ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

22 results

CppNow
C++Now 2019: Michael Park “Pattern Matching: Match Me If You Can”

http://cppnow.org — Presentation Slides, PDFs, Source Code and other presenter materials are available at: ...

1:29:26
C++Now 2019: Michael Park “Pattern Matching: Match Me If You Can”

4,641 views

6 years ago

CppNow
Mach7: The Design and Evolution of a Pattern Matching Library for C++

Yuriy Solodkyy's talk from C++Now 2014 Slides are available here: ...

1:35:38
Mach7: The Design and Evolution of a Pattern Matching Library for C++

2,931 views

11 years ago

Kristopher Micinski
L9: Quasiquoting and Pattern Matching

Reading: There is no officially-assigned reading, but you should read racket's match documentation, it will save you a lot of time ...

23:47
L9: Quasiquoting and Pattern Matching

2,455 views

4 years ago

Studio IIT Bombay
FSTTCS2019  S001 Approximate Online Pattern Matching in Sublinear Time

This video has been released by Studio IIT Bombay under Creative Commons license.

30:19
FSTTCS2019 S001 Approximate Online Pattern Matching in Sublinear Time

204 views

4 years ago

Steven Gordon
MITM and Brute Force Attacks on DES and AES (CSS322, L7, Y14)

Meet-in-the-middle attack on Double DES explained; example of OpenSSL for encryption; brute force attacks on DES and AES.

1:16:05
MITM and Brute Force Attacks on DES and AES (CSS322, L7, Y14)

5,505 views

10 years ago

Knowledge-Based Systems, TU Dresden
The Complexity of Basic Graph Pattern Matching

We show that even the mere check whether a basic graph pattern in SPARQL has any match on a given graph is already ...

42:58
The Complexity of Basic Graph Pattern Matching

1,222 views

5 years ago

Instituto de Informatica UACh
[INFO145] Clase16. Algoritmos para Strings II

Como les decía vamos a seguir viendo algoritmos para string la segunda parte y nosotros estamos concentrando en un problema ...

55:54
[INFO145] Clase16. Algoritmos para Strings II

190 views

5 years ago

Steven Gordon
Caesar Cipher for Encryption (CSS441, L02, Y15)

Caesar cipher as an example substitution cipher; brute force and language analysis attacks. Course material via: ...

1:13:49
Caesar Cipher for Encryption (CSS441, L02, Y15)

4,285 views

10 years ago

IRIF
Beating Two-Thirds For Random-Order Streaming Matching (Soheil Behnezhad)

The maximum matching problem has been a cornerstone of algorithmic research and its study has led to numerous breakthrough ...

40:27
Beating Two-Thirds For Random-Order Streaming Matching (Soheil Behnezhad)

256 views

4 years ago

0xdade
Time Signature Based Matching - Lauren Deason

Complete Title: Time Signature Based Matching for Data Fusion and Coordination Detection in Cyber Relevant Logs The ability to ...

23:18
Time Signature Based Matching - Lauren Deason

336 views

7 years ago

Ritambhara Coding and System Design Interviews
Big_O Online classes: Searching techniques (Part_2)

To learn more about searching and sorting from interview point of view with lot of interview questions, read our book, "Searching ...

54:59
Big_O Online classes: Searching techniques (Part_2)

61 views

8 years ago

IACR
Fuzzy Asymmetric Password-Authenticated Key Exchange

Paper by Andreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi presented at Asiacrypt 2020 See ...

23:26
Fuzzy Asymmetric Password-Authenticated Key Exchange

464 views

5 years ago

DEFCONConference
DEF CON 30 Blue Team Village - Project Obsidian -  Using Chainsaw to Identify Malicious Activity

For we have indications of brute forcing. Foreign now we're going to let's actually go to workstation 2. then we're going to add ...

21:30
DEF CON 30 Blue Team Village - Project Obsidian - Using Chainsaw to Identify Malicious Activity

535 views

3 years ago

Derek Harter
COSC 2336 Data Structures and Algorithms : Dictionaries and Hashing

Unit Dictionaries and Hashing, Video 01 - Dictionaries and Hashing In this video we introduce the concept of a Dictionary data ...

33:59
COSC 2336 Data Structures and Algorithms : Dictionaries and Hashing

127 views

5 years ago

Adam Doupé
CSE 340 9-16-15 Lecture: "Syntax Analysis Pt. 5 and Semantics Pt. 1"

Recorded lecture for CSE 340 on 9/16/15 finishing the "Syntax Analysis" topic and starting the "Semantics" topic. Finished our ...

1:14:36
CSE 340 9-16-15 Lecture: "Syntax Analysis Pt. 5 and Semantics Pt. 1"

1,394 views

10 years ago

Arul Treesa Mathew
heap sort explanation

CST201- Data Structures - KTU.

35:17
heap sort explanation

14 views

5 years ago

Jittat Fakcharoenphol
01204313 Algorithms EP04.2 - Directed acyclic graphs และ topological sorting

พิจารณากราฟที่มีทิศทาง (directed graph) และ topological ordering.

1:00:18
01204313 Algorithms EP04.2 - Directed acyclic graphs และ topological sorting

343 views

6 years ago

Aida Nasr
TSP problem and Tree
20:15
TSP problem and Tree

849 views

4 years ago

Ali Karci
Algoritma Analizi: Kaba Seçim Algoritması
38:02
Algoritma Analizi: Kaba Seçim Algoritması

1,302 views

5 years ago

一田木
Leetcode Weekly Contest 139 (134/3985) | code.log.luzi82

1:04 Q1071 Greatest Common Divisor of Strings 7:49 Q1072 Flip Columns For Maximum Number of Equal Rows 21:26 Q1073 ...

1:49:52
Leetcode Weekly Contest 139 (134/3985) | code.log.luzi82

99 views

6 years ago