superkuh's half-assed full-text library sub-directory search
Previous search results indices.
For the query "html" in the directory Computing/, these results were found (so far, refresh for progress):
- Minimal Perl For UNIX and Linux People_ Tim Maher_ 2007.pdf (5.7 MB)
- Principles of Uncertainty.pdf (2.8 MB)
- IEMI Threats for Information Security_ Remote Command Injection on Modern Smartphones_ Chaouki Kasmi_ Jose Lopes Esteves_ 2015.pdf (238.8 kB)
- Linkers and Loaders_ John R Levine_ 1999.pdf (3.5 MB)
- Cryptographically secure shields_ J M Cioranesco_ J L Danger_ T Graba_ S Guilley_ Y Mathieu_ D Naccache_ X T Ngo_ HST 2014.pdf (1.3 MB)
- The Art of Computer Programming_ Vol 1_ Fundamental Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu (5.4 MB)
- Fansmitter_ Acoustic Data Exfiltration from Speakerless Air-Gapped Computers_ Mordechai Guri_ Yosef Solewicz_ Andrey Daidakulov_ Yuval Elovici Ben-Gurion_ arxiv160605915v1.pdf (2 MB)
- Programming from the Ground Up_ Jonathan Bartlett_ 2003.pdf (1.3 MB)
- DNS and BIND_ 5th Ed_ Cricket Liu_ Paul Albitz_ 2006.chm (2.3 MB)
- Key Reinstallation Attacks_ Forcing Nonce Reuse in WPA2_ Mathy Vanhoef_ Frank Piessens_ 2017.pdf (626.6 kB)
- Survey of Text Mining_ II_ Clustering Classification and Retrieval_ Michael W Berry_ Malu Castellanos_ 2007.pdf (2.9 MB)
- Text Mining_ Classification Clustering and Applications_ Ashok Srivastava_ Mehran Sahami_ 2009.pdf (4.3 MB)
- bash-tricks.txt (7 kB)
- Scripting Languages Compared_ PHP Perl Python Ruby_Hyperpolyglot.html (337.9 kB)
- Inside the Machine_ An Illustrated Introduction to Microprocessors and Computer Architecture_ Jon Stokes_ 2006.pdf (9.7 MB)
- Learning Perl_ 6th Edition_ Randal L Schwartz_ Brian D Foy_ Tom Phoenix_ 2011.pdf (7.5 MB)
- Survey of Text Mining_ Clustering Classification and Retrieval_ Michael W Berry_ 2003.pdf (5.8 MB)
- Uncovering Spoken Phrases in Encrypted Voice over IP Conversations_ C V Wright_ L Ballard_ S E Coull_ F Monrose_ G M Masson_ 2010.pdf (1.9 MB)
- Linux Device Drivers_ 3rd Ed_ Jonathan Corbet_ 2005.pdf (12.2 MB)
- Intel ME - Two Years Later_ Igor Skochinsky_ 2014.pdf (1 MB)
- 2014 Internet Peering Playbook.epub (7.8 MB)
- Understanding Linux Network Internals_ Christian Benvenuti_ 2006.pdf (18.1 MB)
- Equation Group_ Questions and Answers_ HDD Firmware Trojans_ ver 15_ Kaspersky 2015.pdf (3.9 MB)
- Scientific Computing_ An Introductory Survey_ Michael T Heath_ 1997.pdf (1.9 MB)
- RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis_ Daniel Genkin_ Adi Shamir_ Eran Tromer_ 2013.pdf (7.7 MB)
- Learning to Win by Reading Manuals in a Monte-Carlo Framework_ S R K Branavan_ D Silver_ R Barzilay_ acl_2011.pdf (359 kB)
