Highlights
- Pro
Stars
vLLM’s reference system for K8S-native cluster-wide deployment with community-driven performance optimization
Agent Laboratory is an end-to-end autonomous research workflow meant to assist you as the human researcher toward implementing your research ideas
An AI-powered platform that assists ACM student members in mastering the skills to solve intricate ICPC problems
The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 350 common, vulnerable components (openssl, libpng, libxml2, expat and others),…
Utility for measuring the fraction of time the CPython GIL is held
Replication package of the paper titled "Mining Guidelines for Architecting Robotics Software" published at the International Journal of Systems and Software
MemLiner is a remote-memory-friendly runtime system.
Springy Store is a conceptual simple μServices-based project using the latest cutting-edge technologies, to demonstrate how the Store services are created to be a cloud-native and 12-factor app agn…
🔥 Seata is an easy-to-use, high-performance, open source distributed transaction solution.
An example to Java Bytecode Manipulation/Instrumentation with ASM
Code to evaluate XLATE attacks as well existing cache attacks.
High-performance stateful serverless runtime based on WebAssembly
DrCCTProf is a fine-grained call path profiling framework for binaries running on ARM and X86 architectures.
Hands on with side-channels: a tutorial on covert-channels built using shared CPU resources. Three different covert-channel implementations based on Flush+Reload and Prime+Probe (L1, LLC) side-chan…
Slice-aware Memory Management - Exploiting NUCA Characteristic of LLC in Intel Processors
"The mother of all demo apps" — Exemplary fullstack Medium.com clone powered by React, Angular, Node, Django, and many more
Cally, a C project call graph generator using GCC's generated Register Transfer Language (RTL) files
Java inefficiency detection tool based on CPU performance monitoring counters and hardware debug register. The tool detects dead writes, silent stores, and redundant loads.
Mutilate: high-performance memcached load generator
The most cited deep learning papers