Discussions
Heads-up limit hold'em poker is solved
Advanced Medical Displays: A Literature Review of Augmented Reality
Reflections on Trusting Trust
Countering Trusting Trust through Diverse Double-Compiling
What is Computation: An Epistemic Approach
Literate Programming
Techniques and Applications for Sentiment Analysis
An Integrated Theory of the Mind
A Few Useful Things to Know about Machine Learning
Learning to Predict by the Methods of Temporal Differences
High-Performance Sorting on Networks of Workstations
Multifractal Aspects of Software Development (NIER Track)
Open Source Software Evolution and Its Dynamics (Ch. 4)
A Theoretician's Guide to the Experimental Analysis of Algorithms
Architectural Blueprints — The “4+1” View Model of Software Architecture
Simple, Fast, and Practical Non-Blocking and Blocking Concurrent Queue Algorithms
Reconsidering Custom Memory Allocation
A Scalable Content-Addressable Network
A Formal Basis for the Heuristic Determination of Minimum Cost Paths
An Industrial-Strength Audio Search Algorithm
Tor: The Second-Generation Onion Router
Buffer Overflows: Attacks and Defenses for the Vulnerability of the Decade
Recent Developments in Low-Level Software Security
The Loss of Location Privacy in the Cellular Age
A Critique of the GNU Hurd Multi-Server Operating System
How to Read a Paper
A Note on Distributed Computing
Outside the Closed World: On Using Machine Learning For Network Intrusion Detection
Teaching Deep Convolutional Neural Networks to Play Go
No Silver Bullet--Essence and Accident in Software Engineering.
Volume Registration Using the 3-D Pseudopolar Fourier Transform
JDuck: Building a Software Engineering Tool in Java as a CS2 Project
Neural Networks with Few Multiplications
Deep Compression: Compressing Deep Neural Networks with Pruning, Trained Quantization and Huffman Coding
Improving neural networks by preventing co-adaptation of feature detectors
The next 700 programming languages
Learning to Learn by Gradient Descent by Gradient Descent
Deep Photo Style Transfer