Data Reliability (1975)

Continue reading


@dl.acm.org | 2 years ago

Accessibility of Command Line Interfaces (2021)

Continue reading


@dl.acm.org | 2 years ago

Fabricating Reflectors for Displaying Multiple Images

Continue reading


@dl.acm.org | 2 years ago

Look Ma, No Constants

Continue reading


@dl.acm.org | 2 years ago

Loner: Utilizing the CPU vector datapath to process scalar integer data

Continue reading


@dl.acm.org | 2 years ago

Performance Evaluation of IPFS in Private Networks

Continue reading


@dl.acm.org | 2 years ago

The Pushback Effects of Race, Ethnicity, Gender, and Age in Code Review

Continue reading


@dl.acm.org | 2 years ago

Cucko filters practically better than bloom

Continue reading


@dl.acm.org | 2 years ago

Dynamic code evolution for Java ( 2010)

Continue reading


@dl.acm.org | 2 years ago

Using Stack Overflow for Education in a Computer Science Bachelor Programme

Continue reading


@dl.acm.org | 2 years ago

Forming the Dog Internet: Prototyping a Dog-to-Human Video Call Device

Continue reading


@dl.acm.org | 2 years ago

To Write Code: The Cultural Fabrication of Programming Notation and Practice

Continue reading


@dl.acm.org | 2 years ago

Understanding Participation in Hackathons Through Program Theory Analysis

Continue reading


@dl.acm.org | 2 years ago

A Unified FPGA Virtualization Framework for General-Purpose DNN in the Cloud

Continue reading


@dl.acm.org | 2 years ago

On Folk Theorems (1980)

Continue reading


@dl.acm.org | 2 years ago

Runtime adaptation of stream processing spanning the cloud and the edge

Continue reading


@dl.acm.org | 2 years ago

Does Transparency in Moderation Matter? (2019)

Continue reading


@dl.acm.org | 2 years ago

10M Users and 10 Years Later: Python Tutor’s Scalable Research Software

Continue reading


@dl.acm.org | 2 years ago

Should Explanations of Program Code Use Audio, Text, or Both? A Study

Continue reading


@dl.acm.org | 2 years ago

Citus: Distributed PostgreSQL for Data-Intensive Applications (SIGMOD '21)

Continue reading


@dl.acm.org | 2 years ago

Vulnerabilities in the Handover Procedure of Cellular Telecommunications

Continue reading


@dl.acm.org | 2 years ago

“It Started as a Joke”: On the Design of Idle Games (2019)

Continue reading


@dl.acm.org | 2 years ago

Scaling Classroom IT Skill Tutoring: A Case Study from India

Continue reading


@dl.acm.org | 2 years ago

A History of Clojure

Continue reading


@dl.acm.org | 2 years ago

Bug or Feature? Covert Impairments to Human Computer Interaction

Continue reading


@dl.acm.org | 2 years ago

Kangaroo: Caching Billions of Tiny Objects on Flash

Continue reading


@dl.acm.org | 2 years ago

GhOSt: Fast and Flexible User-Space Delegation of Linux Scheduling

Continue reading


@dl.acm.org | 2 years ago

LineFS: SmartNIC Offload of a Distributed File System with Pipeline Parallelism

Continue reading


@dl.acm.org | 2 years ago

Using Lightweight Formal Methods to Validate a KV Storage Node in Amazon S3

Continue reading


@dl.acm.org | 2 years ago

Faster and Cheaper Serverless Computing on Harvested Resources

Continue reading


@dl.acm.org | 2 years ago

Complex information processing: a file structure for the complex, the changing

Continue reading


@dl.acm.org | 2 years ago

Rudra: Finding Memory Safety Bugs in Rust at the Ecosystem Scale

Continue reading


@dl.acm.org | 2 years ago

Log-structured Protocols in Delos, a platform for building on a replicated log

Continue reading


@dl.acm.org | 2 years ago

A small scheme VM, compiler, and REPL in 4k

Continue reading


@dl.acm.org | 2 years ago

Decentralized Continuous Group Key Agreement (Dcgka)

Continue reading


@dl.acm.org | 2 years ago

Rules of Program Behavior

Continue reading


@dl.acm.org | 2 years ago

LAPD: Spy Camera Detection Using Smartphone Time-of-Flight Sensors [pdf]

Continue reading


@dl.acm.org | 2 years ago

Quetra: A Queuing Theory Approach to Dash Rate Adaptation

Continue reading


@dl.acm.org | 2 years ago

Selfish and opaque transaction ordering in the Bitcoin blockchain

Continue reading


@dl.acm.org | 2 years ago

LAPD: Spy Camera Detection Using Smartphone Time-of-Flight Sensors

Continue reading


@dl.acm.org | 2 years ago

Bladerunner: Stream Processing at Scale for a LiveView of Big Data on Edge

Continue reading


@dl.acm.org | 2 years ago

Home browsing study finds that 50% of internet use spent on 1% of websites

Continue reading


@dl.acm.org | 2 years ago

Approximate Distance Oracles

Continue reading


@dl.acm.org | 2 years ago

Evaluating Deplatforming as a Moderation Strategy on Twitter

Continue reading


@dl.acm.org | 2 years ago

Software-Defined Vector Processing on Manycore Fabrics

Continue reading


@dl.acm.org | 2 years ago

Performance Cost of Reactive Libraries

Continue reading


@dl.acm.org | 2 years ago

Software-Defined Vector Processing on Manycore Fabrics

Continue reading


@dl.acm.org | 2 years ago

How Statically-Typed Functional Programmers Write Code

Continue reading


@dl.acm.org | 2 years ago