[PDF] Mathematical Definition, Mapping, and Detection of (Anti)Fragility

Continue reading


@hal.archives-ouvertes.fr | 1 year ago

Can GPT-3 write an academic paper on itself, with minimal human input? [paper]

GPT-3 is a powerful artificial intelligence system that can generate text. In this paper, we explore GPT-3's ability to write about itself. We find that GPT-3 can generate clear and concise descriptions of its own capabilities and features. This is a significant advance over prev … | Continue reading


@hal.archives-ouvertes.fr | 1 year ago

My Cookie is a phoenix: cookie respawning with browser fingerprinting

Stateful and stateless web tracking gathered much attention in the last decade, however they were always measured separately. To the best of our knowledge, our study is the first to detect and measure cookie respawning with browser and machine fingerprinting. We develop a detecti … | Continue reading


@hal.archives-ouvertes.fr | 2 years ago

Another Look at Implementation of R/W Registers in Crash-prone Async M-P Systems [pdf]

Continue reading


@hal.archives-ouvertes.fr | 2 years ago

A Simple, Possibly Correct LR Parser for C11

Continue reading


@hal.archives-ouvertes.fr | 2 years ago

Drawing random floating-point numbers from an interval [pdf]

Continue reading


@hal.archives-ouvertes.fr | 2 years ago

Noisesniffer: A Fully Automatic Image Forgery Detector Based on Noise Analysis

Images undergo a complex processing chain from the moment light reaches the camera's sensor until the final digital image is delivered. Each of these operations leave traces on the noise model which enable forgery detection through noise analysis. In this article we define a back … | Continue reading


@hal.archives-ouvertes.fr | 2 years ago

Why is the transference theory of causation insufficient? [pdf]

Continue reading


@hal.archives-ouvertes.fr | 3 years ago

Generating Random Floating-Point Numbers by Dividing Integers: A Case Study

A method widely used to obtain IEEE 754 binary floating-point numbers with a standard uniform distribution involves drawing an integer uniformly at random and dividing it by another larger integer. We survey the various instances of the algorithm that are used in actual software … | Continue reading


@hal.archives-ouvertes.fr | 4 years ago

Konrad Hinsen, “Reusable vs. re-editable code” [pdf] (2018)

Continue reading


@hal.archives-ouvertes.fr | 4 years ago

Novel Methods for Solving the Conformable Wave Equation

In this paper, a two-dimensional conformable fractional wave equation describing a circular membrane undergoing axisymmetric vibrations is formulated. It was found that the analytical solutions of the fractional wave equation using the conformable fractional formulation can be ea … | Continue reading


@hal.archives-ouvertes.fr | 4 years ago

The Computer Scientist Nightmare: My Favourite Bug (2016) [pdf]

Hop has recently been used by a small French company, which we will call AIMM in the rest of this paper, to implement a new widget for a web multimedia application. This widget contained two parts: a music selector that lets end users browse a database of artists and music, and a … | Continue reading


@hal.archives-ouvertes.fr | 4 years ago

Earth’s Energy Imbalance Measured from Space

Continue reading


@hal.archives-ouvertes.fr | 4 years ago

For Cybersecurity, Computer Science Must Rely on Strongly-Typed Actors

This article shows how fundamental higher-order theories of mathematical structures of computer science (e.g. natural numbers [Dedekind 1888] and Actors [Hewitt et. al. 1973]) are categorical meaning that they can be axiomatized up to a unique isomorphism thereby removing any amb … | Continue reading


@hal.archives-ouvertes.fr | 4 years ago

Dealing with Software Collapse

Continue reading


@hal.archives-ouvertes.fr | 4 years ago

Dealing with Software Collapse

There is a good chance that you have never heard of software collapse before, for the simple reason that it's a term I have made up myself two years ago in a blog post. However, if you have been doing computational science for a few years, there is a good chance that you have exp … | Continue reading


@hal.archives-ouvertes.fr | 4 years ago

Integer multiplication in time O(n log n)

We present an algorithm that computes the product of two n-bit integers in O(n log n) bit operations. | Continue reading


@hal.archives-ouvertes.fr | 5 years ago

Integer multiplication in time O(n log n) [pdf]

Continue reading


@hal.archives-ouvertes.fr | 5 years ago

Morbig: A Static Parser for POSIX Shell

The POSIX shell language defies conventional wisdom of compiler construction on several levels: The shell language was not designed for static parsing, but with an intertwining of syntactic analysis and execution by expansion in mind. Token recognition cannot be specified by regu … | Continue reading


@hal.archives-ouvertes.fr | 5 years ago

Concern-Oriented Language Development: Fostering Reuse in Language Engineering

Domain-Specific Languages (DSLs) bridge the gap between the problem space, in which stakeholders work, and the solution space, i.e., the concrete artifacts defining the target system. They are usually small and intuitive languages whose concepts and expressive-ness fit a particul … | Continue reading


@hal.archives-ouvertes.fr | 5 years ago