- All Your GPS Are Belong To Us_ Towards Stealthy Manipulation of Road Navigation Systems_ K Zeng_ S Liu_ Y Shu_ D Wang_ H Li_ Y Dou_ G Wang_ Y Yang_ 2018.pdf (4.4 MB)
- Reversing Stealthy Dopant-Level Circuits_ T Sugawara_ D Suzuki_ R Fujii_ S Tawa_ R Hori_ M Shiozaki_ T Fujino_ IACR 2014.pdf (6.4 MB)
- PDL Book_ 2012-02-05.pdf (7.8 MB)
- Understanding the Linux Kernel_ 3rd Ed_ Daniel P Bovet_ Marco Cesati_ 2005.pdf (4.8 MB)
- Honeypots_ A New Paradigm to Information Security_ R C Joshi_ Anjali Sardana_ 2011.pdf (3.6 MB)
- Perl Cookbook_ 2nd Ed_ Tom Christiansen_ 2003.chm (1.5 MB)
- Effective awk Programming_ 3rd Ed_ Arnold Robbins_ 2001.pdf (2.4 MB)
- Higher-Order Perl_ Transforming Programs with Programs_ Mark Jason Dominus_ 2005.pdf (1.9 MB)
- Key Extraction Using Thermal Laser Stimulation_ A Case Study on Xilinx Ultrascale FPGAs_ H Lohrke_ S Tajik_ T Krachenfels_ C Boit_ J-P Seifert_ 2018.pdf (6 MB)
- USBee_ Air-Gate Convert-Channel via Electromagnetic Emissions form USB_ M Guri_ M Monitz_ Y Elovici_ 2016.pdf (1016.6 kB)
- Concrete Mathematics_ A Foundation for Computer Science_ 2nd Ed_ Ronald L Graham_ Donald E Knuth_ Oren Patashnik_ 1994.pdf (5.4 MB)
- Modern Perl_ Chromatic_ 2014.pdf (790.5 kB)
- A Primer on Scientific Programming with Python_ 2nd Ed_ Hans Petter Langtangen_ 2011.pdf (4.9 MB)
- Joe Pardue - C Programming For Microcontrollers.pdf (4 MB)
- Introduction to Algorithms_ 3rd Ed_ Thomas H Cormen_ Charles E Leiserson_ Ronald L Rivest_ Clifford Stein_ 2009.pdf (5.2 MB)
- Digital Signal Processing using Stream High Performance Computing_ A 512-Input Broadband Correlator for Radio Astronomy_ arxiv14113751.pdf (5.7 MB)
- Introduction to Scilab_ 2010.pdf (1.1 MB)
- The Inevitability of Failure_ The Flawed Assumption of Security in Modern Computing Environments_ Peter A Loscocco_ Stephen D Smalley_ Patrick A Muckelbauer_ Ruth C Taylor_ S Jeff Turner_ John F_ Farrell_ 2019.pdf (98 kB)
- StegTorrent_ a Steganographic Method for P2P File Sharing Service_ arxiv13034264.pdf (684.8 kB)
- Web_ Graphics_ Perl TK_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf (3.9 MB)
- Higher-Order Perl_ Mark Jason Dominus.epub (1.5 MB)
- TRESOR-HUNT_ Attacking CPU-Bound Encryption_ Erik-Oliver Blass_ William Robertson_ 2012.pdf (246.2 kB)
- Forensic Analysis and Anonymisation of Printed Documents_ T Richter_ S Escher_ D Schonfeld_ T Strufe_ 2018.pdf (1.4 MB)
- CyberWarfare CyberComplacency_ is hollywoods blueprint for chaos coming true_ Mark Osborne_ 2013.pdf (14.7 MB)
- Games Diversions & Perl Culture_ Best of the Perl Journal_ Jon Orwant_ 2010.pdf (4.3 MB)
- On Covert Acoustical Mesh Networks in Air_ Michael Hanspach_ Michael Goetz_ 2013.pdf (3.2 MB)
- An Analysis of Chinas Great Cannon_ Marczak et al_ foci 2015.pdf (694.9 kB)
- PDL for impatient IDL users_ Craig DeForest_ 2006_ switchers.pdf (188.1 kB)
