Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

The Early History of Usenet (2019)

Efficient Hash Probes on Modern Processors (2007) [pdf]

Diffusion Models for Robotics Control

Netnews: The Origin Story

Common bugs in writing (2021)

ViperGPT: Visual Inference via Python Execution for Reasoning

Brief Notes on Computer Word and Byte Sizes

Zero-1-to-3: Zero-shot One Image to 3D Object

SingleShapeGen: Learning to Generate 3D Shapes from a Single Example

Self-Powered Camera

Incentives in Computer Science

ZeRØ: Zero-Overhead Resilient Operation Under Pointer Integrity Attacks

The Early History of Usenet, Part I: The Technological Setting

The Early History of Usenet

The Enduring Legacy of Dennis Ritchie

Cross-ISA Machine Instrumentation Using Fast/Scalable Dynamic Binary Translation

Hashed and Hierarchical Timing Wheels: Data Structures for Timers (1987)

Microsoft Is Abandoning SHA-1 Hashes for Updates–But Why?

The Evolution of IPsec

Overload Control for Scaling WeChat Microservices

German Cryptanalytic Attacks on the British World War II “TYPEX” Machine

The Economics of Hacking an Election

Eran Tromer's Attack on Ray Ozzie's CLEAR Protocol

FontCode: Embedding Information in Text Documents using Glyph Perturbation

Practical Memory Safety with Random Embedded Secret Tokens

Usenet, authentication, and engineering: early design decisions for Usenet

Bitcoin—The Andromeda Strain of Computer Science Research

Apple2fpga: Reconstructing an Apple II+ on an FPGA (2008)

Bjarne Stroustrup Awarded 2017 Faraday Medal

kR^X: Comprehensive Kernel Protection against Just-In-Time Code Reuse

More →