Hacker Newsnew | past | comments | ask | show | jobs | submit | nickpsecurity's submissionslogin
31.Phalanx: A 1332-core RISC-V Processor Cluster Array (2019) [pdf] (sc.edu)
21 points by nickpsecurity on May 30, 2024 | past | 3 comments
32.Why We Do Not Evolve Software? (nih.gov)
2 points by nickpsecurity on Jan 2, 2024 | past
33.AI Copyright Law Proposal That's Good for All Parties (gethisword.com)
1 point by nickpsecurity on Nov 14, 2023 | past | 1 comment
34.AI's Are Theft. Let's Fix Them with Generosity (gethisword.com)
3 points by nickpsecurity on July 14, 2023 | past | 1 comment
35.Decades-Old Code Is Putting Millions of Critical Devices at Risk (wired.com)
8 points by nickpsecurity on Oct 6, 2019 | past
36.IBM iSeries (AS/400) Architecture [pdf] [slides] (fu-berlin.de)
2 points by nickpsecurity on March 27, 2019 | past | 1 comment
37.An Interactive State Machine Demo (drakonhub.com)
5 points by nickpsecurity on Nov 19, 2018 | past | 4 comments
38.Open-Source Bitstream Generation (2013) [pdf] (isi.edu)
20 points by nickpsecurity on Nov 19, 2018 | past | 3 comments
39.Jeff Bezos Is Wrong, Tech Workers Are Not Bullies (ft.com)
7 points by nickpsecurity on Nov 13, 2018 | past | 2 comments
40.The Great Bug Hunt (allenpike.com)
2 points by nickpsecurity on June 1, 2018 | past
41.Evolution of an X86 Virtual Machine Monitor (2010)[pdf] (cmu.edu)
2 points by nickpsecurity on April 18, 2018 | past
42.Picat: A Logic-Based, Multi-Paradigm, Programming Language (picat-lang.org)
102 points by nickpsecurity on March 11, 2018 | past | 22 comments
43.Defending Scientism: Mathematics Is a Part of Science (coelsblog.wordpress.com)
1 point by nickpsecurity on March 7, 2018 | past | 2 comments
44.Invitation to the SETL Language (linuxjournal.com)
3 points by nickpsecurity on March 5, 2018 | past | 1 comment
45.TreeRegex: Extension to Regex's for Working on Tree-Structured Text [pdf] (eecs.berkeley.edu)
3 points by nickpsecurity on March 3, 2018 | past
46.Elementary Algebra by K. E. Iverson (1971) (pdf) (softwarepreservation.org)
5 points by nickpsecurity on March 2, 2018 | past | 2 comments
47.Design by Contract: A Missing Link in Quest for Quality Software (1998) (tue.nl)
1 point by nickpsecurity on Feb 25, 2018 | past | 1 comment
48.Social Processes and Proofs of Theorems and Programs (1979) [pdf] (cmu.edu)
2 points by nickpsecurity on Feb 20, 2018 | past | 1 comment
49.Spry Language (sprylang.org)
135 points by nickpsecurity on Feb 11, 2018 | past | 39 comments
50.Security of Software, Distribution Models: It's Not Just Open vs. Closed (2014) (pastebin.com)
1 point by nickpsecurity on Feb 8, 2018 | past | 1 comment
51.Comparing Development Costs of Ada and C (1995) [pdf] (adaic.com)
5 points by nickpsecurity on Jan 21, 2018 | past | 1 comment
52.IELE: A Formally-Specified VM for the Blockchain (2017) (runtimeverification.com)
3 points by nickpsecurity on Jan 15, 2018 | past | 1 comment
53.Oberon – The Overlooked Jewel [pdf] (psu.edu)
202 points by nickpsecurity on Nov 15, 2017 | past | 128 comments
54.FaCT: Flexible, Constant-Time, Programming Language [pdf] (ucsd.edu)
1 point by nickpsecurity on Oct 11, 2017 | past
55.Programming in the 1960s (slideshare.net)
102 points by nickpsecurity on July 29, 2017 | past | 42 comments
56.Om Programming Language (sparist.github.io)
3 points by nickpsecurity on June 19, 2017 | past
57.Prolog-Based Reasoning Layer for Counter-Strike Agents (2012) [pdf] (ceur-ws.org)
91 points by nickpsecurity on June 2, 2017 | past | 23 comments
58.Veggies – Haskell Code Generation from Scratch (joachim-breitner.de)
2 points by nickpsecurity on June 1, 2017 | past
59.Assertions Are Strongly Correlated with Test Suit Effectiveness [pdf] (ubc.ca)
2 points by nickpsecurity on June 1, 2017 | past
60.Empirical Study of Correctness of Formally-Verified, Distributed Systems [pdf] (washington.edu)
2 points by nickpsecurity on May 22, 2017 | past | 1 comment

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: