Loading...

Tag trends are in beta. Feedback? Thoughts? Email me at [email protected]

Tutorial on Good Lisp Programming Style (1993)

The Eyes Have It: A Task by Data Type Taxonomy for Information Visualizations (1996)

Invisibility Cloak

Golden Rules of Interface Design (2013)

Intro to Cryptography [pdf] (2011)

Social processes and proofs of theorems and programs (1979) [pdf]

CMSC 430: Design and Implementation of Programming Languages

Making an ML Invisibility Cloak

Investigating Influencer VPN Ads on YouTube

Enhanced IP: IPv4 with 64 Bit Addresses (2012)

Reordering on an Alpha processor

Reflections on Trusting ‘Trustlessness’ in the Era of “Crypto”/Blockchains

Weaponizing Middleboxes for TCP Reflected Amplification

Spying with Your Robot Vacuum Cleaner: Eavesdropping via Lidar Sensors

Evading Censorship from the Server-side

Beyond Intelligent Machines: Just Do It (1993)

AnyLog: A grand unification of the Internet of Things

An Overview of Deterministic Database Systems (2018)

Norvig and Pitman tutorial on good Lisp programming style

Bill Gasarch has published a new poll on P versus NP. 88% of respondents believe P≠NP (2002: 61%, 2012: 83%).

Achieving Safety Incrementally with Checked C

Achieving Safety Incrementally with Checked C

unCaptcha: A Low-Resource Defeat of reCaptchas Audio Challenge

Lightweight Monadic Programming in ML (2011)

ACSL by Example: Towards a Verified C Standard Library (2016)

The Relationship Between COBOL and Computer Science

Locksmith - Practical, Static, Race Detection for C

Live updating map of residential internet outages due to Irma

The Magic of XOR

The Xerox Star: A Retrospective (1989)

More →