appel1977.pdf
3.7 MB
Appel, K., Haken, W., & Koch, J. (1977). Every planar map is four colorable. Part II: Reducibility. Illinois Journal of Mathematics, 21(3), 491–567. doi:10.1215/ijm/1256049012
Modern Game Console Exploitation.pdf
221.1 KB
cc3536.pdf
183.3 KB
Topics: Dynamic Programming, Dijkstra's Algorithm. #programming
Dijkstra’s algorithm revisited:
the dynamic programming connexion.
Dijkstra’s algorithm revisited:
the dynamic programming connexion.
image_2022-05-24_14-24-07.png
231.4 KB
Topics: Computational Complexity Theory. #comp_theory
A diagram of the world of computability and complexity.
Source: here
A diagram of the world of computability and complexity.
Source: here
#learning
Courses in Computer Science and Engineering
https://www.cs.washington.edu/education/courses/
Courses in Computer Science and Engineering
https://www.cs.washington.edu/education/courses/
❤3
S0025-5718-2013-02787-1.pdf
488.1 KB
Topics: Goldbach Conjecture. #math
This paper describes how the even Goldbach conjecture was confirmed to be true for all even numbers not larger than 4 · 10^18.
This paper describes how the even Goldbach conjecture was confirmed to be true for all even numbers not larger than 4 · 10^18.
👍1
2022-06-17_17-05_scrot.png
630.3 KB
#notes #hardware #hacking
(A) and (B) show standard cell layout of traditional 2-input NAND and NOR gates, respectively. Here, the metal layers are different and, therefore, easy to differentiate. (C) and (D) show camouflaged standard cell layouts of 2-input NAND and NOR gates, respectively. Note that, the metal layers are identical and, therefore, difficult to distinguish.
From Hardware Security: A Hands-on Learning Approach.
(A) and (B) show standard cell layout of traditional 2-input NAND and NOR gates, respectively. Here, the metal layers are different and, therefore, easy to differentiate. (C) and (D) show camouflaged standard cell layouts of 2-input NAND and NOR gates, respectively. Note that, the metal layers are identical and, therefore, difficult to distinguish.
From Hardware Security: A Hands-on Learning Approach.
p.file
The State of the Art in IC Reverse Engineering.pdf
For those who like IC Reverse Engineering, this article is a must-read.
The TTY demystified.pdf
800 KB
Topics: Linux TTY. #linux
Useful information about Linux TTY.
https://www.linusakesson.net/programming/tty/
Useful information about Linux TTY.
https://www.linusakesson.net/programming/tty/
p.file
The TTY demystified.pdf
https://www.oreilly.com/library/view/linux-device-drivers/0596005903/ch18.html
https://www.kernel.org/doc/html/latest/driver-api/tty/index.html
https://www.kernel.org/doc/html/latest/driver-api/tty/index.html
O’Reilly Online Learning
Linux Device Drivers, 3rd Edition
Chapter 18. TTY Drivers A tty device gets its name from the very old abbreviation of teletypewriter and was originally associated only with the physical or virtual terminal connection to … - Selection from Linux Device Drivers, 3rd Edition [Book]
Topics: Compilation, Compilers. #programming #learning
Advanced Topics in Compilation. Great resources.
https://matt.might.net/teaching/advanced-compilers/2013-fall/
Advanced Topics in Compilation. Great resources.
https://matt.might.net/teaching/advanced-compilers/2013-fall/