Introduction to Program Synthesis

Advanced Scheme: Some Naughty Bits

Safecracker: Leaking Secrets through Compressed Caches

Scanning the Scanners: Sensing the Internet from a Distributed Network Telescope

Sound and Robust Solid Modeling via Exact Real Arithmetic and Continuity

Towards Multiverse Databases

Distortion-Free Wide-Angle Portraits on Camera Phones

How NLP can help cure cancer?

Kendo: Efficient, Deterministic Multithreading in Software (2009)

Sundial: Harmonizing Concurrency Control and Caching in a Distributed OLTP DBMS

Configuration Synthesis for Programmable Analog Devices with Arco

Succincter

Differentiable Monte Carlo Ray Tracing Through Edge Sampling

DAWG: A Defense Against Cache Timing Attacks in Speculative Execution Processors

Algebra and the Lambda Calculus

Log(Graph): A Near-Optimal High-Performance Graph Representation (2018)

Differentiable Programming for Image Processing and Deep Learning in Halide

Targeted Automatic Integer Overflow Discovery Using Goal-Directed Conditional Branch Enforcement

MIT 6.886 Graph Analytics Spring 2018

Algorand: Scaling Byzantine Agreements for Cryptocurrencies (2017)

A Brief Introduction to Adversarial Examples

Speculative Buffer Overflows: Attacks and Defenses

The Scalable Commutativity Rule: Designing Scalable Software for Multicore Processors

S-Expressions (1997)

Approximate String Joins with Abbreviations

Inference and Regeneration of Programs That Manipulate Relational Databases

Turning Corners into Cameras: Principles and Methods

Inference and Regeneration of Programs that Store and Retrieve Data

Getting Started in Star Lisp (1991)

Give in to Procrastination and Stop Prefetching (2013)

More →