High-Coverage Hint Generation for Massive Courses

Scaling up Superoptimization

The Problem with Threads (2006)

Beastly Numbers (1996)

Can Logic Programming Execute as Fast as Imperative Programming? (1990)

Setuid Demystified (2002)

TreeRegex: An Extension to Regular Expressions for Matching and Manipulating Tree-Structured Text

Mathematical Foundations of the GraphBLAS

An Interview with the Old Man of Floating-Point [1998]

Chisel: Constructing Hardware in a Scala Embedded Language

A Berkeley View of Systems Challenges for AI

Synthesis of Statically-Analyzable, Accelerator Networks from Sequential Programs (2016)

Markov's Inequality for Matrices

BOOM v2: an open-source out-of-order RISC-V core

Numbers Every Programmer Should Know By Year

Why Events Are a Bad Idea (for high-concurrency servers) (2003)

How close is RISC-V to RISC-I?

Towards High-Assurance HTML5 Applications (2014)

M. I. Jordan: An Introduction to Probabilistic Graphical Models

Continuous Analytics Over Discontinuous Streams

Programming Languages for High-Assurance Autonomous Vehicles (Ivory)

Q and A: The future of artificial intelligence

CS294: Program Synthesis for Everyone

Dedalus: Datalog in time and space

Generative Visual Manipulation on the Natural Image Manifold

Grail Quest: A New Proposal for HW-Assisted Garbage Collection

The Renewed Case for the Reduced Instruction Set Computer: Avoiding ISA Bloat

CS 281B: Statistical Learning Theory (2014)

The ‘Off-Switch’

Updated RISC-V Instruction Set Manual: Version 2.1

More →