












Lecture of 20220308. Example of graphs. Informal description of isomorphism. Formal definition of isomorphic graphs. Status of deciding GRAPH ISOMORPHISM and of proving that two graphs are…


Lecture 3, on January 7, 2022 of ECS 235B, Foundations of Computer and Information Security


Online lecture (Zoom recording) of 1/4/2022. Course basics. Two example problems: (1) counting the number of paths from the VMC to Pachamama coffee shop; and (2) five riffle shuffles is inadequate…


Videos and all other materials are copyright 2021 Matthias Köppe and shared as Open Educational Resources subject to the Creative Commons AttributionShareAlike 3.0 Unported (CC BYSA 3.0)…


Videos and all other materials are copyright 2021 Matthias Köppe and shared as Open Educational Resources subject to the Creative Commons AttributionShareAlike 3.0 Unported (CC BYSA 3.0)…






Foundations of Computer and Information Security. This covers conspiracy in sharing in the TakeGrant Protection Model, security policies, policy models, and mechanisms. The class starts at 10:36…




Determining the dimension of the face induced by a valid inequality for the stable set problem: Cycle inequality, lifted cycle inequality, clique inequality, edge inequality. notes20201207.pdfThe…
