"We have put together a set of guidelines that have served us well as developers and consultants over the years, and we offer these as suggestions that may help you in your job."
list contains all earthquakes with magnitude greater than 2.5 catalogued in the last week (168 hours). Magnitudes 5 and above are in bold font. Magnitudes 6 and above are in red. (Some early events may be obscured by later ones on the maps.)
weekly virtual journal contains articles that have appeared in one of the participating source journals and that fall within a number of contemporary topical areas in the science and technology of nanometer-scale structures.
they automatically delete the object pointed to at the appropriate time. Smart pointers are particularly useful in the face of exceptions as they ensure proper destruction of dynamically allocated objects. They can also be used to keep track of dynamicall
documents for publication that are prohibited by governments worldwide, in particular material on freedom of expression, privacy, cryptology, dual-use technologies, national security, intelligence, and secret governance -- open, secret and classified docu
Any peer-to-peer publishing system must provide a mechanism for efficiently locating published documents. For censorship resistant systems, it is particularly important that the lookup mechanism be difficult to disable or abuse.
simple extension to email that lets you append your entire address book to outgoing mail message without compromising your privacy. Correspondents can use this information to prioritize their mail, and learn more about their social networks.
Li Fan, Pei Cao and Jussara Almeida & Andrei Z. Broder - this new protocol, each proxy keeps a summary of the cache directory of each participating proxy, and checks these summaries for potential hits before sending any queries.
designed over a 20 year period by Carl Sassenrath, the system architect responsible for the world's first multitasking multimedia operating system, the Commodore Amiga OS.
With the increasing programmability of commodity graphics processing units (GPUs), these chips are capable of performing more than the specific graphics computations for which they were designed.
treats parsing in its own right, in greater depth than is found in most computer science and linguistics books. It offers a clear, accessible, and thorough discussion of many different parsing techniques with their interrelations and applicabilities,
the industry-standard language for specifying, visualizing, constructing, and documenting the artifacts of software systems. It simplifies the complex process of software design, making a "blueprint" for construction.
by Alex Rest, describes some problems, bugs and technique solutions that correspond to using pointers. This article would be useful for beginners and programmers that are using other programming languages and are starting to study C and C++ now.
a system for distributed, anonymous, persistent data storage which is robust against attempts by powerful adversaries to find and destroy any stored data.
stands for Masqueraded, Anonymous, Decentralized, Dynamic Information Sharing and is the attempt to create a powerful state-of-the-art peer-2-peer system. (on hold)
a true peer-to-peer file sharing technology that lets multiple Eudora users automatically share the same set of files and keep them in sync on their own hard drives.
a flexible range of protections and freedoms for authors and artists. We have built upon the "all rights reserved" of traditional copyright to create a voluntary "some rights reserved" copyright.
implements tcp splicing for the Linux kernel. The tcp splicing is a technique to splice two connections inside the kernel, so that data relaying between the two connections can be run at near router speeds.