Active
Recent
Comments
Search
Login
Login
cs.umd.edu: 18 stories from 14 submitters
12
Tutorial on Good Lisp Programming Style (1993)
pdf
lisp
cs.umd.edu
via
veqq
4 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
1
The Eyes Have It: A Task by Data Type Taxonomy for Information Visualizations (1996)
pdf
design
cs.umd.edu
via
Sietsebb
6 months ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
10
Investigating Influencer VPN Ads on YouTube
pdf
networking
security
cs.umd.edu
via
wizardishungry
2 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
4
Reordering on an Alpha processor
hardware
historical
cs.umd.edu
via
friendlysock
3 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
1 comment
1
5
An Overview of Deterministic Database Systems (2018)
pdf
databases
performance
security
cs.umd.edu
via
nickpsecurity
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
9
Achieving Safety Incrementally with Checked C
pdf
c
plt
security
cs.umd.edu
via
calvin
5 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
6
Lightweight Monadic Programming in ML (2011)
☶
pdf
compilers
ml
cs.umd.edu
via
nickpsecurity
6 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
ACSL by Example: Towards a Verified C Standard Library (2016)
☶
pdf
c
formalmethods
cs.umd.edu
via
nickpsecurity
6 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
13
Locksmith - Practical, Static, Race Detection for C
pdf
c
compsci
cs.umd.edu
via
nickpsecurity
7 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
22
The Magic of XOR
math
cs.umd.edu
via
pushcx
7 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
5 comments
5
21
The original Waterfall paper was anti-Waterfall? (1970)
☶
pdf
practices
programming
cs.umd.edu
via
nickpsecurity
7 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
12 comments
12
9
Introduction to Graph Compression techniques
pdf
compsci
cs.umd.edu
via
Dawny33
8 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
2
The "Double-Checked Locking is Broken" Declaration
compsci
java
programming
cs.umd.edu
via
goncalo
8 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
1
An End-to-End Measurement of Certificate Revocation in the Web’s PKI
pdf
security
cs.umd.edu
via
inactive-user
9 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
C-strider: Type-Aware Heap Traversal for C
pdf
c
compsci
cs.umd.edu
via
animatronic
10 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0
7
The Ruby Type Checker
pdf
compsci
ruby
cs.umd.edu
via
jcs
10 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
2 comments
2
2
The Relationship Between COBOL and Computer Science (1985)
pdf
compsci
practices
cs.umd.edu
via
aturley
11 years ago
|
caches
Archive.org
Archive.today
Ghostarchive
|
no comments
0