Home
Recent
Comments
Search
Login
Search
Search:
Stories
Comments
Order By:
Relevance
Newest
Points
111 results for "domain:mit.edu"
2
MIT's modified LLVM compiler for optimizing parallel code
c
compilers
news.mit.edu
via
nhooyr
1 year ago
|
cached
|
no comments
0
5
SciGen - Automatic, CompSci Paper Generator
compsci
satire
pdos.csail.mit.edu
via
nickpsecurity
1 year ago
|
cached
|
no comments
0
15
Three States and a Plan: The A.I. of F.E.A.R.
pdf
games
practices
alumni.media.mit.edu
via
friendlysock
1 year ago
|
cached
|
3 comments
3
5
Designing an Authentication System: a Dialogue in Four Scenes (1997)
satire
security
web.mit.edu
via
calvin
1 year ago
|
cached
|
1 comment
1
6
Systematic Synthesis of Elliptic Curve Cryptography Implementations
☶
pdf
assembly
crypto
people.csail.mit.edu
via
pushcx
1 year ago
|
cached
|
1 comment
1
15
Lineage of vi
emacs
vim
web.mit.edu
via
lei
1 year ago
|
cached
|
3 comments
3
4
How to Design (Declarative) Programming Languages [2003]
compilers
programming
people.csail.mit.edu
via
sebastien
1 year ago
|
cached
|
no comments
0
15
50,000,000,000 Instructions Per Second: Design and Implementation of a 256-Core BrainFuck Computer
pdf
assembly
hardware
people.csail.mit.edu
via
calvin
1 year ago
|
cached
|
no comments
0
4
Terahertz time-gated spectral imaging for content extraction through layered structures
hardware
science
cameraculture.media.mit.edu
via
pushcx
1 year ago
|
cached
|
no comments
0
21
DuoSkin
hardware
duoskin.media.mit.edu
via
marvindanig
2 years ago
|
cached
|
1 comment
1
9
In Memory: Seymour Papert
cogsci
person
media.mit.edu
via
calvin
2 years ago
|
cached
|
4 comments
4
16
The SENPAI Protocol
pdf
crypto
satire
sigtbd.csail.mit.edu
via
friendlysock
2 years ago
|
cached
|
no comments
0
7
Riffle - An Efficient Communication System With Strong Anonymity
pdf
networking
privacy
people.csail.mit.edu
via
Snocrash
2 years ago
|
cached
|
1 comment
1
13
On the Effectiveness of Aluminium Foil Helmets: An Empirical Study
hardware
science
web.archive.org
via
pushcx
2 years ago
|
cached
|
no comments
0
56
xychelsea
person
zyan.scripts.mit.edu
via
tca
2 years ago
|
cached
|
no comments
0
2
Leading a Child to a Computer Culture (1975)
pdf
historical
programming
dspace.mit.edu
via
calvin
2 years ago
|
cached
|
no comments
0
4
New debugging method found 23 undetected security flaws in 50 popular Web apps
security
web
news.mit.edu
via
av
2 years ago
|
cached
|
no comments
0
5
Building Robust Systems by Gerald Jay Sussman (2007)
☶
pdf
practices
groups.csail.mit.edu
via
bsima
2 years ago
|
cached
|
no comments
0
7
A Brief History of ClarisWorks
historical
mac
groups.csail.mit.edu
via
calvin
2 years ago
|
cached
|
no comments
0
5
Keys Under Doormats (2015)
☶
pdf
security
dspace.mit.edu
via
bsima
2 years ago
|
cached
|
2 comments
2
Page:
1
2
3
4
5