10 | -- | 0 | Jim Waldo, Soline Boussard. GPTs and Hallucination: Why do large language models hallucinate? |
20 | -- | 0 | Mark Russinovich, Cédric Fournet, Greg Zaverucha, Josh Benaloh, Brandon Murdoch, Manuel Costa. Confidential Computing Proofs: An alternative to cryptographic zero-knowledge |
30 | -- | 0 | João Varajão, António Trigo. Assessing IT Project Success: Perception vs. Reality: We would not be in the digital age if it were not for the recurrent success of IT projects |
40 | -- | 0 | Catherine Hayes, David Malone. Questioning the Criteria for Evaluating Non-cryptographic Hash Functions: Maybe we need to think more about non-cryptographic hash functions |
50 | -- | 0 | Shuvendu K. Lahiri, Alexey Svyatkovskiy, Christian Bird, Erik Meijer 0001, Terry Coatta. Program Merge: What's Deep Learning Got to Do with It?: A discussion with Shuvendu Lahiri, Alexey Svyatkovskiy, Christian Bird, Erik Meijer and Terry Coatta |
60 | -- | 0 | Peter Alvaro, Andrew Quinn. Deterministic Record-and-Replay: Zeroing in only on the nondeterministic actions of the process |
70 | -- | 0 | George V. Neville-Neil. Unwanted Surprises: When that joke of an API is on you |
80 | -- | 0 | Phil Vachon. Test Accounts: A Hidden Risk: You may decide the risks are acceptable. But, if not, here are some rules for avoiding them |