サクサク読めて、アプリ限定の機能も多数!
トップへ戻る
衆院選
www.win.tue.nl/~aeb
Next Previous Contents 10. Processes Before looking at the Linux implementation, first a general Unix description of threads, processes, process groups and sessions. A session contains a number of process groups, and a process group contains a number of processes, and a process contains a number of threads. A session can have a controlling tty. At most one process group in a session can be a foreg
www.win.tue.nl/~vanwijk
This website is dedicated to the visualization of Seifert surfaces. The first question is obvious. What is a Seifert Surface? That was my first response when my colleague Arjeh Cohen asked me in May 2004 if I could make pictures of these. Since then, things got out of hand. Inspired and guided by Arjeh, I became totally intrigued by these strange and difficult surfaces and found it a challenge how
www.win.tue.nl/~laroyo
Industry Report 76 JANUARY • FEBRUARY 2003 Published by the IEEE Computer Society 1089-7801/03/$17.00©2003 IEEE IEEE INTERNET COMPUTING Amazon.com Recommendations Item-to-Item Collaborative Filtering R ecommendation algorithms are best known for their use on e-commerce Web sites,1 where they use input about a cus- tomer’s interests to generate a list of recommend- ed items. Many applications use
www.win.tue.nl
Creating a rogue CA certificate Alexander Sotirov, Marc Stevens, Jacob Appelbaum, Arjen Lenstra, David Molnar, Dag Arne Osvik, Benne de Weger [Dec. 31, 2008] Responses from Verisign (RapidSSL), Microsoft and Mozilla. [Jan. 2, 2009] Responses from TC TrustCenter and RSA, and a US-CERT Vulnerability Note. [Jan. 8, 2009] Video and audio files of the 25C3 presentation are available from CCC. [Jan. 15,
Andries Brouwer, aeb@cwi.nl2003-02-01 Some remarks on the Linux Kernel 1. Linux 1.1 History 1.2 Size 1.3 Hardware platforms 1.4 Authors 1.5 Users and marketshare 1.6 Name 1.7 Distributions 1.8 Copyright, Open Source, GPL 1.9 Literature and documentation 2. The kernel source 2.1 Kernel versions 2.2 Obtaining the kernel source 2.3 Compiling the kernel 2.4 Booting a new kernel 2.5 Modules 2.6 Subsyst
Next Previous Contents 4. System Calls 4.1 System call numbers System calls are identified by their numbers. The number of the call foo is __NR_foo. For example, the number of _llseek used above is __NR__llseek, defined as 140 in /usr/include/asm-i386/unistd.h. Different architectures have different numbers. Often, the kernel routine that handles the call foo is called sys_foo. One finds the assoc
We have used a Sony Playstation 3 to correctly predict the outcome of the 2008 US presidential elections. In order not to influence the voters we keep our prediction secret, but commit to it by publishing its cryptographic hash on this website. The document with the correct prediction and matching hash will be revealed after the elections. Two persons, even if they look similar, usually have diffe
Jointly with Alex Sotirov, Jake Appelbaum, David Molnar and Dag Arne Osvik we have extended thois work into a realistic attack: Creating a rogue CA certificate. This work has had some influence on the catalogue of algorithms suitable for the German Signature Law (Signaturgesetz). This catalogue (a.o.) prescribes the conditions and time frames for hash algorithms to be used in legally protected dig
HashClash started as Marc Stevens' TU/e Master Degree project. The purpose is to extend both theoretical and experimental results on collision generation for the MD5 and SHA-1 hash functions, based on the ideas of Xiaoyun Wang and her co-workers. Marc's MSc project has been very successful. Marc defended his MSc thesis in June 2007, and passed with flying colors. His grade was 10, which is the hig
www.win.tue.nl/~wscor
The P-versus-NP page This page collects links around papers that try to settle the "P versus NP" question (in either way). Here are some links that explain/discuss this question: A clear formulation of the "P versus NP" question by Stephen Cook. Mathworld's page on "P versus NP" The Wikipedia page on "P versus NP" Michael Sipser has a survey paper on "The History and Status of the P versus NP ques
Everybody hates the CapsLock key, but keyboard manufacturers continue producing keyboards with CapsLock - it could be that someone wants it. With A20 it is similar but worse. Really nobody wants it, but it continues to haunt us. History The 8088 in the original PC had only 20 address lines, good for 1 MB. The maximum address FFFF:FFFF addresses 0x10ffef, and this would silently wrap to 0x0ffef. Wh
www.win.tue.nl/~gino
SOLID version 1.0 is still available here. Contents News Introduction Papers Requirements License Download Installation Documentation Links News January 19, 2004. In 2004, DTECTA continues to offer licenses and support for SOLID 3.5. See www.dtecta.com for details. November 1, 2003. The book "Collision Detection in Interactive 3D Environments" is out! Learn more about it here. October 19, 2002.
このページを最初にブックマークしてみませんか?
『www.win.tue.nl』の新着エントリーを見る
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く