Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
190 results
http://cppnow.org — Presentation Slides, PDFs, Source Code and other presenter materials are available at: ...
21,735 views
8 years ago
http://cppnow.org — Lightning Talk — Presentation Slides, PDFs, Source Code and other presenter materials are available at: ...
3,708 views
An introduction to CUDA C/C++ using a simple SAXPY (Single-precision A*X + Y) as an example. This video is part of an #hpc ...
849 views
4 years ago
Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core Etienne Martineau Software engineer, Cisco ...
2,437 views
10 years ago
An introduction to CUDA programming with JULIA using a simple SAXPY (Single-precision A*X + Y) as an example. This video is ...
644 views
8,442 views
7 years ago
1,723 views
Additionally Alan Cox weights in on how *not* to do changes, using GNOME 3 as an example. This is an excerpt from ELCE 2011 ...
193,368 views
6,014 views
6 years ago
11,291 views
16,192 views
Automating packer and compiler/toolchain detection can be tricky and best and downright frustrating at worst. The majority of ...
1,757 views
3,220 views
In this episode, Robert is joined by Mark Downie, who shows us Time Travel Debugging. provides the ability to record a Web app ...
14,580 views
In this episode of Crust of Rust, we go over Rust's atomic types, including the mysterious Ordering enum. In particular, we explore ...
103,042 views
5 years ago
10,928 views
In this work, we present the novel results of our research on Intel CPU microcode. Building upon prior research on Intel Goldmont ...
11,016 views
2 years ago
In this Crust of Rust episode, we implement some common sorting algorithms in Rust. This episode doesn't aim to explain any ...
67,993 views
Fuzzing remains to be the most effective technique for bugs hunting in memory-unsafe programs. Last year, hundreds of security ...
4,879 views
3,154 views