Configuration Synthesis for Programmable Analog Devices with Arco

Succincter

Differentiable Monte Carlo Ray Tracing Through Edge Sampling

DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors

Algebra and the Lambda Calculus

Log(Graph): A Near-Optimal High-Performance Graph Representation (2018)

Differentiable Programming for Image Processing and Deep Learning in Halide

Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement

MIT 6.886 Graph Analytics Spring 2018

Algorand: Scaling Byzantine Agreements for Cryptocurrencies (2017)

A Brief Introduction to Adversarial Examples

Speculative Buffer Overflows: Attacks and Defenses

The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors

S-Expressions (1997)

Approximate String Joins with Abbreviations

Inference and Regeneration of Programs That Manipulate Relational Databases

Turning Corners into Cameras: Principles and Methods

Inference and Regeneration of Programs that Store and Retrieve Data

Getting Started in Star Lisp (1991)

Give in to Procrastination and Stop Prefetching (2013)

MIT Fractal Processor Enables ~88X Speedup

D-Expressions: Lisp Power, Dylan Style (1999)

Using Programming Language Concepts to Teach General Thinking Skills

"A closure is a poor man's object; an object is a poor man's closure" (2003)

Jenga: Sotware-Defined Cache Hierarchies

Building web applications on top of encrypted data using Mylar

Systematic Synthesis of Elliptic Curve Cryptography Implementations

How to Design (Declarative) Programming Languages [2003]

Design and Implementation of a 256-Core BrainFuck Computer

Purposes, Concepts, Misfits, and a Redesign of Git [PDF]

More →