Search for tag: "buffer"

Senior design project eec195, team 12

Autonomous Vehicle Design Project group 12(Chris Chao, Jiagan Li, Yixin Ya, Mengyao Zhang) Line following, traffic light detection, obstacle avodicance.

From  Yixin Yan 0 likes 6 plays 0  

ECS 235B, Winter 2022; Lecture #26; March 7, 2022

Lecture 26, on March 7, 2022 of ECS 235B, Foundations of Computer and Information Security

From  Matt Bishop 0 likes 9 plays 0  

A Day in the Life of GGNB: Rochelle Werner

Rochelle Werner is a 5th year PhD candidate in the Stewart lab.

From  Ste Traxler 0 likes 13 plays 0  

ECS 235B Winter Quarter 2022, Lecture 3

Lecture 3, on January 7, 2022 of ECS 235B, Foundations of Computer and Information Security

From  Matt Bishop 0 likes 18 plays 0  

ECS222A Project - Chuan Hsin Cho, Yu Hsuan Tseng

Paper: Nyberg, Daniel. (2011). Analysis of Two Common Hidden Surface Removal Algorithms, Painter’s Algorithm & Z-Buffering.Kandidatexjobb CSC ; K11061.

From  Chuan-Hsin Cho 0 likes 16 plays 0  

ECS 153, Spring 2021; Discussion Section #6; May 12, 2021

ECS 153 Spring 2021. Computer Security. This is the second discussion section of the week of May 10. The video begins at 3:02 from the beginning.

From  Matt Bishop 0 likes 1 plays 0  

ECS 153, Spring 2021; Discussion Section #6; May 10, 2021

ECS 153 Spring 2021. Computer Security. This is the first discussion section of the week of May 10. The video begins at 4:15 from the beginning.

From  Matt Bishop 0 likes 16 plays 0  

ECS 153, Spring 2021; Lecture #14; April 28, 2021

ECS 153 Spring 2021. Computer Security. This discusses buffer overflows, the Clark-Wilson model, and begins the discussion of trust. The video begins at 6:56 from the beginning.

From  Matt Bishop 0 likes 103 plays 0  

ECS 153, Spring 2021; Discussion Section #4; April 26, 2021

ECS 153 Spring 2021. Computer Security. This is the first discussion section of the week of April 26. The video begins at 2:21 from the beginning.

From  Matt Bishop 0 likes 8 plays 0  

ECS 153, Spring 2021; Lecture #8; April 14, 2021

ECS 153 Spring 2021. Computer Security. This presents several vulnerability databases and attack trees. The video begins at 8:15 from the beginning.

From  Matt Bishop 0 likes 69 plays 0  

ECS 153, Spring 2021; Lecture #7; April 12, 2021

ECS 153 Spring 2021. Computer Security. This continues the discussion of the models. The video begins at 7:48 from the beginning.

From  Matt Bishop 0 likes 78 plays 0  

ECS 153, Spring 2021; Lecture #6; April 9, 2021

ECS 153 Spring 2021. Computer Security. This covers the rest of penetration testing and begins vulnerability models. The video begins at 5:05 from the beginning.

From  Matt Bishop 0 likes 78 plays 0  

ECS 153, Spring 2021; Lecture #4; April 5, 2021

ECS 153, Computer Security. This presents the basics of an SQL injection attack (as one was discovered on campus), finishes the robust programming material, and begins discussing vulnerabilities…

From  Matt Bishop 0 likes 97 plays 0  

ECS 235B, Winter 2021; Lecture #28; March 12, 2021

Foundations of Computer and Information Security. This covers mitigating covert channels and secure design principles. The class starts at 8:04 into the video.

From  Matt Bishop 0 likes 6 plays 0  

ECS 235B, Winter 2021; Lecture #27; March 10, 2021

Foundations of Computer and Information Security. This covers detecting, analyzing, and mitigation covert channels. The class starts at 7:37 into the video.

From  Matt Bishop 0 likes 4 plays 0  

ECS 235B, Winter 2021; Lecture #20; February 22, 2021

Foundations of Computer and Information Security. This covers generalized noninterference, nondeducibility, and restrictiveness. The class starts at 8:24 into the video.

From  Matt Bishop 0 likes 24 plays 0