Active
Recent
Comments
Search
Login
Login
cl.cam.ac.uk: 65 stories from 44 submitters
11
Implementation of Functional Languages Using Custom Hardware (1985)
hardware
lisp
cl.cam.ac.uk
via
veqq
3 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
8 comments
8
3
Rossfest Symposium and Festschrift in memory of Ross Anderson
security
cl.cam.ac.uk
via
recursion
3 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
The CHERI Instruction-Set Architecture, Version 9
☶
pdf
hardware
release
cl.cam.ac.uk
via
nwf
1 year ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
The CHERI capability model: Revisiting RISC in an age of risk
pdf
compilers
plt
security
cl.cam.ac.uk
via
adaszko
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
4 comments
4
5
An introduction to inertial navigation
pdf
hardware
science
cl.cam.ac.uk
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
17
Capability Hardware Enhanced RISC Instructions (CHERI)
hardware
cl.cam.ac.uk
via
quad
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
15 comments
15
10
Formal verification of IA-64 division algorithms (2000)
pdf
formalmethods
cl.cam.ac.uk
via
calvin
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
13
How much is a mechanized proof worth, certification-wise?
pdf
slides
formalmethods
cl.cam.ac.uk
via
edoput
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Young Persons Guide to BCPL Programming on the Raspberry Pi
pdf
plt
cl.cam.ac.uk
via
idrougge
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
4
Breaking copy protection in microcontrollers (2001)
hardware
security
cl.cam.ac.uk
via
calvin
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Security Engineering - A Guide to BuildingDependable Distributed Systems
book
pdf
cryptography
security
cl.cam.ac.uk
via
xfbs
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
7
REMS - Rigorous Engineering of Mainstream Systems
c++
compsci
formalmethods
networking
osdev
cl.cam.ac.uk
via
animatronic
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
5
Corecursion and coinduction: what they are and how they relate to recursion and induction
pdf
compsci
cl.cam.ac.uk
via
calvin
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
8
Identifying Unintended Harms of Cybersecurity Countermeasures (2019)
pdf
security
cl.cam.ac.uk
via
mooreds
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
CHERI: The Arm Morello Board
formalmethods
hardware
security
cl.cam.ac.uk
via
indolering
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
2
ARMv8-A system semantics: instruction fetch in relaxed architectures
hardware
cl.cam.ac.uk
via
eatonphil
4 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege
☶
pdf
security
cl.cam.ac.uk
via
lattera
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
4
ISA Semantics for ARMv8-A, RISC-V, and CHERI-MIPS
☶
pdf
formalmethods
cl.cam.ac.uk
via
GeoffWozniak
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
4
Kiwi: High-Level Synthesis for Accelerating Scientific Computation
☶
compilers
dotnet
hardware
performance
cl.cam.ac.uk
via
nickpsecurity
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Mathematizing C++ Concurrency
plt
cl.cam.ac.uk
via
davidk01
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
3
Stephen Kell, "The Mythical Matched Modules" (2009)
pdf
practices
programming
cl.cam.ac.uk
via
akkartik
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
Efficient, Tagged Memory (2017)
☶
pdf
hardware
programming
security
cl.cam.ac.uk
via
nickpsecurity
6 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
5
CheriRTOS: A Capability Model for Embedded Devices
☶
pdf
hardware
security
cl.cam.ac.uk
via
nickpsecurity
6 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
Algebraic Principles for Program Correctness Tools in Isabelle HOL (2016)
☶
pdf
formalmethods
programming
cl.cam.ac.uk
via
nickpsecurity
6 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
28
Some Were Meant For C
pdf
c
philosophy
cl.cam.ac.uk
via
friendlysock
6 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
55 comments
55
Page 2 >>