
via
nickpsecurity
1 year ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Separation Logic (2019)
☶
formalmethods
programming
cacm.acm.org
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
An Interference-Free Programming Model for Network Objects (2016)
☶
pdf
distributed
java
networking
security
se.inf.ethz.ch
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
SafeGPU: Contract- and Library-based GPGPU for Object-Oriented Languages (2016)
☶
pdf
dotnet
formalmethods
graphics
security
se.inf.ethz.ch
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Lua in the NetBSD Kernel (2012)
pdf
slides
lua
netbsd
netbsd.org
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
6 comments
6
4
A Brief History of Software Engineering (2008)
☶
pdf
historical
programming
inf.ethz.ch
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
A Modular Scheme for Deadlock Prevention in an Object-Oriented Programming Model (2010)
☶
pdf
formalmethods
programming
security
se.inf.ethz.ch
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
Neuroevolution of Self-Interpretable Agents
☶
pdf
ai
arxiv.org
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
International Competition on Software Testing Test-Comp (2019)
☶
pdf
security
testing
sosy-lab.org
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
1
Survey of Automated Vulnerability Detection and Exploit Generation Techniques in C.R.S.'s (2018)
☶
pdf
ai
c
c++
formalmethods
security
testing
arxiv.org
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Applying Combinatorial Testing to Systems with a Complex Input Space (2013)
☶
pdf
c
java
testing
rc.library.uta.edu
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Verifying Arithmetic in Cryptographic C Programs
☶
pdf
c
cryptography
formalmethods
security
drive.google.com
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
5
JQF: Coverage-Guided Property-Based Testing in Java
☶
pdf
java
testing
people.eecs.berkeley.edu
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
Modular Information Hiding and Type-Safe Linking for C (2008)
☶
pdf
c
formalmethods
plt
saurabh-srivastava.com
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
3
Making Whiley Boogie! (2017)
☶
pdf
formalmethods
programming
homepages.ecs.vuw.ac.nz
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
12
Drawing with Ants: Generative Art with Ant Colony Optimization Algorithms
ai
art
javascript
python
amydyer.art
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
ARMY: A Deductive Verification Platform for ARM Programs Using Why3
☶
pdf
assembly
formalmethods
inforum.org.pt
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Binary Mutation Analysis of Tests Using Reassembleable Disassembly
☶
pdf
assembly
c
testing
www-users.cs.umn.edu
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
Data Abstraction and Relational Program Logic
☶
pdf
formalmethods
programming
arxiv.org
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
Pegasus: A Framework for Sound Continuous Invariant Generation
☶
pdf
formalmethods
programming
cs.cmu.edu
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Critical Perspectives on Provable Security: Fifteen Years of "Another Look" Papers
☶
pdf
cryptography
formalmethods
security
eprint.iacr.org
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
no comments
0
32
How Do Bullets Work in Video Games?
games
programming
gamasutra.com
via
nickpsecurity
2 years ago
|
archive
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
Page 2 >>