Performance Left on the Table: An Eval of Compiler Autovectorization for RISC-V Continue reading @computer.org | 1 year ago
Tymshare's Changes to the Project Genie SDS-940 OS: A Historical Review Continue reading @computer.org | 2 years ago
Computing the Cubicle: Design for the High-Tech Office, 1970–1990 Continue reading @computer.org | 2 years ago
Hardware Specialization: From Cell to Heterogeneous Microprocessors Everywhere Continue reading @computer.org | 2 years ago
The Path to Successful Wafer-Scale Integration: The Cerebras Story Continue reading @computer.org | 2 years ago
Microarchitecture Patents over Time and Interesting Early Patents Continue reading @computer.org | 2 years ago
A Privacy-Preserving Biometric Authentication System with Binary Classification Continue reading @computer.org | 2 years ago
What Do We Know About Time Pressure in Software Development? Continue reading @computer.org | 2 years ago
Why Is It Getting Harder to Apply Software Architecture? Continue reading @computer.org | 2 years ago
Response time in man-computer conversational transactions Continue reading @computer.org | 3 years ago
Fingerprinting the Fingerprinters: Learning to Detect Fingerprinting Behaviors Continue reading @computer.org | 3 years ago
Will AI and Big Data Help Tamp Down Coronavirus? – IEEE Computer Society Continue reading @computer.org | 4 years ago
Guest Editors' Introduction: The Top Algorithms of the 20th Century (2000) Continue reading @computer.org | 4 years ago
Julia Co-Founder Alan Edelman Awarded the IEEE Sidney Fernbach Award Continue reading @computer.org | 4 years ago
Tech Opened the Door to the Gig Economy, but Is It Here to Stay? Continue reading @computer.org | 4 years ago
Random early detection gateways for congestion avoidance (1993) Continue reading @computer.org | 4 years ago
Famous Graphics Chips: Microsoft’s Talisman – The Chip That Never Was Continue reading @computer.org | 4 years ago
Tap 'N Ghost: A Compilation of Novel Attack Techniques Against Smartphone Continue reading @computer.org | 4 years ago
Drones' Cryptanalysis: Smashing Cryptography with a Flicker Continue reading @computer.org | 4 years ago
Hard Drive of Hearing: Disks That Eavesdrop with a Synthesized Microphone Continue reading @computer.org | 4 years ago
Godson-3: A Scalable Multicore RISC Processor with x86 Emulation Continue reading @computer.org | 5 years ago
Cascading Edge Failures: A Dynamic Network Process – 08078210.pdf Continue reading @computer.org | 5 years ago
Content-Aware Partial Compression for Textual Big Data Analysis in Hadoop [pdf] Continue reading @computer.org | 5 years ago
Business Programming Languages and the Legibility of Programming Continue reading @computer.org | 5 years ago
Zork: A Computerized Fantasy Simulation Game (1979) [pdf] Continue reading @computer.org | 5 years ago
50 Years of Software: IEEE Software Magazine Special Issue Continue reading @computer.org | 5 years ago
Language-Based Expression of Reliability and Parallelism for Low-Power Computing [pdf] Continue reading @computer.org | 5 years ago
IEEE Transactions on Computers • IEEE Computer Society [pdf] Continue reading @computer.org | 5 years ago