2Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys [pdf] (opens in new tab)usenix.org243hadronzoo8y ago49
6Leibniz, Llull, and the Computational Imagination (opens in new tab)publicdomainreview.org3hadronzoo9y ago0
7Hitchhiker trees: functional, persistent, off-heap sorted maps (opens in new tab)github.com150hadronzoo9y ago32
10Harmonikit: Additive synthesis with Supercollider, Overtone, and core.async (opens in new tab)youtube.com2hadronzoo12y ago0
11Norvig: The Unreasonable Effectiveness of Data [video] (opens in new tab)youtube.com2hadronzoo13y ago0
12Amazon joins Walmart in push for online sales tax (opens in new tab)washingtonexaminer.com38hadronzoo13y ago38
13DAs receiving funds for outsourcing prosecution to collection agencies (opens in new tab)dallasobserver.com2hadronzoo13y ago0
14The deadliest school massacre in US history occurred in 1927 (opens in new tab)en.wikipedia.org19hadronzoo13y ago5