mirror of
https://github.com/papers-we-love/papers-we-love.git
synced 2025-06-13 12:54:28 +00:00
commit
71ca5d47f6
@ -25,6 +25,7 @@ Here are our official chapters. Let us know if you are interested in [starting o
|
|||||||
* [Brasilia](http://www.meetup.com/papers-we-love-bsb)
|
* [Brasilia](http://www.meetup.com/papers-we-love-bsb)
|
||||||
* [Boulder](http://www.meetup.com/Papers-We-Love-Boulder/)
|
* [Boulder](http://www.meetup.com/Papers-We-Love-Boulder/)
|
||||||
* [Bucharest](http://www.meetup.com/papers-we-love-bucharest/)
|
* [Bucharest](http://www.meetup.com/papers-we-love-bucharest/)
|
||||||
|
* [Buenos Aires](https://paperswelove.org/buenos-aires/)
|
||||||
* [Cairo](http://www.meetup.com/Papers-We-Love-Cairo/)
|
* [Cairo](http://www.meetup.com/Papers-We-Love-Cairo/)
|
||||||
* [Chattanooga](http://www.meetup.com/Papers-We-Love-Chattanooga/)
|
* [Chattanooga](http://www.meetup.com/Papers-We-Love-Chattanooga/)
|
||||||
* [Chicago](http://www.meetup.com/papers-we-love-chicago/)
|
* [Chicago](http://www.meetup.com/papers-we-love-chicago/)
|
||||||
|
@ -28,7 +28,7 @@ This is a really great paper that is both complex and straightforward. This pape
|
|||||||
* [Light Propagation Volumes in CryEngine 3](http://www.crytek.com/download/Light_Propagation_Volumes.pdf)
|
* [Light Propagation Volumes in CryEngine 3](http://www.crytek.com/download/Light_Propagation_Volumes.pdf)
|
||||||
|
|
||||||
### Bump mapping
|
### Bump mapping
|
||||||
* [Interactive Horizon Mapping: Shadows for bump-mapped surfaces](http://research.microsoft.com/en-us/um/people/cohen/bs.pdf)
|
* [Interactive Horizon Mapping: Shadows for bump-mapped surfaces](https://www.ppsloan.org/publications/bs.pdf)
|
||||||
|
|
||||||
### Interior mapping
|
### Interior mapping
|
||||||
* [Interior Mapping: A new technique for rendering realistic buildings](http://www.proun-game.com/Oogst3D/CODING/InteriorMapping/InteriorMapping.pdf)
|
* [Interior Mapping: A new technique for rendering realistic buildings](http://www.proun-game.com/Oogst3D/CODING/InteriorMapping/InteriorMapping.pdf)
|
||||||
|
@ -6,3 +6,7 @@
|
|||||||
|
|
||||||
* [Panorama Weaving:
|
* [Panorama Weaving:
|
||||||
Fast and Flexible Seam Processing](http://www.sci.utah.edu/~bsumma/projects/weaving/)
|
Fast and Flexible Seam Processing](http://www.sci.utah.edu/~bsumma/projects/weaving/)
|
||||||
|
|
||||||
|
* [Object Identification for Computer Vision Using Image Segmentation](https://ieeexplore.ieee.org/document/5529412)
|
||||||
|
|
||||||
|
* [Computer Vision Based Detection and Localization of Potholes in Asphalt Pavement Images](https://ieeexplore.ieee.org/document/7726722)
|
||||||
|
@ -10,7 +10,7 @@
|
|||||||
* [Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 (2017)](https://papers.mathyvanhoef.com/ccs2017.pdf) (Mathy Vanhoef, Frank Piessens)
|
* [Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2 (2017)](https://papers.mathyvanhoef.com/ccs2017.pdf) (Mathy Vanhoef, Frank Piessens)
|
||||||
|
|
||||||
## Related Works
|
## Related Works
|
||||||
### [A Mathematical Theory of Cryptography (1945)](http://www.cs.bell-labs.com/who/dmr/pdfs/shannoncryptshrt.pdf) - Shannon
|
### [A Mathematical Theory of Cryptography (1945)](https://www.iacr.org/museum/shannon/shannon45.pdf) - Shannon
|
||||||
The original classified memo for Bell Labs that was republished in 1949 as ["Communication Theory of Secrecy Systems"](communication-theory-of-secrecy-systems.pdf).
|
The original classified memo for Bell Labs that was republished in 1949 as ["Communication Theory of Secrecy Systems"](communication-theory-of-secrecy-systems.pdf).
|
||||||
|
|
||||||
### :scroll: [A Mathematical Theory of Communication (1948)](../information_theory/a-mathematical-theory-of-communication-1948.pdf) - Shannon
|
### :scroll: [A Mathematical Theory of Communication (1948)](../information_theory/a-mathematical-theory-of-communication-1948.pdf) - Shannon
|
||||||
|
@ -63,7 +63,7 @@
|
|||||||
|
|
||||||
* [Unicorn: A System for Searching the Social Graph](http://db.disi.unitn.eu/pages/VLDBProgram/pdf/industry/p871-curtiss.pdf)
|
* [Unicorn: A System for Searching the Social Graph](http://db.disi.unitn.eu/pages/VLDBProgram/pdf/industry/p871-curtiss.pdf)
|
||||||
|
|
||||||
* [Unikernels: Library Operating Systems for the Cloud](http://anil.recoil.org/papers/2013-asplos-mirage.pdf)
|
* [Unikernels: Library Operating Systems for the Cloud](http://unikernel.org/files/2013-asplos-mirage.pdf)
|
||||||
|
|
||||||
* [Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms](http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdf)
|
* [Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms](http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdf)
|
||||||
|
|
||||||
|
@ -8,7 +8,7 @@
|
|||||||
|
|
||||||
* [Exploring the Potential of Gamification Among Frail Elderly Persons](http://gamification-research.org/wp-content/uploads/2011/04/12-Gerling.pdf)
|
* [Exploring the Potential of Gamification Among Frail Elderly Persons](http://gamification-research.org/wp-content/uploads/2011/04/12-Gerling.pdf)
|
||||||
|
|
||||||
* [From Game Design Elements to Gamefulness: Defining “Gamification”](http://dl.dropboxusercontent.com/u/220532/MindTrek_Gamification_PrinterReady_110806_SDE_accepted_LEN_changes_1.pdf)
|
* [From Game Design Elements to Gamefulness: Defining “Gamification”](https://uwaterloo.ca/scholar/sites/ca.scholar/files/lnacke/files/From_game_design_elements_to_gamefulness-_defining_gamification.pdf)
|
||||||
|
|
||||||
* [MoviPill: Improving Medication Compliance for Elders - Using a Mobile Persuasive Social Game](http://www.ic.unicamp.br/~oliveira/doc/Ubicomp2010_MoviPill.pdf)
|
* [MoviPill: Improving Medication Compliance for Elders - Using a Mobile Persuasive Social Game](http://www.ic.unicamp.br/~oliveira/doc/Ubicomp2010_MoviPill.pdf)
|
||||||
|
|
||||||
@ -18,4 +18,4 @@
|
|||||||
|
|
||||||
* :scroll: [Gamification in Education: What, How, Why Bother?](gamification-in-education-what-how-why-bother.pdf)
|
* :scroll: [Gamification in Education: What, How, Why Bother?](gamification-in-education-what-how-why-bother.pdf)
|
||||||
|
|
||||||
* :scroll: [Why Students Engage in “Gaming the System” Behavior in Interactive Learning Environments](why-students-engage-in-gaming-the-system-behavior-in-interactive-learning-environments.pdf)
|
* :scroll: [Why Students Engage in “Gaming the System” Behavior in Interactive Learning Environments](why-students-engage-in-gaming-the-system-behavior-in-interactive-learning-environments.pdf)
|
||||||
|
@ -2,6 +2,6 @@
|
|||||||
|
|
||||||
* [Bimodal Multicast](http://www.csl.mtu.edu/cs6461/www/Reading/Birman99.pdf)
|
* [Bimodal Multicast](http://www.csl.mtu.edu/cs6461/www/Reading/Birman99.pdf)
|
||||||
* [End-to-End Arguments in System Design](http://www.deepplum.com/dpr/locus/Papers/EndtoEnd.html)
|
* [End-to-End Arguments in System Design](http://www.deepplum.com/dpr/locus/Papers/EndtoEnd.html)
|
||||||
* [Can SPDY Really Make the Web Faster?](http://www.comp.lancs.ac.uk/~elkhatib//Docs/2014.06_Netw.pdf)
|
* [Can SPDY Really Make the Web Faster?](http://www.eecs.qmul.ac.uk/~tysong/files/IFIPNetworking14.pdf)
|
||||||
* [Datacenter Traffic Control: Understanding Techniques and Trade-offs](https://osf.io/6qzxc/)
|
* [Datacenter Traffic Control: Understanding Techniques and Trade-offs](https://osf.io/6qzxc/)
|
||||||
* [B4: Experience with a Globally-Deployed Software Defined WAN](https://dl.acm.org/citation.cfm?id=2486019)
|
* [B4: Experience with a Globally-Deployed Software Defined WAN](https://dl.acm.org/citation.cfm?id=2486019)
|
||||||
|
@ -8,7 +8,6 @@
|
|||||||
|
|
||||||
## Jails and containers
|
## Jails and containers
|
||||||
|
|
||||||
* :scroll: [Jails: Confining the omnipotent root.](https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-jails.pdf)
|
* :scroll: [Jails: Confining the omnipotent root.](http://phk.freebsd.dk/pubs/sane2000-jail.pdf)
|
||||||
|
|
||||||
