Home
Recent
Comments
Search
Login
Search
Search:
Stories
Comments
Order By:
Relevance
Newest
Points
69 results for "domain:cmu.edu"
4
The World's Fastest Scrabble Program (1988)
pdf
compsci
performance
cs.cmu.edu
via
pushcx
10 months ago
|
cached
|
1 comment
1
4
Larch: Languages and Tools for Formal Specification (1993)
pdf
formalmethods
historical
programming
cs.cmu.edu
via
nickpsecurity
12 months ago
|
cached
|
1 comment
1
4
Great Ideas in Theoretical Science
compsci
education
programming
cs.cmu.edu
via
nickpsecurity
12 months ago
|
cached
|
1 comment
1
3
Systemic Vulnerabilities in Customer-Premise Equipment (CPE) Routers
☶
pdf
networking
security
resources.sei.cmu.edu
via
mischa
1 year ago
|
cached
|
no comments
0
8
Cuckoo Filter: Practically Better Than Bloom
pdf
compsci
cs.cmu.edu
via
petergao
1 year ago
|
cached
|
no comments
0
4
On The Turing Completeness of MS PowerPoint
☶
compsci
andrew.cmu.edu
via
pushcx
1 year ago
|
cached
|
1 comment
1
4
Building a New Database Management System in Academia
databases
cs.cmu.edu
via
pushcx
1 year ago
|
cached
|
no comments
0
1
CMU 15-816: Substructural Logics
math
cs.cmu.edu
via
adamnemecek
1 year ago
|
cached
|
no comments
0
11
The glEnd() of Zelda: Automatic 3Dification of NES Games
video
graphics
cs.cmu.edu
via
pushcx
1 year ago
|
cached
|
no comments
0
2
NESL - A Nested, Data-Parallel, Programming Language (1990's)
ml
programming
cs.cmu.edu
via
nickpsecurity
1 year ago
|
cached
|
no comments
0
3
DeepDoggo: Learning to Answer “Who's a Good Dog?”
pdf
cogsci
satire
cs.cmu.edu
via
calvin
1 year ago
|
cached
|
no comments
0
2
CMU Artificial Intelligence Repository (1994)
☶
historical
cs.cmu.edu
via
bsima
1 year ago
|
cached
|
no comments
0
2
CMU 15-816: Substructural Logics
education
math
cs.cmu.edu
via
adamnemecek
1 year ago
|
cached
|
no comments
0
21
There was a Coke machine connected to the ARPANET in the 70's
historical
cs.cmu.edu
via
julienXX
1 year ago
|
cached
|
3 comments
3
2
Flask Security Architecture - System Support for Diverse, Security Policies (1999)
☶
pdf
security
cs.cmu.edu
via
nickpsecurity
1 year ago
|
cached
|
no comments
0
2
CMU's Libratus beat four of the world’s top poker players
☶
compsci
cs.cmu.edu
via
tf
1 year ago
|
cached
|
no comments
0
2
CMU 15-721: Database Systems
☶
databases
15721.courses.cs.cmu.edu
via
aduffy
1 year ago
|
cached
|
no comments
0
4
Can Programming Be Liberated from the von Neumann Style? (1978)
pdf
compsci
historical
cs.cmu.edu
via
av
1 year ago
|
cached
|
no comments
0
1
DDoS: Four Best Practices for Prevention and Response
security
insights.sei.cmu.edu
via
av
1 year ago
|
cached
|
no comments
0
3
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition
pdf
graphics
cs.cmu.edu
via
pushcx
1 year ago
|
cached
|
no comments
0
Page:
1
2
3
4