pdf
Home
Recent
Comments
Search
Login
Stories
tagged
as
pdf
– Link to a PDF document
4
The Design and Implementation of Hyperupcalls
☶
pdf
performance
security
virtualization
usenix.org
via
ceh
1 month ago
|
cached
|
no comments
0
6
The Case for Teaching Functional Programming in Discrete Math (2011)
☶
pdf
education
math
programming
cs.wheaton.edu
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
9
The Site Reliability Workbook: Practical Ways to Implement SRE
☶
pdf
devops
services.google.com
via
lordgilman
1 month ago
|
cached
|
no comments
0
2
A NEaT Design for Reliable and Scalable Network Stacks (2016)
☶
pdf
networking
security
cs.vu.nl
via
nickpsecurity
1 month ago
|
cached
|
1 comment
1
2
RSSAC023: History of the Root Server System
☶
pdf
historical
networking
icann.org
via
mjturner
1 month ago
|
cached
|
no comments
0
3
Algorand: Scaling Byzantine Agreements for Cryptocurrencies (2017)
☶
pdf
cryptocurrencies
people.csail.mit.edu
via
atondwal
1 month ago
|
cached
|
no comments
0
34
NetSpectre: Read Arbitrary Memory over Network
pdf
hardware
security
misc0110.net
via
alex_gaynor
1 month ago
|
cached
|
1 comment
1
5
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers
☶
pdf
hardware
security
s3.eurecom.fr
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
2
Given Enough Eyeballs, All Bugs Are Shallow? Revisiting Eric Raymond with Bug Bounty Programs
☶
pdf
compsci
security
weis2016.econinfosec.org
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
4
Formal Semantics and Automated Verification for the Border Gateway Protocol (2016)
☶
pdf
formalmethods
networking
conferences.sigcomm.org
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
5
Safe Dynamic Memory Management in Ada and SPARK
☶
pdf
plt
programming
adacore.com
via
nickpsecurity
1 month ago
|
cached
|
1 comment
1
1
Algebraic Principles for Program Correctness Tools in Isabelle HOL (2016)
☶
pdf
formalmethods
programming
cl.cam.ac.uk
via
nickpsecurity
1 month ago
|
cached
|
1 comment
1
5
Risks of Cryptocurrencies
☶
pdf
cryptocurrencies
icsi.berkeley.edu
via
GeoffWozniak
1 month ago
|
cached
|
6 comments
6
4
VM AND THE VM COMMUNITY: Past, Present, and Future (1991)
pdf
historical
leeandmelindavarian.com
via
calvin
1 month ago
|
cached
|
no comments
0
1
Rely-Guarantee Termination and Cost Analyses of Loops with Concurrent Interleavings (2017)
☶
pdf
formalmethods
programming
costa.fdi.ucm.es
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
1
Mutable Checkpoint-Restart: Automating, Live Updates for Generic Server Programs (2014)
☶
pdf
c
linux
cs.vu.nl
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
4
Type Systems as Macros (2017)
☶
pdf
compilers
plt
ccs.neu.edu
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
2
Object Flow Integrity (2017)
☶
pdf
programming
security
acmccs.github.io
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
2
Domino Tilings
pdf
math
code-spot.co.za
via
pushcx
1 month ago
|
cached
|
no comments
0
2
Single Event Upset at Ground Level (1996)
☶
pdf
hardware
web.archive.org
via
pushcx
1 month ago
|
cached
|
1 comment
1
2
Inaudible Voice Commands: The Long-Range Attack and Defense
pdf
security
web.engr.illinois.edu
via
dbremner
1 month ago
|
cached
|
no comments
0
5
Your Server as a Function (2013)
☶
pdf
distributed
plt
scala
monkey.org
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
5
Gravitational Lensing by Spinning Black Holes in Astrophysics, and in the Movie Interstellar (2015)
☶
pdf
graphics
science
arxiv.org
via
mjn
1 month ago
|
cached
|
no comments
0
1
Dancing with Giants: Wimpy Kernels for On-demand Isolated I/O (2014)
☶
pdf
security
virtualization
cylab.cmu.edu
via
nickpsecurity
1 month ago
|
cached
|
no comments
0
3
The Remote Monad
pdf
compsci
haskell
ittc.ku.edu
via
julienXX
1 month ago
|
cached
|
no comments
0
<< Page 3
|
Page 5 >>