Machine Learning Theory CS6783

Continue reading


@cs.cornell.edu | 1 year ago

ARF: Artistic Radiance Fields

Continue reading


@cs.cornell.edu | 1 year ago

Verifying Dynamic Trait Objects in Rust [pdf]

Continue reading


@cs.cornell.edu | 2 years ago

A Flexible Type System for Fearless Concurrency

Continue reading


@cs.cornell.edu | 2 years ago

PDL: A High-Level Hardware Design Language for Pipelined Processors

Continue reading


@cs.cornell.edu | 2 years ago

News flash: Female computer-science professor good with computers (2014)

Continue reading


@cs.cornell.edu | 2 years ago

Loop Perforation (2019)

Have you ever been frustrated that your code takes too long to run?Do you have a sneaking suspicion that most of the time is spent in loops?Have you ever considered just running fewer loops by having your compiler mangle your code to skip arbitrary loop iterations?Welcome to loop … | Continue reading


@cs.cornell.edu | 2 years ago

CompCert: Formally Verified C Compiler (2019)

MotivationThe primary motivation of this paper is that compilers these days form a base of trust for most modern applications. If the application's code is correct, then compiled executable of that application will also be correct. However, most modern compilers like GCC and LLVM … | Continue reading


@cs.cornell.edu | 2 years ago

Functional Programming in OCaml

Continue reading


@cs.cornell.edu | 2 years ago

Reticle: A Virtual Machine for Programming Modern FPGAs [pdf]

Continue reading


@cs.cornell.edu | 2 years ago

Vectorization for Digital Signal Processors via Equality Saturation [pdf]

Continue reading


@cs.cornell.edu | 3 years ago

Neural Scene Flow Fields for Space-Time View Synthesis of Dynamic Scenes

Continue reading


@cs.cornell.edu | 3 years ago

CS 6120: Advanced Compilers: The Self-Guided Online Course

Continue reading


@cs.cornell.edu | 3 years ago

Neural Scene Flow Fields for Space-Time View Synthesis of Dynamic Scenes

Continue reading


@cs.cornell.edu | 3 years ago

Seeing is believing: a client-centric specification of database isolation [pdf]

Continue reading


@cs.cornell.edu | 3 years ago

The Cult of Posits

Computers are incapable of representing arbitrary real numbers exactly.This is due to two intractable facts of real numbers: | Continue reading


@cs.cornell.edu | 3 years ago

Geometry Types for Graphics Programming [pdf]

Continue reading


@cs.cornell.edu | 3 years ago

The Game Design Initiative Lectures: Cornell University

Continue reading


@cs.cornell.edu | 3 years ago

Let’s Fix OpenGL (2017) [pdf]

Continue reading


@cs.cornell.edu | 3 years ago

The Meta-Circular Evaluator (1998)

Continue reading


@cs.cornell.edu | 3 years ago

“The Great ISAs” reading list

Continue reading


@cs.cornell.edu | 4 years ago

Uncrudify the New ACM Digital Library

Here’s a bookmarklet that removes the crud from the new ACM Digital Library pages. | Continue reading


@cs.cornell.edu | 4 years ago

Actual Causality (2016)

Continue reading


@cs.cornell.edu | 4 years ago

Cornell OCaml Textbook

Continue reading


@cs.cornell.edu | 4 years ago

Functional Programming in OCaml

Continue reading


@cs.cornell.edu | 4 years ago

Splay Trees

Continue reading


@cs.cornell.edu | 4 years ago

CS1114 Section 6: Convolution (2013) [pdf]

Continue reading


@cs.cornell.edu | 4 years ago

LLVM for Grad Students

LLVM is a godsend of a research tool. Here are some detailed notes on what LLVM is, why you would want to use it for research, and how to get started as a compiler hacker. | Continue reading


@cs.cornell.edu | 4 years ago

NetCache: Balancing Key-Value Stores with Fast In-Network Caching [pdf]

Continue reading


@cs.cornell.edu | 4 years ago

Foundations of Data Science [pdf]

Continue reading


@cs.cornell.edu | 4 years ago

Foundations of Data Science [pdf]

Continue reading


@cs.cornell.edu | 4 years ago

Authoritative Sources in a Hyperlinked Environment (1999) [pdf]

Continue reading


@cs.cornell.edu | 4 years ago

Measuring Computer Systems Is Almost Certainly Harder Than You Think

Mytkowicz et al.’s “Producing Wrong Data Without Doing Anything Obviously Wrong!” in ASPLOS 2009 is one of those papers that contains its own best summary.Right there in Section 2, it says: | Continue reading


@cs.cornell.edu | 4 years ago

Amortized Analysis

Continue reading


@cs.cornell.edu | 4 years ago

Networks, Crowds, and Markets: Reasoning About a Highly Connected World

Continue reading


@cs.cornell.edu | 4 years ago

Foundations of Data Science

Continue reading


@cs.cornell.edu | 4 years ago

Great Works in Programming Languages

Continue reading


@cs.cornell.edu | 4 years ago

Constructive mathematics and computer programming (1979) [pdf]

Continue reading


@cs.cornell.edu | 4 years ago

Language-Based Information-Flow Security (2003) [pdf]

Continue reading


@cs.cornell.edu | 4 years ago

FPGAs Have the Wrong Abstraction

Verilog is the de facto abstraction for programming today’s FPGAs. RTL programming is fine if you want to use FPGAs for their traditional purpose as circuit emulators, but it’s not the right thing for the new view of FPGAs as general-purpose computational accelerators. | Continue reading


@cs.cornell.edu | 4 years ago

Help Me Solve an Old Approximate Computing Problem

Here’s a problem from our paper on approximate storage that has been bugging me for about five years now. I think it’s a coding theory problem, but I have no traction whatsoever. Send me your brilliant insights. | Continue reading


@cs.cornell.edu | 4 years ago

Support Vector Machines (SVMs) Implementation in C (2008)]

Continue reading


@cs.cornell.edu | 4 years ago

CS4787 – Machine Learning Accelerators [pdf]

Continue reading


@cs.cornell.edu | 4 years ago

Password Typos and How to Correct Them Securely (2016)

Continue reading


@cs.cornell.edu | 5 years ago

Bar Induction Is Compatible with Constructive Type Theory [pdf]

Continue reading


@cs.cornell.edu | 5 years ago

[2018] State-of-the-art protections cannot prevent from inferring full records [pdf]

Continue reading


@cs.cornell.edu | 5 years ago

CS5412 – Spring 2018 Focus: Cloud Integration with the Internet of Things

Continue reading


@cs.cornell.edu | 5 years ago

Majority is not Enough: Bitcoin Mining is Vulnerable∗ [pdf]

Continue reading


@cs.cornell.edu | 5 years ago