Benefits of Virtual Memory

Tags: cos217, operating_systems, cos432, system_programming, information_security

I/O Redirection

Tags: c, cos217, operating_systems, system_programming

A Minimal Shell

Tags: c, cos217, operating_systems, system_programming

Bottom-Up DP: The Rod Cutting Problem

Tags: dynamic_programming, algorithms

Chapter I: Imposed Social Stratification

Tags: brave_new_world, fiction, books, dystopia, c13u_diaries

Distributing Candy Under Constraints

Tags: arrays, hard_programming_challenges, array_transformations

Consensus on the Blockchain

Tags: bitcoin, cryptocurrencies, cos432, information_security

The Blockchain as an Immutable Ledger

Tags: bitcoin, cos432, cryptocurrencies

Bitcoin Transactions

Tags: cos432, cryptocurrencies, bitcoin

PKI: Authentic Download Assumption

Tags: cos432, public_key_infrastructure, information_security

The Secure PRF Game

Tags: cos432, threat_model, message_integrity

A Random Function as a Trivial MAC

Tags: cos432, message_integrity, information_security

The Secure MAC Game

Tags: cos432, message_integrity, threat_model, information_security

Threat Model for Message Integrity

Tags: cos432, threat_model, message_integrity, information_security

Properties of Secure Communication

Tags: cos432, message_integrity, information_security

Error in Least Squares

Tags: orf245, statistics, machine_learning, least_squares, linear_regression

Coefficient of Determination

Tags: orf245, linear_regression, statistics, machine_learning

Possible Reasons for Malware's Decline

Tags: cos432, malware, information_security

Host-Based Malware Defenses

Tags: cos432, system_programming, operating_systems, malware, information_security

Behavioral Analysis Antivirus

Tags: cos432, malware, information_security

Signature-Based Antivirus (Anti-malware)

Tags: cos432, malware, information_security

Rootkit Malware

Tags: cos432, malware, information_security

String Permutations

Tags: string_processing, medium_programming_challenges, bit_manipulation, enumeration, permutation


Tags: cos432, malware, information_security

Exactly One Edit Distance Away

Tags: string_processing, medium_programming_challenges, edit_distance

Partitioning an Array

Tags: medium_programming_challenges, sorting, array_transformations

Selection in an Unsorted Array

Tags: medium_programming_challenges, order_statistics, array_search_under_constraints, arrays

Computer Viruses

Tags: cos432, malware, information_security

Interpreting Entropy

Tags: cos432, information_processing

Palindrome Permutation II

Tags: string_processing, recursive_algorithms, medium_programming_challenges

Longest Sequence of Alternating Min and Max Peaks in an Array

Tags: dynamic_programming, arrays, medium_programming_challenges, array_search_under_constraints, subsequence_algorithms

Estimators for Two Samples

Tags: orf245, statistics, two_sample_statistics

Selecting K Random Elements

Tags: medium_programming_challenges, probability, sampling

Manipulating Virtual Memory

Tags: system_programming, cos217, operating_systems

Properties of the Sample Mean

Tags: orf245, statistics, point_estimation

Invariance Principle for the MLE

Tags: point_estimation, maximum_likelihood, orf245, statistics

Principles of Selecting Estimators

Tags: orf245, statistics, point_estimation

Access Control List vs. Capability

Tags: cos432, operating_systems, information_security

OS Security Threat Model

Tags: cos432, operating_systems, information_security

Lauren Ipsum: A Fair Exchange & Cleverness When It Counts

Tags: books, lauren_ipsum, book_excerpts, fiction, c13u_diaries

Second Dawn (Arthur C. Clarke)

Tags: fiction, education, books, arthur_clarke, book_excerpts, c13u_diaries

Minimum Coin Change

Tags: dynamic_programming, medium_programming_challenges

Mostly Lost

Tags: books, lauren_ipsum, book_excerpts, fiction

Eponymous Bach from 'Sense and Sensibleness'