- UEFI_ Unified Extensible Firmware Interface Specification_ 2v5_ 2015.pdf (19.8 MB)
- IPv6 Essentials_ 3rd Ed_ Integrating IPv6 into Your IPv4 Network_ Silvia Hagen_2014.pdf (16.4 MB)
- Top 10 algorithms in data mining_ X Wu_ V Kumar_ J R Quinlan_ J Ghosh_ Q Yang_ H Motoda_ 2007.pdf (783.1 kB)
- Stealing Keys from PCs using a Radio_ Cheap Electromagnetic Attacks on WIndowed Exponentiation_ D Genkin_ L Pachmanov_ I Pipman_ E Tromer_ 2015.pdf (1.9 MB)
- ASLR on the Line_ Practical Cache Attacks on the MMU_ Ben Gras_ Kaveh Razavi_ Erik Bosman_ Herbert Bos_ Cristiano Giuffrida_ 2017.pdf (770.5 kB)
- Encyclopedia of Distances_ Michel M Deza_ Elena Deza_ 2009.pdf (4.4 MB)
- Modern Perl_ Chromatic_ 2010.pdf (1.5 MB)
- spiPhone_ Decoding Vibrations From Nearby Keyboards Using Mobile Phone Accelerometers_ P Traynor et al_ 2011.pdf (610.3 kB)
- Bitcoin and Cryptocurrency Technologies_ A Narayanan_ J Bonneau E Felten_ A Miller_ S Goldfeder_ 2016.pdf (18 MB)
- Understanding the bin, sbin, usr_bin , usr_sbin split.html (6.7 kB)
- LIRA_ Lightweight Incentivized Routing for Anonymity_ Rob Jasen_ Aaron Johnson_ Paul Syverson_ US-NRL 2013.pdf (1.1 MB)
- Mastering Perl_ Brian D Foy_ 2007.pdf (7.3 MB)
- Quantum Computing since Democritus_ Scott Aaronson_ 2013.pdf (3.2 MB)
- DNS and BIND on IPv6_ Cricket Liu_ 2011.pdf (4.1 MB)
- nooshare cryptocurrency_ overview_ 2012.pdf (307.2 kB)
- Introduction to Automata Theory_ Languages_ and Computation_ 2nd Ed_ John E Hopcroft_ Rajeev Motwani_ Jeffrey D Ullman_ 2001.djvu (16.2 MB)
- Invisible Mask_ Practical Attacks on Face Recognition with Infrared_ arxiv180304683.pdf (3.3 MB)
- ODINI_ Escaping Sensitive Data from Faraday-Caged, Air-Gapped Computers via Magnetic Fields_ arxiv180202700.pdf (1020.4 kB)
- Unix Network Programming_ Vol 1_ The Sockets Networking API_ 3rd Ed_ W Richard Stevens_ 2003.chm (5.4 MB)
- Automating System Administration with Perl_ Tools to Make You More Efficient_ David N Blank-Edelman_ 2009.epub (2.4 MB)
- The Art of Computer Programming_ Vol 2_ Seminumerical Algorithms_ 3rd Ed_ Donald E Knuth_ 1997.djvu (6.9 MB)
- Accessorize to a Crime_ Real and Stealthy Attacks on State-of-the-Art Face Recognition_ Mahmood Sharif_ Sruti Bhagavatula_ Lujo Bauer_ Michael K Reiter_ 2016.pdf (4.1 MB)
- Matplotlib for Python Developers_ Sandro Tosi_ 2009.pdf (12.3 MB)
- Perl Moose_ A Guide to the Revolution_ Ricardo Signes_ 2011.pdf (6.7 MB)
- FM 99.9 Radio Virus_ Exploiting FM Radio Broadcasts for Malware Deployment_ E Fernandes_ B Crispo_ M Conti_ 2013.pdf (750 kB)
- Mastering Perl for Bioinformatics_ James D Tisdall_ 2003.chm (717.3 kB)
- Report on Smartphone Encryption and Public Safety_ Manhattan District Attorneys Office_ 2015.pdf (665.8 kB)
