Below is an account of all the papers the club has discussed so far.
Fred’s “The Computer Scientist as Toolsmith”
EWD 637 The Three Golden Rules for Successful Scientific Research
Video lecture by Alejandro Miguel San Martin from JPL about the Mars Rover missions
Ken Thompson, Reflections on trusting trust
Kunle Olukotun, one of the first papers on multicore:
Barbara Liskov’s keynote talk at OOPSLA 1987 on object-oriented programming
Kowledge in distributed systems (children with dirty foreheads problem):
“The anatomy of a large-scale hypertextual web search engine.” By Brin, Sergey, and Lawrence Page.
AI Is Not an Excuse!
We re-read the Ken Thompson paper from the spring.
“Deep Learning” by LeCun, Bengio, and Hinton (the trio that won the Turning Award in 2018) and published in Nature in 2015:
Natural Language Processing(NLP) paper:
Human Robot Interaction:
What makes a good paper?
A discussion of writing based on reading a really badly written paper.
Re-read of: “The anatomy of a large-scale hypertextual web search engine.” By Brin, Sergey, and Lawrence Page.
Yes, “algorithms” can be biased. Here’s why:
Intro to computer graphics:
Computer Programming as an Art (Turing Award lecture by Don Knuth):
Ethics in Security- Web Censorship with Cross-Origin Requests:
Are You Sure Your Software Will Not Kill Anyone?:
Human-Centered Artificial Intelligence: Three Fresh Ideas:
Time, Clocks, and the Ordering of Events in a Distributed System (Dijkstra Prize in Distributed Computing):
Egocentric Basketball Motion Planning from a Single First-Person Image:
Outracing champion Gran Turismo drivers with deep reinforcement learning:
Avoiding Pitfalls when Using NVIDIA GPUs for Real-Time Tasks in Autonomous Systems:
The Good, the Bad, and the Biased: Five Ways Visualizations Can Mislead (and How to Fix Them):
On Active and Passive Writing:
Tech Companies Propose Eliminating the Disruptive ‘Leap Second’:
Oxford Physicist Unloads On Quantum Computing Industry, Says It’s Basically A Hype Bubble:
New Directions in Cryptography:
Who Can Name the Bigger Number?:
A very preliminary analysis of DALL-E 2:
Designing an Authentication System: a Dialogue in Four Scenes:
Producing Wrong Data Without Doing Anything Obviously Wrong:
Latency Numbers Every Programmer Should Know:
GPT-3: What’s it good for?
Can GPT-3 write an academic paper on itself, with minimal human input?
Experiments in Commonsense Reasoning in GPT-3: Status Report from June 2022
Keys under doormats: mandating insecurity by requiring government access to all data and communications
Picture a Scientist
A Snapshot of the Frontiers of Fairness in Machine Learning
Uncovering Implicit Gender Bias in Narratives through Commonsense Inference
Where is the Digital Divide? A Survey of Security, Privacy, and Socioeconomics
Cognitive Modelling in HCI Research
How to Construct Safe Software: Motivated by the Therac-25 events
No Silver Bullet: Essence and Accidents of Software Engineering, Fred Brooks
Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities
Naive Realism: Misplaced Faith in Realistic Displays
The Many Faces of Systems Research – And How to Evaluate Them
The Education of a Computer by Grace Hopper
Ethernet: Distributed Packet Switching for Local Computer Networks
from 2022 Turing Award Winner, Robert Metcalfe
Smashing The Stack For Fun And Profit
Drag Your GAN: Interactive Point-Based Manipulation on the Generative Image Manifold
Always Measure One Level Deeper
Spectre Attacks: Exploiting Speculative Execution
GPU Scheduling on the NVIDIA TX2: Hidden Details Revealed
The Future of Urban Accessibility for People with Disabilities: Data Collection, Analytics, Policy, and Tools
Social Processes and Proofs of Theorems and Programs
Is Computer Science Science?