* :scroll: [Solaris Zones: Operating System Support for Consolidating Commercial Workloads](https://us-east.manta.joyent.com/bcantrill/public/ppwl-cantrill-zones.pdf)
|
|
||||||
|
|
||||||
|
* :scroll: [Solaris Zones: Operating System Support for Consolidating Commercial Workloads](https://www.usenix.org/legacy/event/lisa04/tech/full_papers/price/price.pdf)
|
||||||
|
6
privacy/README.md
Normal file
6
privacy/README.md
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
## Privacy
|
||||||
|
|
||||||
|
* [k-ANONYMITY: A model for Protecting Privacy (1998)](https://dataprivacylab.org/dataprivacy/projects/kanonymity/kanonymity.pdf)
|
||||||
|
* [Differential Privacy(2006)](https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/dwork.pdf)
|
||||||
|
* [Robust De-anonymization of Large Sparse Datasets(2008)](https://www.cs.utexas.edu/~shmat/shmat_oak08netflix.pdf)
|
||||||
|
* [Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization(2010)](https://www.uclalawreview.org/broken-promises-of-privacy-responding-to-the-surprising-failure-of-anonymization-2/)
|
@ -9,7 +9,7 @@ Robotics
|
|||||||
|
|
||||||
[Online Trajectory Generation: Basic Concepts for Instantaneous Reactions to Unforeseen Events](http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5350749)
|
[Online Trajectory Generation: Basic Concepts for Instantaneous Reactions to Unforeseen Events](http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5350749)
|
||||||
|
|
||||||
[Probablistic Roadmaps for Path Planning in High-Dimensional Configuration Spaces](http://www.kavrakilab.org/sites/default/files/kavraki1996prm-high-dim-conf.pdf)
|
[Probablistic Roadmaps for Path Planning in High-Dimensional Configuration Spaces](https://www.cs.cmu.edu/~./motionplanning/papers/sbp_papers/PRM/prmbasic_01.pdf)
|
||||||
|
|
||||||
[Rapidly-Exploring Random Trees: A New Tool for Path Planning](http://msl.cs.uiuc.edu/~lavalle/papers/Lav98c.pdf)
|
[Rapidly-Exploring Random Trees: A New Tool for Path Planning](http://msl.cs.uiuc.edu/~lavalle/papers/Lav98c.pdf)
|
||||||
|
|
||||||
@ -29,7 +29,7 @@ planning. The problem of motion planning scales exponentially with the
|
|||||||
degrees of freedom a robot has and the degrees of freedom the obstacles
|
degrees of freedom a robot has and the degrees of freedom the obstacles
|
||||||
in an environment have. Thus, planning with high degrees of freedom leads to many problems
|
in an environment have. Thus, planning with high degrees of freedom leads to many problems
|
||||||
such as incompleteness and extremely slow speed. The PRM method was the first to
|
such as incompleteness and extremely slow speed. The PRM method was the first to
|
||||||
propose a sampling-based stratey to deal with motion planning and
|
propose a sampling-based strategy to deal with motion planning and
|
||||||
created a practical method for offline planning of robot manipulators.
|
created a practical method for offline planning of robot manipulators.
|
||||||
The RRT method modified PRM by using a tree structure rather than a
|
The RRT method modified PRM by using a tree structure rather than a
|
||||||
graph so that non-holonomic and other constraints could be considered
|
graph so that non-holonomic and other constraints could be considered
|
||||||
|
@ -27,7 +27,7 @@
|
|||||||
|
|
||||||
### Introduction
|
### Introduction
|
||||||
|
|
||||||
* [Unikernels: Library Operating Systems for the Cloud](http://anil.recoil.org/papers/2013-asplos-mirage.pdf)
|
* [Unikernels: Library Operating Systems for the Cloud](http://unikernel.org/files/2013-asplos-mirage.pdf)
|
||||||
* [Unikernels: the rise of the virtual library operating system](https://cacm.acm.org/magazines/2014/1/170866-unikernels/fulltext)
|
* [Unikernels: the rise of the virtual library operating system](https://cacm.acm.org/magazines/2014/1/170866-unikernels/fulltext)
|
||||||
* [Maximizing hypervisor scalability using minimal virtual machines](https://core.ac.uk/download/pdf/35074556.pdf)
|
* [Maximizing hypervisor scalability using minimal virtual machines](https://core.ac.uk/download/pdf/35074556.pdf)
|
||||||
* [Breaking up is hard to do: security and functionality in a commodity hypervisor](https://open.library.ubc.ca/media/download/pdf/24/1.0052016/1)
|
* [Breaking up is hard to do: security and functionality in a commodity hypervisor](https://open.library.ubc.ca/media/download/pdf/24/1.0052016/1)
|
||||||
|
Loading…
Reference in New Issue
Block a user