AdaptOver: Persistent DoS and IMSI Extraction from 3.8km away Continue reading @dl.acm.org | 1 year ago
The Chaostron: An Important Advance in Learning Machines (1961) Continue reading @dl.acm.org | 1 year ago
ByteGraph: A high-performance distributed graph database in ByteDance Continue reading @dl.acm.org | 1 year ago
Google Vizier: A Service for Black-Box Optimization (2017) [pdf] Continue reading @dl.acm.org | 1 year ago
ThermoSecure: AI-driven thermal attacks on commonly used computer keyboards Continue reading @dl.acm.org | 1 year ago
A Holistic Approach for Role Inference and Action Anticipation in Human Teams Continue reading @dl.acm.org | 1 year ago
A Survey on Homomorphic Encryption Schemes: Theory and Implementation Continue reading @dl.acm.org | 1 year ago
My VM is Lighter (and Safer) than your Container (2017) Comments | Continue reading @dl.acm.org | 1 year ago
Combining ML and Typographic Guidelines to Optimize Readability Continue reading @dl.acm.org | 1 year ago
Exocompilation for productive programming of hardware accelerators Continue reading @dl.acm.org | 1 year ago
Student Data Reveals Sociodemographic Gaps in Procrastination Behavior Continue reading @dl.acm.org | 1 year ago
Different Fonts Increase Reading Speed for Different Individuals Continue reading @dl.acm.org | 1 year ago
BaGuaLu: Targeting brain scale pretrained models with over 37M cores Continue reading @dl.acm.org | 1 year ago
Exocompilation for productive programming of hardware accelerators Continue reading @dl.acm.org | 1 year ago
On the Dangers of Stochastic Parrots: Can Language Models Be Too Big? [pdf] Continue reading @dl.acm.org | 1 year ago
PLDI 2022 Proceedings (Programming Language Design and Implementation) Continue reading @dl.acm.org | 1 year ago
Pacman: Attacking ARM pointer authentication with speculative execution Continue reading @dl.acm.org | 1 year ago
VoxLens: Data Visualizations Accessible with Interactive JavaScript Plug-In Continue reading @dl.acm.org | 1 year ago
D3: A Dynamic Deadline-Driven Approach for Building Autonomous Vehicles [pdf] Continue reading @dl.acm.org | 1 year ago
A Survey on Security Vulnerabilities of SGX and Countermeasures (2021) Continue reading @dl.acm.org | 2 years ago
Comparison of the functional power of APL2 and Fortran 90 (1991) Continue reading @dl.acm.org | 2 years ago