A Survey on Bias and Fairness in Machine Learning

Continue reading


@dl.acm.org | 1 year ago

The computer scientist as toolsmith II (1996)

Continue reading


@dl.acm.org | 1 year ago

On the Security of Thread Networks (WiSec 2022)

Continue reading


@dl.acm.org | 1 year ago

AdaptOver: Persistent DoS and IMSI Extraction from 3.8km away

Continue reading


@dl.acm.org | 1 year ago

The Chaostron: An Important Advance in Learning Machines (1961)

Continue reading


@dl.acm.org | 1 year ago

ByteGraph: A high-performance distributed graph database in ByteDance

Continue reading


@dl.acm.org | 1 year ago

The Case for Weird in AR/XR

Continue reading


@dl.acm.org | 1 year ago

Google Vizier: A Service for Black-Box Optimization (2017) [pdf]

Continue reading


@dl.acm.org | 1 year ago

ThermoSecure: AI-driven thermal attacks on commonly used computer keyboards

Continue reading


@dl.acm.org | 1 year ago

A Holistic Approach for Role Inference and Action Anticipation in Human Teams

Continue reading


@dl.acm.org | 1 year ago

Computing Arbitrary Functions of Encrypted Data

Continue reading


@dl.acm.org | 1 year ago

A Survey on Homomorphic Encryption Schemes: Theory and Implementation

Continue reading


@dl.acm.org | 1 year ago

My VM is Lighter (and Safer) than your Container (2017)

Comments | Continue reading


@dl.acm.org | 1 year ago

Combining ML and Typographic Guidelines to Optimize Readability

Continue reading


@dl.acm.org | 1 year ago

On Prolog and the Occur Check Problem (1989)

Continue reading


@dl.acm.org | 1 year ago

TruffleC: A C implementation on top of JVM

Continue reading


@dl.acm.org | 1 year ago

Building certified concurrent OS kernels

Continue reading


@dl.acm.org | 1 year ago

DB-Bert: A Database Tuning Tool That “Reads the Manual”

Continue reading


@dl.acm.org | 1 year ago

Lively Linear Lisp 'Look Ma, No Garbage ' (1992)

Continue reading


@dl.acm.org | 1 year ago

Snarf: A learning-enhanced range filter

Continue reading


@dl.acm.org | 1 year ago

Software 2.0 and Snorkel: Beyond Hand-Labeled Data

Continue reading


@dl.acm.org | 1 year ago

The Psychology of How Novices Learn Computer Programming

Continue reading


@dl.acm.org | 1 year ago

Embracing randomness is necessary in cloud environments

Continue reading


@dl.acm.org | 1 year ago

UpBit: Scalable In-Memory Updatable Bitmap Indexing

Continue reading


@dl.acm.org | 1 year ago

Software Transactional Memory (1997)

Continue reading


@dl.acm.org | 1 year ago

Using Lightweight Formal Methods

Continue reading


@dl.acm.org | 1 year ago

RTune: A RocksDB tuning system with deep genetic algorithm

Continue reading


@dl.acm.org | 1 year ago

Exocompilation for productive programming of hardware accelerators

Continue reading


@dl.acm.org | 1 year ago

Student Data Reveals Sociodemographic Gaps in Procrastination Behavior

Continue reading


@dl.acm.org | 1 year ago

Equal Rights for Functional Objects (1993) [pdf]

Continue reading


@dl.acm.org | 1 year ago

Different Fonts Increase Reading Speed for Different Individuals

Continue reading


@dl.acm.org | 1 year ago

Wear leveling in SSDs considered harmful

Continue reading


@dl.acm.org | 1 year ago

BaGuaLu: Targeting brain scale pretrained models with over 37M cores

Continue reading


@dl.acm.org | 1 year ago

Exocompilation for productive programming of hardware accelerators

Continue reading


@dl.acm.org | 1 year ago

A study of real-world data races in Golang

Continue reading


@dl.acm.org | 1 year ago

Workload-Adaptive Filtering in Storage Engines

Continue reading


@dl.acm.org | 1 year ago

HTAP Databases: What Is New and What Is Next

Continue reading


@dl.acm.org | 1 year ago

Quantum Algorithm Implementations for Beginners

Comments | Continue reading


@dl.acm.org | 1 year ago

On the Dangers of Stochastic Parrots: Can Language Models Be Too Big? [pdf]

Continue reading


@dl.acm.org | 1 year ago

Finding Typing Compiler Bugs

Continue reading


@dl.acm.org | 1 year ago

PLDI 2022 Proceedings (Programming Language Design and Implementation)

Continue reading


@dl.acm.org | 1 year ago

Pacman: Attacking ARM pointer authentication with speculative execution

Continue reading


@dl.acm.org | 1 year ago

VoxLens: Data Visualizations Accessible with Interactive JavaScript Plug-In

Continue reading


@dl.acm.org | 1 year ago

D3: A Dynamic Deadline-Driven Approach for Building Autonomous Vehicles [pdf]

Continue reading


@dl.acm.org | 1 year ago

A Survey on Security Vulnerabilities of SGX and Countermeasures (2021)

Continue reading


@dl.acm.org | 2 years ago

Aesthetics and the Human Factor in Programming (1972)

Continue reading


@dl.acm.org | 2 years ago

Comparison of the functional power of APL2 and Fortran 90 (1991)

Continue reading


@dl.acm.org | 2 years ago

Unified Theory of Garbage Collection

Continue reading


@dl.acm.org | 2 years ago