Search for tag: "problem"

ECS 153, Spring 2021; Lecture #20; May 12, 2021

ECS 153 Spring 2021. Computer Security. This covers key exchange, generation, and PKIs The video begins at 10:16 from the beginning.

From  Matt Bishop on May 15th, 2021 0 likes 4 plays 0  

ECS 153, Spring 2021; Lecture #19; May 10, 2021

ECS 153 Spring 2021. Computer Security. This covers digital signatures and symmetric key exchange.. The video begins at 5:08 from the beginning.

From  Matt Bishop on May 11th, 2021 0 likes 13 plays 0  

abiy.tasissa.5.11

Abstract: Sparse Manifold clustering and embedding (SMCE) is an algorithm to cluster nonlinear manifolds using self-representation in the dictionary of data points and a proximity regularization. A…

From  Stefan Schonsheck on May 11th, 2021 0 likes 1 plays 0  

Autonomous Car Project

Senior Design Project: SD17 (Robots/Auto) Team Leads: Andrea Anaya, Ann Ryan, Caitlin Pasqualino, Ethan De Leon Advisor: Lance Halsted

From  Femi-Jide Akinmoladun on May 11th, 2021 0 likes 1 plays 0  

ECS 153, Spring 2021; Lecture #18; May 7, 2021

ECS 153 Spring 2021. Computer Security. This finishes symmetric key cryptography, covers public key cryptography and cryptographic hash functions and begins digital signatures.

From  Matt Bishop on May 6th, 2021 0 likes 22 plays 0  

ECS 153, Spring 2021; Lecture #15; April 30, 2021

ECS 153 Spring 2021. Computer Security. This discusses trust, the Chinese Wall model, ORCON, and begins RBAC. The video begins at 6:03 from the beginning.

From  Matt Bishop on May 3rd, 2021 0 likes 17 plays 0  

ECS 153, Spring 2021; Lecture #14; April 28, 2021

ECS 153 Spring 2021. Computer Security. This discusses buffer overflows, the Clark-Wilson model, and begins the discussion of trust. The video begins at 6:56 from the beginning.

From  Matt Bishop on April 28th, 2021 0 likes 85 plays 0  

braxton.osting.4.20

Archetypal analysis is an unsupervised learning method that uses a convex polytope to summarize multivariate data. For fixed k, the method finds a convex polytope with k vertices, called archetype…

From  Stefan Schonsheck on April 22nd, 2021 0 likes 0 plays 0  

ECS 153, Spring 2021; Lecture #10; April 19, 2021

ECS 153 Spring 2021. Computer Security. This finishes the discussion of access control matrices and begins one on security policies. The video begins at 2:47 from the beginning.

From  Matt Bishop on April 20th, 2021 0 likes 59 plays 0  

env200c - policy tools and policy goals

Identifying the policy goals and policy tools in your strategy memos

From  Tyler Scott on April 17th, 2021 0 likes 15 plays 0