Tags: books, lauren_ipsum, book_excerpts

Lauren Ipsum Mash-Up

Tags: books, lauren_ipsum, book_excerpts, fiction

Lauren Ipsum: Heuristics

Tags: fiction, lauren_ipsum, books, book_excerpts

Lauren Ipsum: Lighthouses

Tags: book_excerpts, fiction, lauren_ipsum

Process Management

Tags: cos217, operating_systems, system_programming


Tags: cos217, linux, operating_systems, cos432, information_security

Building C Programs

Tags: cos217, c

Arthur C. Clarke, Love that Universe (1961)

Tags: arthur_clarke, fiction, books, book_excerpts, c13u_diaries

Top-Down DP: The Rod Cutting Problem

Tags: dynamic_programming, algorithms, medium_programming_challenges, recursive_algorithms

Deleting a Node from a Binary Search Tree

Tags: trees, data_structures

Edit Distance by Dynamic Programming

Tags: dynamic_programming, algorithms, string_processing, hard_programming_challenges, edit_distance

Brave New World: Chapter II

Tags: brave_new_world, fiction, books, c13u_diaries

Longest Fibonacci-Like Subsequence

Tags: dynamic_programming, medium_programming_challenges, subsequence_algorithms

Implementation of a Probability Tree

Tags: dynamic_programming, probability, medium_programming_challenges

Profitable Schemes (2D Dynamic Programming)

Tags: dynamic_programming, hard_programming_challenges, iterative_algorithms

Cherry Picking (Maximum Path in Both Directions)

Tags: dynamic_programming, path_finding, hard_programming_challenges, recursive_algorithms

Base-X Encoding a Positive Number

Tags: string_processing, medium_programming_challenges

Jump Game

Tags: medium_programming_challenges, breadth_first_search, graph_algorithms

Private Control Flow Illusion

Tags: cos217, operating_systems

Dynamic Memory Management II

Tags: c, memory, cos217, operating_systems, system_programming

Word Search in a 2D Grid

Tags: medium_programming_challenges, recursive_algorithms, graph_algorithms, depth_first_search

Minimum Window Substring

Tags: sliding_window, hard_programming_challenges, string_processing

Topological Sort on an Alien Dictionary

Tags: hard_programming_challenges, string_processing, recursive_algorithms, graph_algorithms, topological_sort

Word Break II

Tags: hard_programming_challenges, string_processing, recursive_algorithms

Validate a Binary Search Tree

Tags: binary_trees, binary_search_trees, medium_programming_challenges, recursive_algorithms

Find the Successor Node in a BST

Tags: medium_programming_challenges, binary_search_trees, order_statistics

Get the Next Permutation

Tags: medium_programming_challenges, mathematics, permutation

Number of Ways of Decoding a String

Tags: string_processing, medium_programming_challenges, recursive_algorithms, dynamic_programming

Generate All Valid Parentheses

Tags: medium_programming_challenges, string_processing, recursive_algorithms, enumeration

Combination Sum

Tags: recursive_algorithms, medium_programming_challenges, dynamic_programming

Longest Valid Parentheses

Tags: string_processing, hard_programming_challenges, dynamic_programming

Longest Substring with At Most K Unique Characters

Tags: hard_programming_challenges, string_processing, two_pointers, sliding_window

Find the Maximum Sum of Any Contiguous Subarray

Tags: dynamic_programming, medium_programming_challenges, arrays, array_contiguous_elements

Regular Expression Matching

Tags: dynamic_programming, recursive_algorithms, string_processing

House Robber

Tags: dynamic_programming, easy_programming_challenges, array_search_under_constraints

Missing Number in a List

Tags: easy_programming_challenges, array_search_under_constraints, bit_manipulation

Words with an Edit Distance of Less Than K

Tags: hard_programming_challenges, dynamic_programming, string_processing, tries, recursive_algorithms, edit_distance, trees

