-
@marc-portier will fill in the details here, but he is requesting that the logsheet_schema_extended is tripleised (and perhaps I need to tidy it up first?)
-
We aim to make the following promise: zerocopy and any code produced by zerocopy-derive are sound on any supported toolchain/target, and will remain sound under any future compiler changes; in other w…
-
Hi 👋
I'm Ian, working on behalf of Google and the [Open Source Security Foundation (OpenSSF)](https://openssf.org/) to help open source projects to improve their supply chain security.
After so…
-
Our project would like to use `explain` to generate a proof tree for our analysis. It appears that our use of ADTs is blocking us from being able to use `explain`, as it is unimplemented for ADTs:
…
-
When you are logged in or out, the search functionality returns everything you have access to. However, if you only want to see public or private samples, and click the radio button for it, that does …
-
00:42:15 Intro to JuliaConf & PyData Day
00:52:34 - Keynote - Software at ASML: the Force behind making microchips
01:19:20 - ASML Q&A
01:41:43 - Intro to next talk
01:41:43 - Language 1.5 revisit…
-
In `intptr_t` expressions llvm generally picks the left hand side as providing provenance and warns about it. It would be nice if an analyzer could look deeper (across function boundaries, etc) and de…
-
Write all available analysis metadata (replay time/host/directory, user, database keys loaded, etc.) to the ROOT output file to make data provenance as transparent as possible.
-
### Description
As a researcher, I want to be able to access all provenance data (all parameters, software versions of tools used and locations/checksums of source data) for future reference when p…
-
* [ ] surveillance technology
* [ ] facial recognition
* [ ] privacy
* [ ] unintentional harm
* [ ] group work
* [ ] individualism (with cultural contexts)
* [ ] fragility of ML
* [ ] data viz
…