emeryberger / COMPSCI-630
Public notes, etc. for CMPSCI 630, the UMass CS graduate systems course.
☆21Updated last year
Alternatives and similar repositories for COMPSCI-630:
Users that are interested in COMPSCI-630 are comparing it to the libraries listed below
- measure entropy of memory allocators☆12Updated 3 years ago
- Computer Security Class - Department of Informatics and Telecommunications, University of Athens☆12Updated 8 years ago
- Multiplication using AVX512 and AVX512IFMA instructions☆23Updated 9 years ago
- ☆19Updated 4 years ago
- Mirror kept for legacy. Moved to https://github.com/llvm/llvm-project☆25Updated 6 years ago
- Wait-Free Eras (PPoPP '20)☆10Updated 5 years ago
- Quick experiment to see how expensive safety is in C, for research☆12Updated 5 years ago
- How fast can we brute force a 64-bit comparison?☆52Updated 5 years ago
- A Parallelism Profiler with What-If analyses for Intel Threading Building Blocks (TBB) programs☆13Updated 7 years ago
- C++ library for evaluating arithmetic circuits on batches of inputs☆15Updated 8 years ago
- RWMutex for sharing of multicore machines.☆17Updated 5 years ago
- ☆23Updated 2 years ago
- Elliptic curves Rust reference implementation☆15Updated last year
- Parallel programming library in C++11☆12Updated 5 years ago
- Paxos Made Simple☆18Updated 2 years ago
- Makes building C++ projects easier with Buck.☆23Updated 3 years ago
- ☆9Updated 2 years ago
- RLU resizable hash-table☆17Updated 9 years ago
- Quick sort code using AVX2 instructions☆68Updated 7 years ago
- LLVM-jitted bitmaps☆26Updated 4 years ago
- Xoodyak, a lightweight and versatile cryptographic scheme implemented in Rust.☆29Updated last year
- Distributed Systems Reading Group☆20Updated 7 years ago
- High Speed elliptic curve signature system using a 260-bit Granger Moss Prime.☆14Updated 3 years ago
- An experimental method JIT for CPython 3☆29Updated 8 years ago
- ☆10Updated 3 years ago
- ☆13Updated 6 years ago
- Sheriff consists of two tools: Sheriff-Detect, a false-sharing detector, and Sheriff-Protect, a false-sharing eliminator that you can lin…☆32Updated 6 years ago
- Experimental operating system for deterministic parallel computing☆38Updated 9 years ago
- Predator: Predictive False Sharing Detection☆21Updated 10 years ago
- Diamond reactive programming platform☆25Updated 2 years ago