- The Algorithm Design Manual_ 2nd Ed_ Steven S Skiena_ 2008.pdf (3.8 MB)
- comments.html (1 kB)
- Modern Perl_ Chromatic_ 2012.pdf (1 MB)
- Using Perl for Statistics_ Data Processing and Statistical Computing_ v11i01.pdf (1.1 MB)
- Mathematical Structures for Computer Science_ A Modern Treatment of Discrete Mathematics_ 5th Ed_ Judith L Gersting_ 2002.djvu (6.7 MB)
- DiskFiltration_ Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard Drive Noise_ arxiv160803431v1.pdf (3.2 MB)
- Breaking and Improving Protocol Obfuscation_ Erik Hjelmvik_ Wolfgang John_ 2010.pdf (681.7 kB)
- Numerical Recipes_ The Art of Scientific Computing_ 3rd Ed_ William H Press_ Saul A Teukolsky_ William T Vetterling_ Brian P Flannery_ 2007.pdf (20.4 MB)
- The Text Mining Handbook_ Advanced Approaches in Analyzing Unstructured Data_ Ronen Feldman_ James Sanger_ 2006.pdf (4.8 MB)
- Accessible EPUB 3_ Matt_Garrish_ 2012.pdf (3.1 MB)
- Essential Linux Device Drivers_ Sreekrishnan Venkateswaran_ 2008.chm (4 MB)
- Packet Guide to Routing and Switching_ Bruce Hartpence_ 2011.pdf (7.3 MB)
- Unix as IDE_ Tom Ryder_ 2012.epub (500.6 kB)
- SATAn_ Air-Gap Exfiltration Attack via Radio Signals From SATA Cables_ Mordechai Guri_arxiv2207.07413.pdf (9.9 MB)
- Effective Perl Programming_ Ways to Write Better More Idiomatic Perl_ 2nd Ed_ Joseph N Hall_ Joshua A McAdams_ brian d foy_ 2010.pdf (1.5 MB)
- Reverse Engineering x86 Processor Microcode_ P Koppe et al_ sec17_ 2017 .pdf (2.4 MB)
- The Complete ESP8266 Psionics Handbook_ Thotcon 2016.pdf (6.3 MB)
- Learning Perl Tk_ Graphical User Interfaces with Perl_ Nancy Walsh_ 1999.pdf (3.8 MB)
- The Tangled Web_ A Guide to Securing Modern Web Applications_ Michal Zalewski_ 2011.epub (1.8 MB)
- UNIX Network Programming_ Vol 2_ Interprocess Communications_ 2nd Ed_ W Richard Stevens_ 1998.djvu (5.7 MB)
- ePub Straight to the Point_ Elizabeth Castro_ 2010.pdf (7.4 MB)
- Introduction to Scientific Programming and Simulation using R_ Owen Jones_ Robert Maillardet_ Andrew Robinson_ 2009.pdf (7.7 MB)
- Methods in Medical Informatics_ Fundamentals of Healthcare Programming in Perl, Python, and Ruby_ Jules J Berman_ 2010.pdf (5.8 MB)
- Hacking the Cable Modem_ Ryan Harris_ 2006.pdf (15.6 MB)
- Introduction to the Theory of Computation_ 2nd Ed_ Michael Sipser_ 2005.djvu (4.9 MB)
- Text Mining_ Applications and Theory_ Michael W Berry_ Jacob Kogan_ 2010.pdf (2.3 MB)
- Crowd Counting Through Walls Using WiFi_ S Depatla_ Y Mostofi_ Percom 2018.pdf (2.1 MB)
- WHOIS running the Internet_ protocol policy and privacy_ Garth O Bruen_ 2015.pdf (10.1 MB)
- grep awk and sed_ three VERY useful command-line utilities_ Matt Probert_ 2016.pdf (99.1 kB)
- Magnetic Recording_ Stella Wu_ Seagate Technology_ 2014.pdf (12.5 MB)
