Search for tag: "algorithm"

ECS 235A Fall Quarter 2021, Lecture 9, October 11, 2021

This is the video of the ninth lecture. It's crude as I made it from my laptop, as the room has no video recording. Still not top of the line.

From  Matt Bishop 0 likes 14 plays 0  

How Does a Quantum Computer Work?

from Veritasiumhttps://www.youtube.com/watch?v=g_IaVepNDT4

From  John Terning 0 likes 10 plays 0  

ECS222A Project - Chuan Hsin Cho, Yu Hsuan Tseng

Paper: Nyberg, Daniel. (2011). Analysis of Two Common Hidden Surface Removal Algorithms, Painter’s Algorithm & Z-Buffering.Kandidatexjobb CSC ; K11061.

From  Chuan-Hsin Cho 0 likes 15 plays 0  

ECS 153, Spring 2021; Lecture #23; May 19, 2021

ECS 153 Spring 2021. Computer Security. This covers authentication with a brief overview of rainbow tables and begins access control mechanisms. The video begins at 5:13 from the beginning.

From  Matt Bishop 0 likes 42 plays 0  

ECS 153, Spring 2021; Lecture #22; May 17, 2021

ECS 153 Spring 2021. Computer Security. This covers the POODLE attack on SSL and begins authentication. The video begins at 8:16 from the beginning.

From  Matt Bishop 0 likes 29 plays 0  

abiy.tasissa.5.11

Abstract: Sparse Manifold clustering and embedding (SMCE) is an algorithm to cluster nonlinear manifolds using self-representation in the dictionary of data points and a proximity regularization. A…

From  Stefan Schonsheck 0 likes 4 plays 0  

Transabdominal Fetal Pulse Oximetry for Intrapartum Fetal Monitoring

Sensing, Imaging and Signal Processing 12 Team Lead: Begum Kasap Advisor: Prof. Ghiasi

From  Femi-Jide Akinmoladun 0 likes 13 plays 0  

Meeting 5-4-21: Backpropagation and the Brain

Mehmet Berkay leads a discussion on the potential biological basis for backpropagation and a justification for its uses in spiking neural networks.

From  Luis El Srouji 0 likes 16 plays 0  

ECS 153, Spring 2021; Lecture #10; April 19, 2021

ECS 153 Spring 2021. Computer Security. This finishes the discussion of access control matrices and begins one on security policies. The video begins at 2:47 from the beginning.

From  Matt Bishop 0 likes 62 plays 0  

Efficient Fixpoint Computation for Abstract Interpretation

Abstract interpretation is a general framework for expressing static program analyses. It reduces the problem of extracting properties of a program to computing an approximation of the least fixpoint…

From  Aditya Thakur 0 likes 18 plays 0  

ECS 153, Spring 2021; Lecture #2; March 31, 2021

ECS 153, Spring 2021. Computer Security. This covers the design principles of security. The lecture starts ar 8:07 into the video.

From  Matt Bishop 0 likes 98 plays 0  

ECS 120 0:6 pigeonhole principle (discrete math review)

From  David Doty 1 likes 119 plays 0  

ECS 289A Lecture 3a

From  David Doty 0 likes 7 plays 0  

ECS 220 9b:8.5 Immerman-Szelepcsényi Theorem NSPACE(s(n)) = coNSPACE(s(n)) for s(n) ≥ log(n)

From  David Doty 0 likes 18 plays 0  

ECS 220 8c:8.4 Savitch's theorem space-bounded deterministic simulation of space-bounded nondeterminism, space usage of Savitch_s algorithm

From  David Doty 0 likes 15 plays 0  

ECS 220 8a:8.2 NL and NPSPACE nondeterministic space-bounded computation and prover-verifier characterization

From  David Doty 0 likes 20 plays 0