The Writings of Leslie Lamporthttps://lamport.azurewebsites.net/pubs/pubs.html
SIFT: Design and Analysis of a Fault-Tolerant Computer for Aircraft Control On-the-fly Garbage Collection: an Exercise in Cooperation A General Construction for Expressing Repetit
T E X T F I L E Shttp://textfiles.com/politics/
300445 Insalw's Analysis and Rebuttal of the BUA Report (March, 1993) recesion.txt 24067 Why to Recessions and Depressions Happen? (August 1993) reconfig.txt 16451 Testimony of Dr
Miller Microcomputer Services - Index Pagehttp://www.millermicro.com/
A Security Analysis Of OEM Updaters (Duo Security, 2016), Office Depot Stores "Found Malware" on New Windows Computers (Foss Force, 2016), Privacy Is Personal (Doc Searls, 2015),
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.
No S Diet: No snacks, sweets, seconds, except on days that start with S.https://nosdiet.com/
work, and in the final analysis it isn't even flattering . The calorie accounting diets are time consuming and joyless. You won't be able to stick with one of these because it wil
No snacks, No Sweets, No Seconds. Except on days that start with S.
Ziring Book Review Pages - Currenthttp://users.erols.com/ziring/bookrev.htm
and read through one analysis, or skip around. The selection of problems is broad, but mostly quite sensible. Some of the best are listed below. Hey, Cool it! Temperature-Humidity
about mehttps://yossarian.net/about/
compilers and program analysis, systems programming, and cybersecurity. i believe strongly in software engineering : i like writing correct and reliable software, especially for o
POCOCOPhttps://pococop.eu/
talk Fine grained analysis of conservative Maltsev CSP at BLAST 2025 , University of Colorado, Boulder, USA [ Slides ] 19 May 2025, A. Barsukov, seminar talk Containment for Guard
GuestArticles index [LWN.net]https://lwn.net/Archives/GuestIndex/
and when? A commit analysis (October 10, 2007) Development Gentoo for developers (November 14, 2007) Is Gentoo in crisis? (January 16, 2008) Distributions in the Summer of Code (A
USENIX - 10th USENIX Security Symposiumhttps://www.usenix.org/legacy/events/sec01/tech.html
Xerox PARC Security Analysis of the Palm Operating System and its Weaknesses Against Malicious Code Threats Kingpin and Mudge, @stake, Inc. Secure Data Deletion for Linux File Sys
Find more...