|
ECS-036A Lecture 2023-05-24 at 13:07
|
|
ECS-036A Lecture 2023-05-22 at 13:07
|
|
ECS-036A Lecture 2023-04-19 at 13:07
|
|
Autonomous Vehicle Design Project group 12(Chris Chao, Jiagan Li, Yixin Ya, Mengyao Zhang) Line following, traffic light detection, obstacle avodicance.
|
|
Lecture 26, on March 7, 2022 of ECS 235B, Foundations of Computer and Information Security
|
|
Rochelle Werner is a 5th year PhD candidate in the Stewart lab.
|
|
Lecture 3, on January 7, 2022 of ECS 235B, Foundations of Computer and Information Security
|
|
Paper: Nyberg, Daniel. (2011). Analysis of Two Common Hidden Surface Removal Algorithms, Painter’s Algorithm & Z-Buffering.Kandidatexjobb CSC ; K11061.
|
|
ECS 153 Spring 2021. Computer Security. This is the second discussion section of the week of May 10. The video begins at 3:02 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This is the first discussion section of the week of May 10. The video begins at 4:15 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This discusses buffer overflows, the Clark-Wilson model, and begins the discussion of trust. The video begins at 6:56 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This is the first discussion section of the week of April 26. The video begins at 2:21 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This presents several vulnerability databases and attack trees. The video begins at 8:15 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This continues the discussion of the models. The video begins at 7:48 from the beginning.
|
|
ECS 153 Spring 2021. Computer Security. This covers the rest of penetration testing and begins vulnerability models. The video begins at 5:05 from the beginning.
|
|
ECS 153, Computer Security. This presents the basics of an SQL injection attack (as one was discovered on campus), finishes the robust programming material, and begins discussing vulnerabilities…
|