cc3536.pdf
183.3 KB
Topics: Dynamic Programming, Dijkstra's Algorithm. #programming
Dijkstra’s algorithm revisited:
the dynamic programming connexion.
Dijkstra’s algorithm revisited:
the dynamic programming connexion.
image_2022-05-24_14-24-07.png
231.4 KB
Topics: Computational Complexity Theory. #comp_theory
A diagram of the world of computability and complexity.
Source: here
A diagram of the world of computability and complexity.
Source: here
#learning
Courses in Computer Science and Engineering
https://www.cs.washington.edu/education/courses/
Courses in Computer Science and Engineering
https://www.cs.washington.edu/education/courses/
❤3
S0025-5718-2013-02787-1.pdf
488.1 KB
Topics: Goldbach Conjecture. #math
This paper describes how the even Goldbach conjecture was confirmed to be true for all even numbers not larger than 4 · 10^18.
This paper describes how the even Goldbach conjecture was confirmed to be true for all even numbers not larger than 4 · 10^18.
👍1
2022-06-17_17-05_scrot.png
630.3 KB
#notes #hardware #hacking
(A) and (B) show standard cell layout of traditional 2-input NAND and NOR gates, respectively. Here, the metal layers are different and, therefore, easy to differentiate. (C) and (D) show camouflaged standard cell layouts of 2-input NAND and NOR gates, respectively. Note that, the metal layers are identical and, therefore, difficult to distinguish.
From Hardware Security: A Hands-on Learning Approach.
(A) and (B) show standard cell layout of traditional 2-input NAND and NOR gates, respectively. Here, the metal layers are different and, therefore, easy to differentiate. (C) and (D) show camouflaged standard cell layouts of 2-input NAND and NOR gates, respectively. Note that, the metal layers are identical and, therefore, difficult to distinguish.
From Hardware Security: A Hands-on Learning Approach.
p.file
The State of the Art in IC Reverse Engineering.pdf
For those who like IC Reverse Engineering, this article is a must-read.
The TTY demystified.pdf
800 KB
Topics: Linux TTY. #linux
Useful information about Linux TTY.
https://www.linusakesson.net/programming/tty/
Useful information about Linux TTY.
https://www.linusakesson.net/programming/tty/
p.file
The TTY demystified.pdf
https://www.oreilly.com/library/view/linux-device-drivers/0596005903/ch18.html
https://www.kernel.org/doc/html/latest/driver-api/tty/index.html
https://www.kernel.org/doc/html/latest/driver-api/tty/index.html
O’Reilly Online Learning
Linux Device Drivers, 3rd Edition
Chapter 18. TTY Drivers A tty device gets its name from the very old abbreviation of teletypewriter and was originally associated only with the physical or virtual terminal connection to … - Selection from Linux Device Drivers, 3rd Edition [Book]
Topics: Compilation, Compilers. #programming #learning
Advanced Topics in Compilation. Great resources.
https://matt.might.net/teaching/advanced-compilers/2013-fall/
Advanced Topics in Compilation. Great resources.
https://matt.might.net/teaching/advanced-compilers/2013-fall/
CursorList.pdf
63.4 KB
Cursor Linked List. #programming
Cursor Implementation of Linked Lists. Cursors are useful in FORTRAN and other languages without pointer types.
Cursor Implementation of Linked Lists. Cursors are useful in FORTRAN and other languages without pointer types.