Hacker News
- Virtual Log-Structured Storage for High-Performance Streaming [pdf] https://hal.inria.fr/hal-03300796/file/virtual_log_KerA30072021.pdf 7 comments
- C source-to-source compiler enhancement from within https://hal.inria.fr/hal-02998412 9 comments
- The relevance of IP addresses in the tracking ecosystem [pdf] https://hal.inria.fr/hal-02435622/document 60 comments
- Hardware cost evaluation of the posit number system https://hal.inria.fr/hal-02131982 6 comments
- A Mechanised Cryptographic Proof of the WireGuard VPN Protocol https://hal.inria.fr/hal-02100345 44 comments
- Moving to a provenance-aware memory object model for C: proposal for C2x https://hal.inria.fr/hal-02089889/ 50 comments
- A Survey of the First 20 Years of Research on Semantic Web and Linked Data [pdf] https://hal.inria.fr/hal-01935898/document 48 comments
- Hardware Performance Monitoring for the Rest of Us (2017) [pdf] https://hal.inria.fr/hal-01593009/document 2 comments
- Hardware support for UNUM floating point arithmetic [pdf] https://hal.inria.fr/hal-01618698/document 17 comments
- Code Staging in GNU Guix https://hal.inria.fr/hal-01580582/en 20 comments
- Does disabling Wi-Fi prevent my Android phone from sending Wi-Fi frames? [pdf] https://hal.inria.fr/hal-01575519/document 115 comments
- Fusion of Stereo Vision for Pedestrian Recognition using CNNs [pdf] https://hal.inria.fr/hal-01501735/document 42 comments
- Closing the Gap – The Formally Verified Optimizing Compiler CompCert [pdf] https://hal.inria.fr/hal-01399482 10 comments
- The NumPy array: a structure for efficient numerical computation (2011) [pdf] https://hal.inria.fr/inria-00564007/document 31 comments
- Branch Prediction and the Performance of Interpreters – Don’t Trust Folklore https://hal.inria.fr/hal-01100647/document 52 comments
Lobsters
- IDE as Code: Reifying Language Protocols as First-Class Citizens https://hal.inria.fr/hal-03107122 3 comments programming
- Code Coverage and Post-Release Defects: A Large Scale Study on Open Source Projects https://hal.inria.fr/hal-01653728/document 2 comments debugging , pdf , practices
- Catch me if you can https://hal.inria.fr/inria-00432575/document 2 comments ml , pdf
- A proposal for a resource-management model for OCaml https://hal.inria.fr/hal-01724997/document 4 comments ml , pdf , plt
- How to Get an Efficient yet Verified Arbitrary-Precision Integer Library (2017) https://hal.inria.fr/hal-01519732/file/main.pdf 24 comments c , formalmethods , pdf
- Does disabling Wi-Fi prevent my Android phone from sending Wi-Fi frames? https://hal.inria.fr/hal-01575519/document 2 comments android , pdf , privacy
- Paper: A principled approach to REPL interpreters, 2020 https://hal.inria.fr/hal-02968938/ 5 comments lisp
- Dashcam Crash Classification https://hal.inria.fr/hal-00873267v2/document 7 comments computervision
- Research on applying ECS to UI https://hal.inria.fr/hal-02147180/document 8 comments gamedev
- Efficient Deconstruction with Typed Pointer Reversal (abstract) https://hal.inria.fr/hal-02177326 5 comments rust
- [Study] Code Coverage and Post Release Defects: "Our results show that coverage has an insignificant correlation with the number of bugs that are found after the release of the software" https://hal.inria.fr/hal-01653728/document 114 comments programming
- Are there any examples of or sources on "induction on predicates" that can be shared? https://hal.inria.fr/hal-01094195/document 19 comments math
- Resource Polymorphism (Bringing the borrow-checker to OCaml) https://hal.inria.fr/hal-01724997/document 4 comments rust
- HOπ in Coq https://hal.inria.fr/hal-01614987/ 2 comments coq
- Code Staging in GNU Guix https://hal.inria.fr/hal-01580582/en 7 comments lisp
- A reflexive tactic for automated generation of proofs of incidence to an affine variety https://hal.inria.fr/hal-01216750/ 2 comments coq
- Branch Prediction and the Performance of Interpreters - Don’t Trust Folklore (PDF) https://hal.inria.fr/hal-01100647/document 9 comments programming
- Branch Prediction and the Performance of Interpreters - Don’t Trust Folklore (PDF) https://hal.inria.fr/hal-01100647/document 5 comments compsci
- One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users http://hal.inria.fr/inria-00574178/en/ 7 comments indepthstories
- One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users http://hal.inria.fr/inria-00574178/en/ 9 comments netsec
- French researchers monitor BitTorrent users for 103 days. They discover (among other things) that 1052 of the top 10000 IPs were most likely other systems monitoring users. (Section 4.2, Monitors). http://hal.inria.fr/docs/00/47/03/24/pdf/bt_privacy_leet10.pdf 13 comments technology
- Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent. For a period of 103 days, we collected 148 million IPs downloading 2 billion copies. We identify the IP address for 70% of the BitTorrent contents we spied on. http://hal.inria.fr/inria-00470324/fr/ 10 comments programming