Home
Recent
Comments
Search
Login
Search
Search:
Stories
Comments
Order By:
Relevance
Newest
Points
74 results for "domain:blog.acolyer.org"
12
To type or not to type: quantifying detectable bugs in JavaScript
javascript
programming
blog.acolyer.org
via
calvin
11 months ago
|
cached
|
5 comments
5
3
Automatic database management system tuning through large-scale machine learning
ai
databases
blog.acolyer.org
via
calvin
11 months ago
|
cached
|
no comments
0
5
Node.fz: fuzzing the server-side event-driven architecture
nodejs
testing
blog.acolyer.org
via
sanxiyn
12 months ago
|
cached
|
no comments
0
4
Complete event trend detection in high-rate data streams
programming
blog.acolyer.org
via
SeanTAllen
1 year ago
|
cached
|
no comments
0
6
ACIDRain: concurrency-related attacks on database backed web applications
databases
security
blog.acolyer.org
via
fcbsd
1 year ago
|
cached
|
no comments
0
14
Do we need specialized graph databases? Benchmarking real-time social networking applications
databases
blog.acolyer.org
via
unbalancedparentheses
1 year ago
|
cached
|
3 comments
3
16
IoT goes nuclear: creating a ZigBee chain reaction
hardware
security
blog.acolyer.org
via
matthewfarwell
1 year ago
|
cached
|
6 comments
6
21
System programming in Rust: beyond safety
programming
rust
blog.acolyer.org
via
calvin
1 year ago
|
cached
|
1 comment
1
3
On the duality of operating system structures
api
philosophy
programming
blog.acolyer.org
via
friendlysock
1 year ago
|
cached
|
no comments
0
2
Mosaic: processing a trillion-edge graph on a single machine
databases
performance
blog.acolyer.org
via
unbalancedparentheses
1 year ago
|
cached
|
no comments
0
6
An empirical study on the correctness of formally verified distributed systems
distributed
blog.acolyer.org
via
unbalancedparentheses
1 year ago
|
cached
|
1 comment
1
2
Who controls the Internet? Analyzing global threats using property traversal graphs
networking
security
blog.acolyer.org
via
unbalancedparentheses
1 year ago
|
cached
|
1 comment
1
36
80% of Docker images tagged *latest* have high severity vulnerabilities
security
blog.acolyer.org
via
kb
1 year ago
|
cached
|
18 comments
18
4
Stochastic program optimization
compilers
blog.acolyer.org
via
xcombelle
1 year ago
|
cached
|
1 comment
1
4
Application crash consistency and performance with CCFS
linux
blog.acolyer.org
via
xcombelle
1 year ago
|
cached
|
no comments
0
15
Deconstructing Xen
security
virtualization
blog.acolyer.org
via
sevan
1 year ago
|
cached
|
no comments
0
7
Thou shalt not depend on me: analysing the use of outdated JavaScript libraries on the web
web
blog.acolyer.org
via
ThisIs_MyName
1 year ago
|
cached
|
no comments
0
6
A fistful of Bitcoins: Characterizing payments among men with no names
cryptocurrencies
privacy
blog.acolyer.org
via
pushcx
1 year ago
|
cached
|
1 comment
1
5
Ironfleet - Proving Practical, Distributed Systems Correct (2015)
distributed
math
programming
blog.acolyer.org
via
nickpsecurity
1 year ago
|
cached
|
no comments
0
2
Fencing off Go: Liveness and safety for channel-based programming
compilers
go
haskell
blog.acolyer.org
via
aduffy
1 year ago
|
cached
|
no comments
0
Page:
1
2
3
4