- Introduction to Submarine Networks_ Present and Future Challenges Historical Perspective_ Valey Kamalov_ Vijay Vursirikala_ Jose Chesnoy_ 2019.pdf (46.4 MB)
- Imperfect Forward Secrecy_ How Diffie-Hellman Fails in Practice_ D Adrian_ K Bhargavan_ Z Curumeric_ P Gaudry_ M Green_ J A Halderman_ N Heniger_ D Springall_ E Thome_ L Valenta_ B VanderSloot_ E Wustrow_ S Zanella-Beguelin_ P Zimmerman_ 2015.pdf (1.3 MB)
- Simulating Analyzing and Animating Dynamical Systems_ A Guide to XPPAUT for Researchers and Students_ Bard Ermentrout_ 2009.djvu (2.7 MB)
- The Linux Programming Interface_ A Linux and UNIX System Programming Handbook_ Michael Kerrisk_ 2010.pdf (6.9 MB)
- PDL_ Scientific Programming in Perl_ 2001.pdf (2.1 MB)
- Perl Medic_ Transforming Legacy Code_ Peter J Scott_ 2004.chm (1.1 MB)
- LED-it-GO_ Leaking a lot of Data from Air-Gapped Computers via the HDD LED_ M Guri_ B Zadov_ E Atias_ Y Elovici_ 2017.pdf (1.8 MB)
- Digital Design_ Verilog_ An Embedded Systems Approach Using Verilog_ Peter J Ashenden_ 2007.pdf (2 MB)
- DNS & BIND Cookbook_ Cricket Liu.chm (576.3 kB)
- What Is EPUB 3_ Matt Garrish_ 2011.pdf (399 kB)
- Practical Text Mining with Perl_ Roger Bilisoly_ 2008.pdf (17.4 MB)
- AIR-FI_ Generating Covert Wi-Fi Signals from Air-Gapped Computers_ Mordechai Guri_ arxiv2012.06884.pdf (6.9 MB)
- Efficient streaming language models with attention sinks_ arxiv2309.17453.pdf (11.8 MB)
- RoFormer_ Enhanced Transformer with Rotary Position Embedding_ arxiv2104.09864v4.pdf (572.5 kB)
- The Curse of Recursion_ Training on Generated Data Makes Models Forget_ arxiv2305.17493.pdf (2.2 MB)
- R ULER_ What’s the Real Context Size of Your_ arxiv2404.06654v2.pdf (642.6 kB)
- Train Short, Test Long_ Attention with Linear Biases Enables Input Length Extrapolation_arxiv2108.12409.pdf (741.2 kB)
- Llama 2_ Open Foundation and Fine-Tuned Chat Models_ arxiv2307.09288.pdf (13 MB)
- LLaMA_ Open and Efficient Foundation Language Models_ arxiv2302.13971.pdf (709.5 kB)
- Ties-Merging_ Resolving Interference When Merging Models_ arxiv2306.01708v2.pdf (1.1 MB)
- Climbing towards Natural Language Understanding_ On Meaning Form and Understanding in the Age of Data_ Emily M Bender- Alexander Koller_ 2020.pdf (472.2 kB)
Only searching subdirectories is allowed. /library/ full searches are disabled. To search something else, just add "/find-your search terms.search" to any directory in the library.
"/find-a few words.search", when added to any URL in the Library subdirectory will return search results for "a few words" after a delay. If there is anything not alphanumberic in the string the log parser won't even trigger the search. No caching or pre-conversion to text is implemented yet so it has to convert every time and it's really slow, as you can see.