|
More about sets. Powerset of a set. Cross product of sets. The axiomatic approach to set theory. Languages (sets of strings).
|
|
This is the video of the seventh lecture. It's crude as I made it from my laptop, as the room has no video recording. I'm sure it is really very amateurish.
|
|
ECS 153 Spring 2021. Computer Security. This covers symmetric key cryptography. The video begins at 7:00 from the beginning.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
errata: At 2:08, I incorrectly identified the set decided by the regex Sigma^* 1 Sigma^*. I said it would be "very similar" to above, but it has an important difference. Assuming Sigma…
|
|
|
|
errata: At 5:56, I say "or any string that starts with a 1", but I should have said "or any string that ends with a 1."
|
|
|
|
This is a brief review to identify what software is needed to utilize Mendeley.
|