Top Hackernews posts from dl.acm.org
- AdFlush (dl.acm.org)
- Putting out the hardware dumpster fire (dl.acm.org)
- Optimization Techniques for GPU Programming [pdf] (dl.acm.org)
- Privacy Implications of Accelerometer Data [pdf] (dl.acm.org)
- Von Neumann's First Computer Program (1970) (dl.acm.org)
- The Unwritten Contract of Solid State Drives (2017) (dl.acm.org)
- Quantum Algorithm Implementations for Beginners (dl.acm.org)
- Programmimg Pearls (1985) (dl.acm.org)
- Achieving High-Performance the Functional Way (2020) (dl.acm.org)
- Connection Machine Lisp (1986) (dl.acm.org)
- A small scheme VM, compiler, and REPL in 4k (dl.acm.org)
- Perverse Downstream Consequences of Debunking (dl.acm.org)
- APL Since 1978 (2020) [pdf] (dl.acm.org)
- Experience with an Uncommon Lisp (1986) [pdf] (dl.acm.org)
- NSan: a floating-point numerical sanitizer (dl.acm.org)
- Wear leveling in SSDs considered harmful (dl.acm.org)
- TruffleC: A C implementation on top of JVM (2014) (dl.acm.org)
- Performance Evaluation of IPFS in Private Networks (dl.acm.org)
- Xerox PARC's NoteCards in a Nutshell (1987) [pdf] (dl.acm.org)
- Unix shell programming: the next 50 years (dl.acm.org)
- SEQUEL: A Structured English Query Language (1974) (dl.acm.org)
- Agenda: a personal information manager (1990) [pdf] (dl.acm.org)
- A Metaobject Protocol for C++ (1995) [pdf] (dl.acm.org)
- Building certified concurrent OS kernels (dl.acm.org)
- Not Without Us – Joseph Weizenbaum (1986) (dl.acm.org)
- Protecting Secrets from Computers (2023) (dl.acm.org)
- Optical Circuit Switching for ML Systems (dl.acm.org)
- Build systems à la carte (2018) (dl.acm.org)
- More Fixpoints (Functional Pearl) [pdf] (dl.acm.org)
- Looplets: A Language for Structured Coiteration (dl.acm.org)
- Serious flaws in SQL (1990) (dl.acm.org)
- Concurrent Processes and Their Syntax (1979) [pdf] (dl.acm.org)
- A study of real-world data races in Golang (dl.acm.org)
- What if mass storage were free? (1980) (dl.acm.org)