Generate All Non-Zero Subarrays

Tags: easy_programming_challenges, array_contiguous_elements, arrays

Bi-Directional Search

Tags: breadth_first_search, graph_algorithms, medium_programming_challenges

Lowest Common Ancestor

Tags: medium_programming_challenges, recursive_algorithms, binary_trees

Possible Coin Change Denominations

Tags: dynamic_programming, medium_programming_challenges

Generate Unique Permutations from Possibly Duplicate Elements

Tags: medium_programming_challenges, iterative_algorithms, enumeration, permutation


Tags: permutations_and_combinations, medium_programming_challenges, iterative_algorithms, backtracking

Minimum Height Tree

Tags: graph_algorithms, breadth_first_search, trees, medium_programming_challenges

Longest Common Subsequence

Tags: medium_programming_challenges, dynamic_programming, edit_distance, subsequence_algorithms

Decomment C++ Source Code

Tags: medium_programming_challenges, string_processing, deterministic_finite_automaton

Minimum in a Rotated but Sorted Array

Tags: array_search_under_constraints, binary_search, arrays, medium_programming_challenges, hard_programming_challenges

Zigzag Level Order Traversal for Binary Tree

Tags: medium_programming_challenges, binary_trees

Does an Increasing Triplet Subsequence Exist?

Tags: medium_programming_challenges, arrays, array_search_under_constraints, subsequence_algorithms

Maximum Length of a Pair Chain

Tags: dynamic_programming, decision_problems, medium_programming_challenges, greedy_algorithms, sorting

Number of Longest Increasing Subsequences

Tags: medium_programming_challenges, array_search_under_constraints, arrays, dynamic_programming, subsequence_algorithms

Minmimum ASCII Delete Sum

Tags: medium_programming_challenges, edit_distance, string_processing, dynamic_programming

Reverse Every Pair in a Linked List

Tags: linked_lists, medium_programming_challenges, iterative_algorithms, recursive_algorithms

Reverse Nodes in K-Group

Tags: hard_programming_challenges, linked_lists, recursive_algorithms

You Need to Graduate!

Tags: graph_algorithms, medium_programming_challenges, topological_sort

Restore IP Addresses

Tags: medium_programming_challenges, string_processing

Neighborhood Search in a Sorted Array

Tags: arrays, binary_search, medium_programming_challenges, iterative_algorithms, array_contiguous_elements

Test Statistics for Population Mean

Tags: orf245, hypothesis_testing, statistics

Authenticating People

Tags: cos432, authentication, information_security

PKI: Correct Domain Assumption

Tags: cos432, public_key_infrastructure, information_security

OS Role in Security

Tags: cos432, operating_systems, information_security

Subject, Verb, Object Policy in Access Control

Tags: cos432, information_security

Percentiles of a Distribution

Tags: percentiles, order_statistics, orf245, statistics

Confidence Interval for Sample Mean

Tags: orf245, statistics, confidence_interval, probability

Behavioral Consistency

Tags: psychology, methods_of_persuasion, rhetoric, books

Rule of Succession

Tags: probability, wikipedia

Test Statistics for Paired Data

Tags: orf245, test_statistics, mean_statistics, statistics, two_sample_statistics

Test Statistics & Hypothesis Testing for Paired Data

Tags: orf245, statistics, test_statistics, two_sample_statistics, mean_statistics

A Least Squares Linear Probabilistic Model

Tags: orf245, machine_learning, linear_regression, statistics, least_squares


Tags: cos432, malware, information_security

Notable Malware

Tags: cos432, malware, information_security

PKI: Assumption of Authentic Certificate

Tags: public_key_infrastructure, cos432, information_security

Proof of Work on the Blockchain

Tags: bitcoin, cos432, cryptocurrencies

Double Spending on the Blockchain

Tags: bitcoin, cryptocurrencies, cos432


Card Popularity: