lectures.alex.balgavy.eu

Lecture notes from university.
git clone git://git.alex.balgavy.eu/lectures.alex.balgavy.eu.git
Log | Files | Refs | Submodules

ModeNameSize
-rw-r--r--.gitignore79L
-rw-r--r--.gitmodules63L
-rw-r--r--.projections.json5L
-rw-r--r--config.toml23L
-rw-r--r--content/_index.md59L
-rw-r--r--content/acn-notes/_index.md21L
-rw-r--r--content/acn-notes/advanced-computer-networks.apkg19562B
-rw-r--r--content/acn-notes/data-center-networking/fat-tree-4-ports.png157026B
-rw-r--r--content/acn-notes/data-center-networking/index.md56L
-rw-r--r--content/acn-notes/data-center-networking/portland-flow-diagram.png122108B
-rw-r--r--content/acn-notes/data-center-transport.md45L
-rw-r--r--content/acn-notes/dns.md19L
-rw-r--r--content/acn-notes/in-network-computing.md42L
-rw-r--r--content/acn-notes/intro.md17L
-rw-r--r--content/acn-notes/ip-routing.md33L
-rw-r--r--content/acn-notes/local-network-ethernet-arp.md31L
-rw-r--r--content/acn-notes/machine-learning-for-networking.md39L
-rw-r--r--content/acn-notes/network-automation.md36L
-rw-r--r--content/acn-notes/network-function-virtualization.md27L
-rw-r--r--content/acn-notes/network-monitoring.md28L
-rw-r--r--content/acn-notes/network-transport.md68L
-rw-r--r--content/acn-notes/networking-data-structures-and-algorithms.md21L
-rw-r--r--content/acn-notes/programmable-data-plane-p4.md28L
-rw-r--r--content/acn-notes/software-defined-networking/abstractions-in-sdn-diagram.png78059B
-rw-r--r--content/acn-notes/software-defined-networking/index.md50L
-rw-r--r--content/advanced-logic-notes/_index.md32L
-rw-r--r--content/advanced-logic-notes/advanced-logic.apkg19008B
-rw-r--r--content/advanced-logic-notes/bisimulations/bisimulation-example.png14686B
-rw-r--r--content/advanced-logic-notes/bisimulations/index.md184L
-rw-r--r--content/advanced-logic-notes/bisimulations/model-a.dot12L
-rw-r--r--content/advanced-logic-notes/bisimulations/model-a.dot.svg72L
-rw-r--r--content/advanced-logic-notes/bisimulations/model-b.dot13L
-rw-r--r--content/advanced-logic-notes/bisimulations/model-b.dot.svg78L
-rw-r--r--content/advanced-logic-notes/epistemic-logic.md12L
-rw-r--r--content/advanced-logic-notes/exercise-1/fifth.svg150L
-rw-r--r--content/advanced-logic-notes/exercise-1/first.svg44L
-rw-r--r--content/advanced-logic-notes/exercise-1/fourth.svg75L
-rw-r--r--content/advanced-logic-notes/exercise-1/index.md178L
-rw-r--r--content/advanced-logic-notes/exercise-1/second.svg44L
-rw-r--r--content/advanced-logic-notes/exercise-1/third.svg55L
-rw-r--r--content/advanced-logic-notes/exercise-3/1-model-k.dot8L
-rw-r--r--content/advanced-logic-notes/exercise-3/1-model-k.dot.svg61L
-rw-r--r--content/advanced-logic-notes/exercise-3/1-model-m.dot8L
-rw-r--r--content/advanced-logic-notes/exercise-3/1-model-m.dot.svg61L
-rw-r--r--content/advanced-logic-notes/exercise-3/5-1-tableau.dot6L
-rw-r--r--content/advanced-logic-notes/exercise-3/5-1-tableau.dot.svg32L
-rw-r--r--content/advanced-logic-notes/exercise-3/5-2-tableau.dot12L
-rw-r--r--content/advanced-logic-notes/exercise-3/5-2-tableau.dot.svg96L
-rw-r--r--content/advanced-logic-notes/exercise-3/5-3-counter-model.dot6L
-rw-r--r--content/advanced-logic-notes/exercise-3/5-3-counter-model.dot.svg45L
-rw-r--r--content/advanced-logic-notes/exercise-3/5-3-tableau.dot20L
-rw-r--r--content/advanced-logic-notes/exercise-3/5-3-tableau.dot.svg170L
-rw-r--r--content/advanced-logic-notes/exercise-3/index.md253L
-rw-r--r--content/advanced-logic-notes/exercise-4/diagram.dot8L
-rw-r--r--content/advanced-logic-notes/exercise-4/diagram.dot.svg44L
-rw-r--r--content/advanced-logic-notes/exercise-4/index.md55L
-rw-r--r--content/advanced-logic-notes/exercise-5/index.md45L
-rw-r--r--content/advanced-logic-notes/formula-validity-using-sequents-and-tableaux/example-tableau.png52989B
-rw-r--r--content/advanced-logic-notes/formula-validity-using-sequents-and-tableaux/index.md61L
-rw-r--r--content/advanced-logic-notes/formula-validity-using-sequents-and-tableaux/reducing-modal-sequents.png49602B
-rw-r--r--content/advanced-logic-notes/formula-validity-using-sequents-and-tableaux/tableau-modal-logic.png44244B
-rw-r--r--content/advanced-logic-notes/formula-validity-using-sequents-and-tableaux/tableau-rules.png51627B
-rw-r--r--content/advanced-logic-notes/homework-1/game-tree.dot15L
-rw-r--r--content/advanced-logic-notes/homework-1/game-tree.dot.svg134L
-rw-r--r--content/advanced-logic-notes/homework-1/index.md163L
-rw-r--r--content/advanced-logic-notes/homework-1/model-a.dot7L
-rw-r--r--content/advanced-logic-notes/homework-1/model-a.dot.svg61L
-rw-r--r--content/advanced-logic-notes/homework-1/model-b.dot7L
-rw-r--r--content/advanced-logic-notes/homework-1/model-b.dot.svg61L
-rw-r--r--content/advanced-logic-notes/homework-1/model-c.dot5L
-rw-r--r--content/advanced-logic-notes/homework-1/model-c.dot.svg31L
-rw-r--r--content/advanced-logic-notes/intro-to-modal-logic-operators-frames-models-tautologies/example-characterizing.png9441B
-rw-r--r--content/advanced-logic-notes/intro-to-modal-logic-operators-frames-models-tautologies/index.md97L
-rw-r--r--content/advanced-logic-notes/intro-to-modal-logic-operators-frames-models-tautologies/local-truth-definitions.png44839B
-rw-r--r--content/advanced-logic-notes/model-transformations-tree-unravelling-bisimulation-contraction/index.md84L
-rw-r--r--content/advanced-logic-notes/model-transformations-tree-unravelling-bisimulation-contraction/model-contraction.png15273B
-rw-r--r--content/advanced-logic-notes/model-transformations-tree-unravelling-bisimulation-contraction/model-diagram.dot5L
-rw-r--r--content/advanced-logic-notes/model-transformations-tree-unravelling-bisimulation-contraction/model-diagram.dot.svg37L
-rw-r--r--content/advanced-logic-notes/model-transformations-tree-unravelling-bisimulation-contraction/tree-unraveling.dot10L
-rw-r--r--content/advanced-logic-notes/model-transformations-tree-unravelling-bisimulation-contraction/tree-unraveling.dot.svg91L
-rw-r--r--content/advanced-logic-notes/multi-modal-logic/example-multimodal-logic-formula.dot6L
-rw-r--r--content/advanced-logic-notes/multi-modal-logic/example-multimodal-logic-formula.dot.svg45L
-rw-r--r--content/advanced-logic-notes/multi-modal-logic/index.md46L
-rw-r--r--content/advanced-logic-notes/program-correctness.md19L
-rw-r--r--content/advanced-logic-notes/proof-systems-and-derivation/Screenshot 2022-03-05 at 12.06.06.png422498B
-rw-r--r--content/advanced-logic-notes/proof-systems-and-derivation/admissible-rule.png19807B
-rw-r--r--content/advanced-logic-notes/proof-systems-and-derivation/index.md185L
-rw-r--r--content/advanced-logic-notes/propositional-dynamic-logic-pdl/formula-examples.png54215B
-rw-r--r--content/advanced-logic-notes/propositional-dynamic-logic-pdl/if-then-else-calculation.png28911B
-rw-r--r--content/advanced-logic-notes/propositional-dynamic-logic-pdl/index.md121L
-rw-r--r--content/advanced-logic-notes/propositional-dynamic-logic-pdl/model-if-then-else.dot10L
-rw-r--r--content/advanced-logic-notes/propositional-dynamic-logic-pdl/model-if-then-else.dot.svg66L
-rw-r--r--content/advanced-logic-notes/propositional-dynamic-logic-pdl/model-while.dot13L
-rw-r--r--content/advanced-logic-notes/propositional-dynamic-logic-pdl/model-while.dot.svg88L
-rw-r--r--content/advanced-logic-notes/propositional-dynamic-logic-pdl/while-calculation.png42257B
-rw-r--r--content/advanced-logic-notes/semantics-truth-and-validity-game-semantics-for-formula-validity/index.md170L
-rw-r--r--content/advanced-logic-notes/semantics-truth-and-validity-game-semantics-for-formula-validity/states.dot10L
-rw-r--r--content/advanced-logic-notes/semantics-truth-and-validity-game-semantics-for-formula-validity/states.dot.svg79L
-rw-r--r--content/advanced-logic-notes/semantics-truth-and-validity-game-semantics-for-formula-validity/tree.dot22L
-rw-r--r--content/advanced-logic-notes/semantics-truth-and-validity-game-semantics-for-formula-validity/tree.dot.svg127L
-rw-r--r--content/advanced-logic-notes/some-midterm-solutions/bisimulation-contraction.dot7L
-rw-r--r--content/advanced-logic-notes/some-midterm-solutions/bisimulation-contraction.dot.svg44L
-rw-r--r--content/advanced-logic-notes/some-midterm-solutions/counter-model.dot7L
-rw-r--r--content/advanced-logic-notes/some-midterm-solutions/counter-model.dot.svg44L
-rw-r--r--content/advanced-logic-notes/some-midterm-solutions/index.md124L
-rw-r--r--content/advanced-logic-notes/some-midterm-solutions/model-m.dot5L
-rw-r--r--content/advanced-logic-notes/some-midterm-solutions/model-m.dot.svg27L
-rw-r--r--content/advanced-logic-notes/some-midterm-solutions/model-n.dot4L
-rw-r--r--content/advanced-logic-notes/some-midterm-solutions/model-n.dot.svg19L
-rw-r--r--content/advanced-logic-notes/standard-translation-mapping-basic-modal-logic-to-first-order-predicate-logic/index.md27L
-rw-r--r--content/advanced-logic-notes/standard-translation-mapping-basic-modal-logic-to-first-order-predicate-logic/standard-translation-examples.png44895B
-rw-r--r--content/advanced-logic-notes/standard-translation-mapping-basic-modal-logic-to-first-order-predicate-logic/standard-translation-rules.png26168B
-rw-r--r--content/advanced-logic-notes/temporal-logic/index.md125L
-rw-r--r--content/advanced-logic-notes/temporal-logic/truth-and-validity.png30934B
-rw-r--r--content/advanced-logic-notes/temporal-logic/until-1.dot12L
-rw-r--r--content/advanced-logic-notes/temporal-logic/until-1.dot.svg76L
-rw-r--r--content/advanced-logic-notes/temporal-logic/until-2.dot10L
-rw-r--r--content/advanced-logic-notes/temporal-logic/until-2.dot.svg63L
-rw-r--r--content/advanced-logic-notes/the-finite-model-property.md27L
-rw-r--r--content/aos-notes/_index.md13L
-rw-r--r--content/aos-notes/booting-x86_64/index.md32L
-rw-r--r--content/aos-notes/booting-x86_64/memory-before-boot.png43426B
-rw-r--r--content/aos-notes/booting-x86_64/openlsd-initial-addr-space.png56849B
-rw-r--r--content/aos-notes/managing-physical-memory/allocating-memory-overview.png227128B
-rw-r--r--content/aos-notes/managing-physical-memory/buddy-allocator.png139302B
-rw-r--r--content/aos-notes/managing-physical-memory/dram-layout.png170973B
-rw-r--r--content/aos-notes/managing-physical-memory/index.md111L
-rw-r--r--content/aos-notes/managing-physical-memory/memory-errors.png104763B
-rw-r--r--content/aos-notes/managing-physical-memory/vmalloc.png187574B
-rw-r--r--content/aos-notes/multicore.md41L
-rw-r--r--content/aos-notes/multiprocessing.md124L
-rw-r--r--content/aos-notes/page-tables/four-level-paging-structures.png425685B
-rw-r--r--content/aos-notes/page-tables/index.md182L
-rw-r--r--content/aos-notes/page-tables/linear-page-table.png352299B
-rw-r--r--content/aos-notes/page-tables/openlsd-after-boot.png209759B
-rw-r--r--content/aos-notes/paging/index.md62L
-rw-r--r--content/aos-notes/paging/vma-diagram.png368809B
-rw-r--r--content/aos-notes/user-mode/gdt-entry.png149015B
-rw-r--r--content/aos-notes/user-mode/index.md147L
-rw-r--r--content/ap-notes/_index.md17L
-rw-r--r--content/ap-notes/classes-and-instantiation.md43L
-rw-r--r--content/ap-notes/encapsulation.md31L
-rw-r--r--content/automata-complexity-notes/_index.md17L
-rw-r--r--content/automata-complexity-notes/lecture-1/880d7e035dcb41b290b260eb932562c7.png20928B
-rw-r--r--content/automata-complexity-notes/lecture-1/index.md111L
-rw-r--r--content/automata-complexity-notes/lecture-10.md93L
-rw-r--r--content/automata-complexity-notes/lecture-11/0702cd410a6e40c39bb77f33d95c01e9.png55348B
-rw-r--r--content/automata-complexity-notes/lecture-11/73ec4de0aeab4c5eaf8a3be2107388c4.png15104B
-rw-r--r--content/automata-complexity-notes/lecture-11/index.md48L
-rw-r--r--content/automata-complexity-notes/lecture-2.md85L
-rw-r--r--content/automata-complexity-notes/lecture-3/576b1d4dbafe45399c236e5b6f40b60d.png12262B
-rw-r--r--content/automata-complexity-notes/lecture-3/5f853b93cdad4c28bb70b297332f39a7.png13521B
-rw-r--r--content/automata-complexity-notes/lecture-3/86315079efdd412f82bc1195a96910da.png34122B
-rw-r--r--content/automata-complexity-notes/lecture-3/9fa836b5b1d246f4a1ad9c0ce6cb42d5.png18968B
-rw-r--r--content/automata-complexity-notes/lecture-3/cb193f47c584401799c6bdedeb273245.png14751B
-rw-r--r--content/automata-complexity-notes/lecture-3/index.md113L
-rw-r--r--content/automata-complexity-notes/lecture-4.md76L
-rw-r--r--content/automata-complexity-notes/lecture-5.md72L
-rw-r--r--content/automata-complexity-notes/lecture-6.md279L
-rw-r--r--content/automata-complexity-notes/lecture-7.md87L
-rw-r--r--content/automata-complexity-notes/lecture-8.md87L
-rw-r--r--content/automata-complexity-notes/lecture-9/b6bfee1559554792afe8148c52bd516f.png60932B
-rw-r--r--content/automata-complexity-notes/lecture-9/index.md135L
-rw-r--r--content/binary-malware-analysis-notes/_index.md20L
-rw-r--r--content/binary-malware-analysis-notes/anti-analysis.md90L
-rw-r--r--content/binary-malware-analysis-notes/assembly.md103L
-rw-r--r--content/binary-malware-analysis-notes/disassembly-tools.md40L
-rw-r--r--content/binary-malware-analysis-notes/dynamic-binary-instrumentation-and-intel-pin/index.md54L
-rw-r--r--content/binary-malware-analysis-notes/dynamic-binary-instrumentation-and-intel-pin/pin-diagram.png183121B
-rw-r--r--content/binary-malware-analysis-notes/dynamic-data-excavation.md26L
-rw-r--r--content/binary-malware-analysis-notes/dynamic-taint-analysis.md73L
-rw-r--r--content/binary-malware-analysis-notes/gdb.md11L
-rw-r--r--content/binary-malware-analysis-notes/introduction/binary-format.png147108B
-rw-r--r--content/binary-malware-analysis-notes/introduction/index.md130L
-rw-r--r--content/binary-malware-analysis-notes/mitigating-code-reuse-attacks.md19L
-rw-r--r--content/binary-malware-analysis-notes/packers.md108L
-rw-r--r--content/binary-malware-analysis-notes/parser-identification.md24L
-rw-r--r--content/binary-malware-analysis-notes/symbolic-execution/index.md49L
-rw-r--r--content/binary-malware-analysis-notes/symbolic-execution/symbolic-execution-example.png92614B
-rw-r--r--content/binary-malware-analysis-notes/taint-analysis-in-practice.md16L
-rw-r--r--content/binary-malware-analysis-notes/tracking-control-flow.md85L
-rw-r--r--content/binary-malware-analysis-notes/what-happens-before-main.md42L
-rw-r--r--content/coding-and-cryptography/_index.md13L
-rw-r--r--content/coding-and-cryptography/abbrevs.vim22L
-rw-r--r--content/coding-and-cryptography/bch-codes.md88L
-rw-r--r--content/coding-and-cryptography/cyclic-linear-codes.md93L
-rw-r--r--content/coding-and-cryptography/euclidian-algorithm.md24L
-rw-r--r--content/coding-and-cryptography/introduction-basic-concepts.md72L
-rw-r--r--content/coding-and-cryptography/linear-codes/conversion.svg294L
-rw-r--r--content/coding-and-cryptography/linear-codes/index.md173L
-rw-r--r--content/coding-and-cryptography/perfect-related-codes.md30L
-rw-r--r--content/coding-and-cryptography/reed-solomon-codes.md83L
-rw-r--r--content/compnet-notes/Application.md81L
-rw-r--r--content/compnet-notes/Data Link_ Error detection_correction/283fb9398cbe1db557b8728201673a95.png43467B
-rw-r--r--content/compnet-notes/Data Link_ Error detection_correction/64a0ee073f47e19c70587b67d62da8b1.png47768B
-rw-r--r--content/compnet-notes/Data Link_ Error detection_correction/754cc747a2ff31b014ac036a056df6b5.png49054B
-rw-r--r--content/compnet-notes/Data Link_ Error detection_correction/index.md79L
-rw-r--r--content/compnet-notes/Data Link_ Overview & framing.md36L
-rw-r--r--content/compnet-notes/Data Link_ Protocols/b6476b870bd69ff06de162b9096ef8f1.png44104B
-rw-r--r--content/compnet-notes/Data Link_ Protocols/cf5bf9462753581ed4a1117155c78fd9.png35648B
-rw-r--r--content/compnet-notes/Data Link_ Protocols/index.md42L
-rw-r--r--content/compnet-notes/Examples of networks/05d7adf2d55e48fae8317b44e90f0cba.png40617B
-rw-r--r--content/compnet-notes/Examples of networks/3d4d8a69b93b71434efb63ef7317fdfe.png72369B
-rw-r--r--content/compnet-notes/Examples of networks/596a6c67b376043629cca2217a13cadc.png182651B
-rw-r--r--content/compnet-notes/Examples of networks/6de8836f2646609fb2773540d346c7fa.png53958B
-rw-r--r--content/compnet-notes/Examples of networks/9dbd07707a51838fd804a3479f4dafa1.png53083B
-rw-r--r--content/compnet-notes/Examples of networks/a9fc62754dc087536fec232153c4f4e1.png56723B
-rw-r--r--content/compnet-notes/Examples of networks/b9c1a5082042605c12b19376b870ba9f.png45864B
-rw-r--r--content/compnet-notes/Examples of networks/e1adeaadbb07c59477a7b8189f4b45e8.png84467B
-rw-r--r--content/compnet-notes/Examples of networks/index.md103L
-rw-r--r--content/compnet-notes/MAC_ Overview & allocation methods.md41L
-rw-r--r--content/compnet-notes/MAC_ Protocols/0c6bc5fde956ff03ff3b83abbf56b84a.png48812B
-rw-r--r--content/compnet-notes/MAC_ Protocols/82c50afd129d1fb069dd82c5464336fc.png28561B
-rw-r--r--content/compnet-notes/MAC_ Protocols/a1075f2fd31bfd47a46f0397d03e8ffb.png31427B
-rw-r--r--content/compnet-notes/MAC_ Protocols/e6997d1baf716429e079ac91c1f265c2.png34273B
-rw-r--r--content/compnet-notes/MAC_ Protocols/index.md78L
-rw-r--r--content/compnet-notes/MAC_ Use in Ethernet/18eff75b9d35b7d6d80c28ca35bbbc6b.png61763B
-rw-r--r--content/compnet-notes/MAC_ Use in Ethernet/index.md35L
-rw-r--r--content/compnet-notes/MAC_ Use in Wifi & Broadband/01ca69f3fb4193072107926749c781b2.png126807B
-rw-r--r--content/compnet-notes/MAC_ Use in Wifi & Broadband/70c9e5dfb635a0d7a38086e8b28339fd.png76365B
-rw-r--r--content/compnet-notes/MAC_ Use in Wifi & Broadband/eee8a14434569f167d62b4658e58530f.png53714B
-rw-r--r--content/compnet-notes/MAC_ Use in Wifi & Broadband/index.md30L
-rw-r--r--content/compnet-notes/MAC_ use in Bluetooth & RFID/4f23b094f7fad480fcbf760ff5304b6d.png61013B
-rw-r--r--content/compnet-notes/MAC_ use in Bluetooth & RFID/602a12f8a67d51f5188925a231fb9c13.png47950B
-rw-r--r--content/compnet-notes/MAC_ use in Bluetooth & RFID/a2ee8019c9a5cca230bb3b7b7a6c4732.png79223B
-rw-r--r--content/compnet-notes/MAC_ use in Bluetooth & RFID/e8fed776415462764a16704acb52b44d.png36512B
-rw-r--r--content/compnet-notes/MAC_ use in Bluetooth & RFID/index.md38L
-rw-r--r--content/compnet-notes/Network_ internet protocols/55be5c42fb10bf8e6dbb5bbd2648c51f.png134220B
-rw-r--r--content/compnet-notes/Network_ internet protocols/b7d058e98446748e74208485b13cd793.png48767B
-rw-r--r--content/compnet-notes/Network_ internet protocols/index.md59L
-rw-r--r--content/compnet-notes/Network_ overview/977fa69a218c8c5fe8fa78bc3753dbef.png34894B
-rw-r--r--content/compnet-notes/Network_ overview/b7ac2763ed0fea80dab306f88fbec76d.png31919B
-rw-r--r--content/compnet-notes/Network_ overview/index.md22L
-rw-r--r--content/compnet-notes/Network_ providing service/06e48388142f4d221d9da4a465963447.png40298B
-rw-r--r--content/compnet-notes/Network_ providing service/1035749358031d678c1264c845d5eaa4.png95169B
-rw-r--r--content/compnet-notes/Network_ providing service/1b871ffc441fa461aab9632a90952296.png69563B
-rw-r--r--content/compnet-notes/Network_ providing service/4180db441cdea253eb552b39e9116955.png30323B
-rw-r--r--content/compnet-notes/Network_ providing service/88d5dbd2d37f003fb914f703360d0dab.png73718B
-rw-r--r--content/compnet-notes/Network_ providing service/8aa004b3567888a8208933820d2c999c.png82088B
-rw-r--r--content/compnet-notes/Network_ providing service/cfaae45719ac155eb0b807eba95527a3.png50542B
-rw-r--r--content/compnet-notes/Network_ providing service/index.md87L
-rw-r--r--content/compnet-notes/Network_ routing/01fa6d1e957a499ffa8f1941a6d59d59.png118019B
-rw-r--r--content/compnet-notes/Network_ routing/1d4ae13f6dc2207b606de35707c729b5.png181114B
-rw-r--r--content/compnet-notes/Network_ routing/6c186bbc88a8d4c2a2549881d5024f2b.png114219B
-rw-r--r--content/compnet-notes/Network_ routing/index.md36L
-rw-r--r--content/compnet-notes/Overview/143cf1f67448a436383fca24f5ea75f7.png61689B
-rw-r--r--content/compnet-notes/Overview/c8050940fc41972164af6d5b72ec210d.png31734B
-rw-r--r--content/compnet-notes/Overview/f7f49be91a74e710095beef7affd4192.png25058B
-rw-r--r--content/compnet-notes/Overview/index.md40L
-rw-r--r--content/compnet-notes/Physical_ Basis for data communication.md29L
-rw-r--r--content/compnet-notes/Physical_ Modulation & multiplexing/72dfc9990b7c1bdb124208548eb5f685.png66138B
-rw-r--r--content/compnet-notes/Physical_ Modulation & multiplexing/ceb6c8506c364cf174492fdd99486e90.png105733B
-rw-r--r--content/compnet-notes/Physical_ Modulation & multiplexing/f16030d6f761fab83e787e0b8cde9a10.png128336B
-rw-r--r--content/compnet-notes/Physical_ Modulation & multiplexing/index.md55L
-rw-r--r--content/compnet-notes/Physical_ Transmission Media/19aec223ac0a89acb099e43fc54a5f81.png57637B
-rw-r--r--content/compnet-notes/Physical_ Transmission Media/e0011b2050f029f9bede6ced65d24f75.png48259B
-rw-r--r--content/compnet-notes/Physical_ Transmission Media/index.md58L
-rw-r--r--content/compnet-notes/Shit I don_t remember and need to remember/0d607eb86383a2cecbd634362a49b6bf.png135917B
-rw-r--r--content/compnet-notes/Shit I don_t remember and need to remember/10a9cfd0083fb618af2e138d0c2dfc76.png202883B
-rw-r--r--content/compnet-notes/Shit I don_t remember and need to remember/3a6967e6a4521f177a8f862eba6dae10.png299712B
-rw-r--r--content/compnet-notes/Shit I don_t remember and need to remember/9253669c7b8abd0a54ddf46bd36e7b22.png16927B
-rw-r--r--content/compnet-notes/Shit I don_t remember and need to remember/dbdb0facb18bcae7b06997c55ac9c6f9.png39995B
-rw-r--r--content/compnet-notes/Shit I don_t remember and need to remember/f4d241c05d2cc775bdb74814258ce4f3.png107218B
-rw-r--r--content/compnet-notes/Shit I don_t remember and need to remember/index.md26L
-rw-r--r--content/compnet-notes/Transport_ elements of transport protocols/7ed3a24108f8c995218a9102a639cf47.png65362B
-rw-r--r--content/compnet-notes/Transport_ elements of transport protocols/c6172285cec67f33fb8c2039e310b004.png155701B
-rw-r--r--content/compnet-notes/Transport_ elements of transport protocols/d9c9078b869365c6b6a763b48972949d.png44556B
-rw-r--r--content/compnet-notes/Transport_ elements of transport protocols/index.md99L
-rw-r--r--content/compnet-notes/Transport_ internet transport protocols/8089dda42e4082b63932c5189770993a.png31735B
-rw-r--r--content/compnet-notes/Transport_ internet transport protocols/a151cbc9fbc2f68b138f6c45c4008a83.png183329B
-rw-r--r--content/compnet-notes/Transport_ internet transport protocols/c062aabb9720d559668e09f9a9c6fb4c.png84701B
-rw-r--r--content/compnet-notes/Transport_ internet transport protocols/index.md37L
-rw-r--r--content/compnet-notes/Transport_ overview.md22L
-rw-r--r--content/compnet-notes/_index.md68L
-rw-r--r--content/compthink-notes/Algorithms/12aad5b5a9912ccca9e0190e5cc2f911.png21857B
-rw-r--r--content/compthink-notes/Algorithms/index.md40L
-rw-r--r--content/compthink-notes/Big O Notation.md47L
-rw-r--r--content/compthink-notes/Binary search.md37L
-rw-r--r--content/compthink-notes/Bubble sort.md20L
-rw-r--r--content/compthink-notes/Dijkstra_s algorithm/10c18b7eda75d354a80a0da5cba48ee6.png121238B
-rw-r--r--content/compthink-notes/Dijkstra_s algorithm/54fc0ba4872f66721aa476105989c3a4.png54619B
-rw-r--r--content/compthink-notes/Dijkstra_s algorithm/bbadc5fc82170d9966cb2e1052d45b3a.png46797B
-rw-r--r--content/compthink-notes/Dijkstra_s algorithm/index.md23L
-rw-r--r--content/compthink-notes/Graphs/20ea83217532edc5fd09f38ca92efee7.png24772B
-rw-r--r--content/compthink-notes/Graphs/index.md41L
-rw-r--r--content/compthink-notes/Greedy technique.md25L
-rw-r--r--content/compthink-notes/Kruskal_s Algorithm.md15L
-rw-r--r--content/compthink-notes/Linear Search.md23L
-rw-r--r--content/compthink-notes/Merge sort.md14L
-rw-r--r--content/compthink-notes/Paths/d3b66b27d68752421b0281c6ab69fcff.png27956B
-rw-r--r--content/compthink-notes/Paths/index.md17L
-rw-r--r--content/compthink-notes/Prim_s algorithm/7d5925bbe23e06f7e258c970f3c7c0e8.gif526309B
-rw-r--r--content/compthink-notes/Prim_s algorithm/index.md21L
-rw-r--r--content/compthink-notes/Quicksort.md27L
-rw-r--r--content/compthink-notes/Search algorithms.md10L
-rw-r--r--content/compthink-notes/Sorting algorithms.md28L
-rw-r--r--content/compthink-notes/Symbols of a flowchart/51c7ed7e4c652e7d4fe14e86a03c77f7.png339957B
-rw-r--r--content/compthink-notes/Symbols of a flowchart/index.md5L
-rw-r--r--content/compthink-notes/Types of graphs/01e7a5b2f0ddddef838882b31e14bb0c.png29609B
-rw-r--r--content/compthink-notes/Types of graphs/1d51452f58935b1fa6c2b9c02f2c2a14.png10360B
-rw-r--r--content/compthink-notes/Types of graphs/46f1af0e00eb8d6d76b8a68fa5789360.png10777B
-rw-r--r--content/compthink-notes/Types of graphs/5599e893bd5d381f3346ebe72a7070cb.png9847B
-rw-r--r--content/compthink-notes/Types of graphs/73f28abacce4a7c95766a5908690328e.png13983B
-rw-r--r--content/compthink-notes/Types of graphs/955ccf90835ef4f55efc5af6d3a0cdc1.png21163B
-rw-r--r--content/compthink-notes/Types of graphs/aecb0a5cf2b4d7b44991d715d6f8fe77.png19043B
-rw-r--r--content/compthink-notes/Types of graphs/c39fbee31a32652e49b69479cccda233.png35436B
-rw-r--r--content/compthink-notes/Types of graphs/f9222403d65bcae110253413dc91d4d6.png13010B
-rw-r--r--content/compthink-notes/Types of graphs/index.md27L
-rw-r--r--content/compthink-notes/_index.md22L
-rw-r--r--content/computer-network-security/Lecture 10_ Web attacks.md120L
-rw-r--r--content/computer-network-security/Lecture 11_ Web attacks on user.md81L
-rw-r--r--content/computer-network-security/Lecture 12_ advanced exploitation/a8b8f5828a6544ce9aaf4bb248e1a6b1.png136559B
-rw-r--r--content/computer-network-security/Lecture 12_ advanced exploitation/index.md157L
-rw-r--r--content/computer-network-security/Lecture 13_ advanced exploitation 2.md38L
-rw-r--r--content/computer-network-security/Lecture 14_ Intrusion Detection Systems (IDS)/3dd38ed3705348899b10d823c06f5ee1.png110929B
-rw-r--r--content/computer-network-security/Lecture 14_ Intrusion Detection Systems (IDS)/index.md83L
-rw-r--r--content/computer-network-security/Lecture 15_ Cryptography.md135L
-rw-r--r--content/computer-network-security/Lecture 1_ Intro & History.md48L
-rw-r--r--content/computer-network-security/Lecture 2_ Network security 1/18dd957a839c4df9b6cbecc70d269bef.png313902B
-rw-r--r--content/computer-network-security/Lecture 2_ Network security 1/413cf564563d438c80abc2d9135fd641.png232814B
-rw-r--r--content/computer-network-security/Lecture 2_ Network security 1/791cc471faee4e3488b01afb9f26d5da.png210369B
-rw-r--r--content/computer-network-security/Lecture 2_ Network security 1/e43def9baa8f425fb0a386a22fef03f4.png359122B
-rw-r--r--content/computer-network-security/Lecture 2_ Network security 1/index.md98L
-rw-r--r--content/computer-network-security/Lecture 5_ application security - simple attacks.md104L
-rw-r--r--content/computer-network-security/Lecture 6_ assembly, shellcode exploits.md208L
-rw-r--r--content/computer-network-security/Lecture 7_ exploitation techniques.md189L
-rw-r--r--content/computer-network-security/Lecture 8_ Defenses.md38L
-rw-r--r--content/computer-network-security/Lecture 9_ Web security.md138L
-rw-r--r--content/computer-network-security/_index.md22L
-rw-r--r--content/computer-network-security/lecture-3-tcp/21511972416148b08947007ad47a3965.png129071B
-rw-r--r--content/computer-network-security/lecture-3-tcp/4217be92e89e453e9df657e8e472a9d3.png109301B
-rw-r--r--content/computer-network-security/lecture-3-tcp/501ae3d4695e4f028e5a784eb2925f14.png178740B
-rw-r--r--content/computer-network-security/lecture-3-tcp/62ecbd0a8d0f4c728cfe66fcbd6b030f.png274682B
-rw-r--r--content/computer-network-security/lecture-3-tcp/937f86dc85164555ab04c8b036c386b1.png151233B
-rw-r--r--content/computer-network-security/lecture-3-tcp/f470bb253e8b4e9184e3553dca4e5e43.png60427B
-rw-r--r--content/computer-network-security/lecture-3-tcp/index.md189L
-rw-r--r--content/computer-network-security/lecture-4-dos/13862e9db6c5478da0651c1839839421.png301228B
-rw-r--r--content/computer-network-security/lecture-4-dos/2b17c1d086fe4b9ba90e672ebc4e41e2.png148913B
-rw-r--r--content/computer-network-security/lecture-4-dos/bf473146f09843ffad9c2d3600c2090d.png134574B
-rw-r--r--content/computer-network-security/lecture-4-dos/index.md108L
-rw-r--r--content/cpp-notes/Abstraction.md7L
-rw-r--r--content/cpp-notes/Advice for programming in C++.md28L
-rw-r--r--content/cpp-notes/Basic architecture & making a program/0ab6636bda3549b4a64812acc2481f5a.png4963B
-rw-r--r--content/cpp-notes/Basic architecture & making a program/d1fed7a52380407e96ccadb9a7351bc1.png3443B
-rw-r--r--content/cpp-notes/Basic architecture & making a program/index.md21L
-rw-r--r--content/cpp-notes/Basic functionality.md81L
-rw-r--r--content/cpp-notes/Constants in C++.md11L
-rw-r--r--content/cpp-notes/Declarations, definitions, init.md26L
-rw-r--r--content/cpp-notes/Enumerations.md30L
-rw-r--r--content/cpp-notes/Functions.md54L
-rw-r--r--content/cpp-notes/Glossary.md52L
-rw-r--r--content/cpp-notes/Grammars.md24L
-rw-r--r--content/cpp-notes/Header files.md12L
-rw-r--r--content/cpp-notes/Modular programming/6d5dc15c08d82af46e93fec41ec22f28.png26675B
-rw-r--r--content/cpp-notes/Modular programming/index.md91L
-rw-r--r--content/cpp-notes/Namespaces.md18L
-rw-r--r--content/cpp-notes/Operator overloading.md27L
-rw-r--r--content/cpp-notes/Randomness.md25L
-rw-r--r--content/cpp-notes/Recursion.md89L
-rw-r--r--content/cpp-notes/Scope.md15L
-rw-r--r--content/cpp-notes/Separate compilation.md67L
-rw-r--r--content/cpp-notes/The Standard Library.md101L
-rw-r--r--content/cpp-notes/Tokens.md65L
-rw-r--r--content/cpp-notes/Types.md11L
-rw-r--r--content/cpp-notes/Variable types & their operators/b80694855519b22b77375e2df16835bd.png170376B
-rw-r--r--content/cpp-notes/Variable types & their operators/index.md5L
-rw-r--r--content/cpp-notes/_index.md26L
-rw-r--r--content/databases-notes/Databases.apkg12632B
-rw-r--r--content/databases-notes/_index.md23L
-rw-r--r--content/databases-notes/aggregations.md31L
-rw-r--r--content/databases-notes/conceptual-to-relational-models.md73L
-rw-r--r--content/databases-notes/database-application-programming/index.md175L
-rw-r--r--content/databases-notes/database-application-programming/jpa-orm-example.png54589B
-rw-r--r--content/databases-notes/database-application-programming/sql-types-to-java.png55620B
-rw-r--r--content/databases-notes/database-application-programming/using-database-tech.png50664B
-rw-r--r--content/databases-notes/database-design-conceptual-models/er-diagram.png94516B
-rw-r--r--content/databases-notes/database-design-conceptual-models/er-symbols-1.png84132B
-rw-r--r--content/databases-notes/database-design-conceptual-models/er-symbols-2.png54946B
-rw-r--r--content/databases-notes/database-design-conceptual-models/index.md159L
-rw-r--r--content/databases-notes/database-design-conceptual-models/is-a-example.png44284B
-rw-r--r--content/databases-notes/database-design-conceptual-models/relationship-set-example.png23563B
-rw-r--r--content/databases-notes/example-determining-keys.png83246B
-rw-r--r--content/databases-notes/introduction/entity-relationship-model.png77086B
-rw-r--r--content/databases-notes/introduction/index.md110L
-rw-r--r--content/databases-notes/joins.md18L
-rw-r--r--content/databases-notes/kind-of-a-syllabus.md102L
-rw-r--r--content/databases-notes/order-by.md13L
-rw-r--r--content/databases-notes/relational-normal-forms/example-of-checking-bcnf.png55355B
-rw-r--r--content/databases-notes/relational-normal-forms/example-to-check-fd.png70751B
-rw-r--r--content/databases-notes/relational-normal-forms/fd-table-example.png20299B
-rw-r--r--content/databases-notes/relational-normal-forms/index.md315L
-rw-r--r--content/databases-notes/sql-overview.md97L
-rw-r--r--content/databases-notes/the-relational-model/database-schema-tree.png25434B
-rw-r--r--content/databases-notes/the-relational-model/index.md197L
-rw-r--r--content/databases-notes/transactions/index.md301L
-rw-r--r--content/databases-notes/transactions/sql-92-isolation-levels.png38837B
-rw-r--r--content/databases-notes/union-conditionals.md29L
-rw-r--r--content/distributed-algorithms-notes/_index.md12L
-rw-r--r--content/distributed-algorithms-notes/anonymous-networks.md112L
-rw-r--r--content/distributed-algorithms-notes/election-algorithms.md219L
-rw-r--r--content/distributed-algorithms-notes/fault-tolerance.md100L
-rw-r--r--content/distributed-algorithms-notes/introduction/index.md157L
-rw-r--r--content/distributed-algorithms-notes/introduction/vector-clock.png60197B
-rw-r--r--content/distributed-algorithms-notes/routing.md158L
-rw-r--r--content/distributed-algorithms-notes/termination-detection-garbage-collection.md153L
-rw-r--r--content/distributed-algorithms-notes/waves-deadlock-detection/index.md155L
-rw-r--r--content/distributed-algorithms-notes/waves-deadlock-detection/wait-for-graph.png45688B
-rw-r--r--content/dsa-notes/Activity selection.md26L
-rw-r--r--content/dsa-notes/Algorithms - general.md38L
-rw-r--r--content/dsa-notes/Course information.md14L
-rw-r--r--content/dsa-notes/Fibonacci numbers.md15L
-rw-r--r--content/dsa-notes/Greedy algorithms.md18L
-rw-r--r--content/dsa-notes/Heapsort.md46L
-rw-r--r--content/dsa-notes/Huffman codes/17f4bc951d880b7d2ef5d08a4480d254.png27458B
-rw-r--r--content/dsa-notes/Huffman codes/450eb15212318b83ae0db5f6ef700e4e.png58312B
-rw-r--r--content/dsa-notes/Huffman codes/a5ed3f890b17603f71c18a197523fbae.png48521B
-rw-r--r--content/dsa-notes/Huffman codes/b135949e77632135c4030b62d87c7b90.png17768B
-rw-r--r--content/dsa-notes/Huffman codes/c9c5e43a5e315bd28e089e69355a204f.png58240B
-rw-r--r--content/dsa-notes/Huffman codes/f2219781d767bfb5463d415c5c4db2c5.png18109B
-rw-r--r--content/dsa-notes/Huffman codes/index.md41L
-rw-r--r--content/dsa-notes/Insertion sort/932e59f54609b01a4417c1f95607da25.png24640B
-rw-r--r--content/dsa-notes/Insertion sort/index.md37L
-rw-r--r--content/dsa-notes/Knapsack01.md54L
-rw-r--r--content/dsa-notes/Linear-time algorithms.md36L
-rw-r--r--content/dsa-notes/Linked list/4d225befe58ebd605f00cc9d54d9f6bc.png15887B
-rw-r--r--content/dsa-notes/Linked list/bd3426408c31dd977bbc9a0dd9849f94.png15681B
-rw-r--r--content/dsa-notes/Linked list/index.md21L
-rw-r--r--content/dsa-notes/Queue.md28L
-rw-r--r--content/dsa-notes/Quicksort/e1298687147a544ae49d5c84761abf9d.png21909B
-rw-r--r--content/dsa-notes/Quicksort/index.md27L
-rw-r--r--content/dsa-notes/Shit I don_t remember but should (midterm edition).md40L
-rw-r--r--content/dsa-notes/Stack.md12L
-rw-r--r--content/dsa-notes/_index.md49L
-rw-r--r--content/dsa-notes/binary-search-avl-trees.md101L
-rw-r--r--content/dsa-notes/dijkstra-s-algorithm.md38L
-rw-r--r--content/dsa-notes/dynamic-programming.md13L
-rw-r--r--content/dsa-notes/fractional-knapsack.md49L
-rw-r--r--content/dsa-notes/hashing.md50L
-rw-r--r--content/dsa-notes/longest-common-subsequence.md38L
-rw-r--r--content/dsa-notes/max-subarray.md46L
-rw-r--r--content/dsa-notes/merge-sort.md85L
-rw-r--r--content/dsa-notes/rod-cutting.md84L
-rw-r--r--content/dsa-notes/sorting-algorithms.md47L
-rw-r--r--content/equational-notes/Booleans as lambda terms.md100L
-rw-r--r--content/equational-notes/Famous lambda calculus terms.md14L
-rw-r--r--content/equational-notes/Fixed point combinators.md16L
-rw-r--r--content/equational-notes/Functional programming.md12L
-rw-r--r--content/equational-notes/Haskell.md37L
-rw-r--r--content/equational-notes/Keywords.md15L
-rw-r--r--content/equational-notes/Lambda terms/6b229883cf977b73b10c370d2cf2bca9.png9358B
-rw-r--r--content/equational-notes/Lambda terms/b06d6359ad899d2f43b675ff8530866d.png9053B
-rw-r--r--content/equational-notes/Lambda terms/index.md71L
-rw-r--r--content/equational-notes/List.md21L
-rw-r--r--content/equational-notes/Natural numbers as lambda terms.md45L
-rw-r--r--content/equational-notes/Normal form.md39L
-rw-r--r--content/equational-notes/Pair.md16L
-rw-r--r--content/equational-notes/Recursion.md29L
-rw-r--r--content/equational-notes/Strategies/8769d17d9ad697b4387a249a5acf9f32.png242364B
-rw-r--r--content/equational-notes/Strategies/index.md68L
-rw-r--r--content/equational-notes/Weak head normal form.md16L
-rw-r--r--content/equational-notes/_index.md48L
-rw-r--r--content/hci-notes/Human-Computer-Interaction.apkg5740B
-rw-r--r--content/hci-notes/_index.md40L
-rw-r--r--content/hci-notes/designing-for-differences/ergonomic-keyboards.png309693B
-rw-r--r--content/hci-notes/designing-for-differences/index.md64L
-rw-r--r--content/hci-notes/normans-design-principles.md27L
-rw-r--r--content/hci-notes/personas-scenarios-and-use-cases.md106L
-rw-r--r--content/hci-notes/prototypes/3-stages-prototyping.png32657B
-rw-r--r--content/hci-notes/prototypes/index.md66L
-rw-r--r--content/hci-notes/usability-principles.md35L
-rw-r--r--content/hci-notes/user-experience-elements.md41L
-rw-r--r--content/hci-notes/webpage-design.md37L
-rw-r--r--content/history-science-notes/Key concepts summary.md105L
-rw-r--r--content/history-science-notes/Lecture 1 - Prehistory of computing.md43L
-rw-r--r--content/history-science-notes/Lecture 2.md64L
-rw-r--r--content/history-science-notes/Lecture 3.md50L
-rw-r--r--content/history-science-notes/Lecture 4.md88L
-rw-r--r--content/history-science-notes/Lecture 5.md48L
-rw-r--r--content/history-science-notes/Lecture 6.md73L
-rw-r--r--content/history-science-notes/Lecture 7.md32L
-rw-r--r--content/history-science-notes/_index.md16L
-rw-r--r--content/hwsec-notes/_index.md13L
-rw-r--r--content/hwsec-notes/cpus.md169L
-rw-r--r--content/hwsec-notes/defending-firmware.md47L
-rw-r--r--content/hwsec-notes/dram-physical-memory.md114L
-rw-r--r--content/hwsec-notes/embedded-systems/i2c-electrical-signal.png53593B
-rw-r--r--content/hwsec-notes/embedded-systems/index.md164L
-rw-r--r--content/hwsec-notes/embedded-systems/spi-multi-peripherals.png195408B
-rw-r--r--content/hwsec-notes/embedded-systems/spi-signal.png86538B
-rw-r--r--content/hwsec-notes/embedded-systems/uart-signal.png49438B
-rw-r--r--content/hwsec-notes/exploitation-for-embedded-systems/aapcs.png263806B
-rw-r--r--content/hwsec-notes/exploitation-for-embedded-systems/index.md144L
-rw-r--r--content/hwsec-notes/exploitation-for-embedded-systems/pmsav6-bits-table.png154591B
-rw-r--r--content/hwsec-notes/exploitation-for-embedded-systems/xpsr.png85900B
-rw-r--r--content/hwsec-notes/firmware-analysis-rehosting.md47L
-rw-r--r--content/hwsec-notes/firmware.md92L
-rw-r--r--content/hwsec-notes/side-channel-analysis-fault-injection.md31L
-rw-r--r--content/is-notes/_index.md126L
-rw-r--r--content/is-notes/assessment-info.md46L
-rw-r--r--content/is-notes/decision-making.png360102B
-rw-r--r--content/is-notes/ethics.md39L
-rw-r--r--content/is-notes/logical-agents/boolean-satisfiability.png53274B
-rw-r--r--content/is-notes/logical-agents/exist-instant.png20206B
-rw-r--r--content/is-notes/logical-agents/index.md456L
-rw-r--r--content/is-notes/logical-agents/logical-rewriting-rules.png102523B
-rw-r--r--content/is-notes/logical-agents/sound-rules-inference.png26188B
-rw-r--r--content/is-notes/logical-agents/univ-instant.png15701B
-rw-r--r--content/is-notes/machine-learning/3d-hyperplane.png60494B
-rw-r--r--content/is-notes/machine-learning/activation-functions.png69435B
-rw-r--r--content/is-notes/machine-learning/autoencoder-architecture.png137066B
-rw-r--r--content/is-notes/machine-learning/backpropagation-calculation.png46161B
-rw-r--r--content/is-notes/machine-learning/backpropagation.png47526B
-rw-r--r--content/is-notes/machine-learning/bayes-calculation.png47772B
-rw-r--r--content/is-notes/machine-learning/cross-validation.png41393B
-rw-r--r--content/is-notes/machine-learning/curve-fitting.png20865B
-rw-r--r--content/is-notes/machine-learning/derivative-rules.png206555B
-rw-r--r--content/is-notes/machine-learning/design-matrix.png100969B
-rw-r--r--content/is-notes/machine-learning/error-graph.png25088B
-rw-r--r--content/is-notes/machine-learning/error-surface.png227921B
-rw-r--r--content/is-notes/machine-learning/feature-model-space.png45915B
-rw-r--r--content/is-notes/machine-learning/feature-space.png87091B
-rw-r--r--content/is-notes/machine-learning/feedforward.png72580B
-rw-r--r--content/is-notes/machine-learning/index.md308L
-rw-r--r--content/is-notes/machine-learning/knn.png73969B
-rw-r--r--content/is-notes/machine-learning/loss-plot.png27673B
-rw-r--r--content/is-notes/machine-learning/loss-surface.png133266B
-rw-r--r--content/is-notes/machine-learning/ml-vs-dl.png72826B
-rw-r--r--content/is-notes/machine-learning/neurons-vs-nn.png85568B
-rw-r--r--content/is-notes/machine-learning/perceptron.png28058B
-rw-r--r--content/is-notes/machine-learning/pretraining.png81365B
-rw-r--r--content/is-notes/philosophy.md45L
-rw-r--r--content/is-notes/probability-uncertainty/bayesian-topology.png23499B
-rw-r--r--content/is-notes/probability-uncertainty/fuzzy-composition.png39563B
-rw-r--r--content/is-notes/probability-uncertainty/index.md124L
-rw-r--r--content/is-notes/probability-uncertainty/modifiers-hedges.png8031B
-rw-r--r--content/is-notes/rational-agents/environment-types.png29438B
-rw-r--r--content/is-notes/rational-agents/index.md74L
-rw-r--r--content/is-notes/state-space-repr-intro.md25L
-rw-r--r--content/is-notes/state-space-search/games-chance.png36882B
-rw-r--r--content/is-notes/state-space-search/index.md226L
-rw-r--r--content/is-notes/state-space-search/search-alg-summary.png40492B
-rw-r--r--content/lin-algebra-notes/_index.md56L
-rw-r--r--content/lin-algebra-notes/applications-to-computer-graphics/graphics-coordinate-matrix.png25694B
-rw-r--r--content/lin-algebra-notes/applications-to-computer-graphics/index.md36L
-rw-r--r--content/lin-algebra-notes/applications-to-computer-graphics/perspective-projection-diagram.png60836B
-rw-r--r--content/lin-algebra-notes/applications-to-computer-graphics/typical-transformations.png25507B
-rw-r--r--content/lin-algebra-notes/applications-to-computer-graphics/vector-letter-n.png16769B
-rw-r--r--content/lin-algebra-notes/eigenvectors-eigenvalues/determinant-geometric-diagram.png26188B
-rw-r--r--content/lin-algebra-notes/eigenvectors-eigenvalues/index.md64L
-rw-r--r--content/lin-algebra-notes/introduction/graph-example.png15437B
-rw-r--r--content/lin-algebra-notes/introduction/index.md128L
-rw-r--r--content/lin-algebra-notes/intuitive-guide-to-linear-algebra-notes.md22L
-rw-r--r--content/lin-algebra-notes/linear-transformations/geo-contract-shears.png115357B
-rw-r--r--content/lin-algebra-notes/linear-transformations/geo-projections.png38053B
-rw-r--r--content/lin-algebra-notes/linear-transformations/geo-reflections.png103558B
-rw-r--r--content/lin-algebra-notes/linear-transformations/index.md47L
-rw-r--r--content/lin-algebra-notes/matrix-operations.md85L
-rw-r--r--content/lin-algebra-notes/orthogonality-least-squares.md104L
-rw-r--r--content/lin-algebra-notes/solution-sets-of-linear-systems.md48L
-rw-r--r--content/lin-algebra-notes/symmetric-matrices.md32L
-rw-r--r--content/lin-algebra-notes/vector-spaces.md47L
-rw-r--r--content/logic-modelling-notes/The one-page cheat sheet.md55L
-rw-r--r--content/logic-modelling-notes/_index.md57L
-rw-r--r--content/logic-modelling-notes/decidability-and-undecidability.md73L
-rw-r--r--content/logic-modelling-notes/definability-and-undefinability-results/expressible-frame-properties.png45692B
-rw-r--r--content/logic-modelling-notes/definability-and-undefinability-results/index.md67L
-rw-r--r--content/logic-modelling-notes/definability-and-undefinability-results/model-cardinality-definition.png18942B
-rw-r--r--content/logic-modelling-notes/definability-and-undefinability-results/reachability-is-undefinable.png18941B
-rw-r--r--content/logic-modelling-notes/definability-and-undefinability-results/theorem-for-reachability.png18134B
-rw-r--r--content/logic-modelling-notes/definability-and-undefinability-results/undefinability-results-overview.png30679B
-rw-r--r--content/logic-modelling-notes/first-order-logic/equality-rules.png13999B
-rw-r--r--content/logic-modelling-notes/first-order-logic/existential-elimination.png14416B
-rw-r--r--content/logic-modelling-notes/first-order-logic/existential-introduction.png13138B
-rw-r--r--content/logic-modelling-notes/first-order-logic/index.md188L
-rw-r--r--content/logic-modelling-notes/first-order-logic/universal-elimination.png10749B
-rw-r--r--content/logic-modelling-notes/first-order-logic/universal-introduction.png10795B
-rw-r--r--content/logic-modelling-notes/incompleteness-theorem.md34L
-rw-r--r--content/logic-modelling-notes/logic-modelling.apkg12109B
-rw-r--r--content/logic-modelling-notes/meta-theorems-of-predicate-logic.md40L
-rw-r--r--content/logic-modelling-notes/modal-logic/index.md59L
-rw-r--r--content/logic-modelling-notes/modal-logic/kripke-model-and-graph.png27613B
-rw-r--r--content/logic-modelling-notes/propositional-logic/and-elimination.png10752B
-rw-r--r--content/logic-modelling-notes/propositional-logic/bi-implication-elimination.png11668B
-rw-r--r--content/logic-modelling-notes/propositional-logic/bi-implication-introduction.png11085B
-rw-r--r--content/logic-modelling-notes/propositional-logic/conjunction-introduction.png9092B
-rw-r--r--content/logic-modelling-notes/propositional-logic/conjunction-negation-rule.png8939B
-rw-r--r--content/logic-modelling-notes/propositional-logic/disjunction-elimination.png11867B
-rw-r--r--content/logic-modelling-notes/propositional-logic/disjunction-introduction.png10520B
-rw-r--r--content/logic-modelling-notes/propositional-logic/falsum-elimination.png7809B
-rw-r--r--content/logic-modelling-notes/propositional-logic/go-go-proof-by-contradiction.jpg19016B
-rw-r--r--content/logic-modelling-notes/propositional-logic/hypothesis.png9874B
-rw-r--r--content/logic-modelling-notes/propositional-logic/implication-elimination.png9252B
-rw-r--r--content/logic-modelling-notes/propositional-logic/index.md93L
-rw-r--r--content/logic-modelling-notes/propositional-logic/logical-consequence.png8303B
-rw-r--r--content/logic-modelling-notes/propositional-logic/negation-elimination.png8272B
-rw-r--r--content/logic-modelling-notes/propositional-logic/negation-hypothetical-reasoning.png8831B
-rw-r--r--content/logic-modelling-notes/propositional-logic/proof-by-contradiction.png9371B
-rw-r--r--content/logic-modelling-notes/propositional-logic/truth-introduction.png7081B
-rw-r--r--content/logic-modelling-notes/sets/index.md62L
-rw-r--r--content/logic-modelling-notes/sets/induction-natural-deduction-rule.png11593B
-rw-r--r--content/logical-verification/Backward proofs/042e1ee9cd194f558fe79fd0f59857d4.png9874B
-rw-r--r--content/logical-verification/Backward proofs/1cf1941c0bd24761a12d32d17945432f.png10749B
-rw-r--r--content/logical-verification/Backward proofs/25529c12211e4d65986715e83210a531.png14416B
-rw-r--r--content/logical-verification/Backward proofs/2be50f863ace4c788b9dbe612c835bcb.png11668B
-rw-r--r--content/logical-verification/Backward proofs/3a95c65fe13f4c41a39a5fe143fa3919.png13138B
-rw-r--r--content/logical-verification/Backward proofs/3fe765a8a14e4b8db6de84bcf5d6c97a.png9092B
-rw-r--r--content/logical-verification/Backward proofs/443572833c9d4026bc04826456586a1e.png9371B
-rw-r--r--content/logical-verification/Backward proofs/50a65a98d80b4e5babf78c571487649e.png11085B
-rw-r--r--content/logical-verification/Backward proofs/5615644a2e664300a6d97325777bde3c.png8831B
-rw-r--r--content/logical-verification/Backward proofs/6463b42ec717467c82a85101441f06c8.png11867B
-rw-r--r--content/logical-verification/Backward proofs/6620aa0fda0247a78ad7e703b5a8b80c.png8939B
-rw-r--r--content/logical-verification/Backward proofs/68c840d11fe44ef29cb662c5b8ca1641.png9252B
-rw-r--r--content/logical-verification/Backward proofs/6a8c517e54014b91bc71be3cb288d803.png8272B
-rw-r--r--content/logical-verification/Backward proofs/9949541eac784432894b91cdb0dad372.png11593B
-rw-r--r--content/logical-verification/Backward proofs/a3129857d2114c8cae495ca1917c27c5.png10520B
-rw-r--r--content/logical-verification/Backward proofs/d60db12d0f7941f3baf1b81243ea2aca.png7081B
-rw-r--r--content/logical-verification/Backward proofs/d6ea36c804da4da3a1ba5be0b92d3234.png10752B
-rw-r--r--content/logical-verification/Backward proofs/e4ca711cb4bf4095806d8d7478b38b66.png7809B
-rw-r--r--content/logical-verification/Backward proofs/fb5ddc0670d14b739136cdcc6450584f.png10795B
-rw-r--r--content/logical-verification/Backward proofs/index.md133L
-rw-r--r--content/logical-verification/Basic mathematical structures.md50L
-rw-r--r--content/logical-verification/Basics.md59L
-rw-r--r--content/logical-verification/Denotational semantics.md97L
-rw-r--r--content/logical-verification/Formalizing the p-adic numbers.md25L
-rw-r--r--content/logical-verification/Forward proofs.md93L
-rw-r--r--content/logical-verification/Functional programming.md115L
-rw-r--r--content/logical-verification/Hoare Logic.md84L
-rw-r--r--content/logical-verification/Inductive predicates.md58L
-rw-r--r--content/logical-verification/Logical foundations of mathematics.md62L
-rw-r--r--content/logical-verification/Metaprogramming.md70L
-rw-r--r--content/logical-verification/Monads.md67L
-rw-r--r--content/logical-verification/Operational semantics.md258L
-rw-r--r--content/logical-verification/Rational and real numbers.md79L
-rw-r--r--content/logical-verification/_index.md76L
-rw-r--r--content/logicsets-notes/Adequate systems of connectives.md18L
-rw-r--r--content/logicsets-notes/Binary Decision Trees/87789b5b531287daa9334829aa833355.png21173B
-rw-r--r--content/logicsets-notes/Binary Decision Trees/e75abc67fcda676fa88b094faefe3d3d.png26683B
-rw-r--r--content/logicsets-notes/Binary Decision Trees/index.md40L
-rw-r--r--content/logicsets-notes/Cardinality.md25L
-rw-r--r--content/logicsets-notes/Equivalence classes.md32L
-rw-r--r--content/logicsets-notes/Equivalence relations & classes.md32L
-rw-r--r--content/logicsets-notes/Functional completeness/12e10e38c653f0dd99a23ada6e4f05a1.png25835B
-rw-r--r--content/logicsets-notes/Functional completeness/3bd83020b473511df602bc0a1820a413.png67826B
-rw-r--r--content/logicsets-notes/Functional completeness/8297585d069e3ecfc5a670e14fd18623.png54516B
-rw-r--r--content/logicsets-notes/Functional completeness/index.md79L
-rw-r--r--content/logicsets-notes/Functions.md29L
-rw-r--r--content/logicsets-notes/Logic circuits/2d9914a5e9fdb98f9ecfeedf73e8cf21.png20199B
-rw-r--r--content/logicsets-notes/Logic circuits/8a116670ff579f06b7a0f39bed1aecab.png34778B
-rw-r--r--content/logicsets-notes/Logic circuits/a69c21cea86d85910a54c75ec7ce325c.png15142B
-rw-r--r--content/logicsets-notes/Logic circuits/ac03beaec629c5878f8d0f88cf80b9c8.png21340B
-rw-r--r--content/logicsets-notes/Logic circuits/bc7bf4d10778d096738ae7e5983990dd.png50870B
-rw-r--r--content/logicsets-notes/Logic circuits/ee37d8f767487f8a4b820b686ded9d23.png77279B
-rw-r--r--content/logicsets-notes/Logic circuits/index.md23L
-rw-r--r--content/logicsets-notes/Partial orders/2eda764900f11b3ddad4f1040903a76e.png115403B
-rw-r--r--content/logicsets-notes/Partial orders/3303376e4e02317b96c25be114c24644.png36090B
-rw-r--r--content/logicsets-notes/Partial orders/5e55945abe6bf157aa776b75860a0963.png55257B
-rw-r--r--content/logicsets-notes/Partial orders/c05050e0c42af9ad30fd4c47bd1ee899.png39914B
-rw-r--r--content/logicsets-notes/Partial orders/dcc75437f5e4e97d00b4697b6bdc2468.png35741B
-rw-r--r--content/logicsets-notes/Partial orders/index.md85L
-rw-r--r--content/logicsets-notes/Predicate Logic/9732066421db3041336264c0e73649a3.png40585B
-rw-r--r--content/logicsets-notes/Predicate Logic/index.md61L
-rw-r--r--content/logicsets-notes/Propositional logic.md54L
-rw-r--r--content/logicsets-notes/Relations/22dc5693b6ce96c68d71fc69d2f9d0d8.png56276B
-rw-r--r--content/logicsets-notes/Relations/565aefaad582e4e41d23e0d0c072b464.png61824B
-rw-r--r--content/logicsets-notes/Relations/5dfd0a52a1c98207ba2d5b7cfdb10f97.png58511B
-rw-r--r--content/logicsets-notes/Relations/6e00283393a5ecb2b30c10ee0adc206a.png72625B
-rw-r--r--content/logicsets-notes/Relations/976a431a1cc75280f0fd2bca62a722da.png65727B
-rw-r--r--content/logicsets-notes/Relations/index.md47L
-rw-r--r--content/logicsets-notes/Semantic entailment/11bb7fc4feb2fffc9faa39267a68a701.png47269B
-rw-r--r--content/logicsets-notes/Semantic entailment/b0e73f3474b3ae38b7ea5452e14d53e3.png46294B
-rw-r--r--content/logicsets-notes/Semantic entailment/index.md14L
-rw-r--r--content/logicsets-notes/Universal & Existential quantification.md23L
-rw-r--r--content/logicsets-notes/_index.md35L
-rw-r--r--content/ml-notes/Deep learning/1a5455e19f984f23b9cc90fb4d99d59c.png22315B
-rw-r--r--content/ml-notes/Deep learning/1efde6bbc5484b4481db40d089140c0b.png25585B
-rw-r--r--content/ml-notes/Deep learning/45614363f80f489eb6424d1ba48915a8.png15101B
-rw-r--r--content/ml-notes/Deep learning/4f24499ecda0424abfc6b408bf663267.png25585B
-rw-r--r--content/ml-notes/Deep learning/650e25dac37b4b4db20998694f3f6146.png23450B
-rw-r--r--content/ml-notes/Deep learning/8c2398ce91ed4694abf679c536b2cf61.png18828B
-rw-r--r--content/ml-notes/Deep learning/bf4ec9fe629e41389da29c0de7efb63d.png12607B
-rw-r--r--content/ml-notes/Deep learning/e935de30948c46dfabccb5d24b5e1a5e.png49247B
-rw-r--r--content/ml-notes/Deep learning/edfac0f6027c40c9a9e012e658f54d68.png12824B
-rw-r--r--content/ml-notes/Deep learning/index.md399L
-rw-r--r--content/ml-notes/Introduction/6610df2f6a4a4d21ad34c09c3468f115.png27720B
-rw-r--r--content/ml-notes/Introduction/index.md94L
-rw-r--r--content/ml-notes/Linear models/36c6819f0f3a4a7381214b8baf48b2f1.png78596B
-rw-r--r--content/ml-notes/Linear models/610c2acbde354f9fb8e54b0a9efb4b1f.png38622B
-rw-r--r--content/ml-notes/Linear models/b08d80ef6b5241578c3d432a466db7ea.png450124B
-rw-r--r--content/ml-notes/Linear models/b149c9058e4548719393205f11b3fd74.png35034B
-rw-r--r--content/ml-notes/Linear models/f9abb2f4be3640919753fd9709e0e764.png29641B
-rw-r--r--content/ml-notes/Linear models/index.md310L
-rw-r--r--content/ml-notes/Matrix models/caf202f13ca04b06a4a3d1e9e8a3c702.png5832B
-rw-r--r--content/ml-notes/Matrix models/index.md112L
-rw-r--r--content/ml-notes/Methodology/4a756d1ddc51411cbb13957c08b20a8f.png23070B
-rw-r--r--content/ml-notes/Methodology/6fa59a4013a0431a9561c4b00b29e8b9.png19031B
-rw-r--r--content/ml-notes/Methodology/748a8a36136244d9bc6e3c5c8e4060cb.png96961B
-rw-r--r--content/ml-notes/Methodology/aba7a57e16944be7b654c26df0acae65.png15427B
-rw-r--r--content/ml-notes/Methodology/e395f5797bc3479090c5c7128b77f074.png19843B
-rw-r--r--content/ml-notes/Methodology/index.md302L
-rw-r--r--content/ml-notes/Models for sequential data/44c66910d5c84b08a5a833c3633f9595.png3011B
-rw-r--r--content/ml-notes/Models for sequential data/761f27ac323e4070bf7df80a540a6831.png28186B
-rw-r--r--content/ml-notes/Models for sequential data/82d2db6b48d4409582ac544450821b12.png16312B
-rw-r--r--content/ml-notes/Models for sequential data/92011008806443b784e5f7bc2d3b0a77.png9539B
-rw-r--r--content/ml-notes/Models for sequential data/9e5ba66c8e834fc383006a31ff012558.png23965B
-rw-r--r--content/ml-notes/Models for sequential data/e8795f123d904061a5f2ae90dfdc2c4e.png18802B
-rw-r--r--content/ml-notes/Models for sequential data/index.md123L
-rw-r--r--content/ml-notes/Probability/7ba36b211f204ba187d79d53fd4e6a97.png54254B
-rw-r--r--content/ml-notes/Probability/index.md242L
-rw-r--r--content/ml-notes/Programming reference.md223L
-rw-r--r--content/ml-notes/Reinforcement learning/c484829362004f90be2b33a92acf7fd9.png50549B
-rw-r--r--content/ml-notes/Reinforcement learning/e78427ef0d0845d0ae21e1c7857d2740.png22807B
-rw-r--r--content/ml-notes/Reinforcement learning/index.md87L
-rw-r--r--content/ml-notes/Tree models and ensembles/2b81999a96204ddeb7dc539b580b8dbb.png144204B
-rw-r--r--content/ml-notes/Tree models and ensembles/dc5bb005d60e400e9026666b704139da.png38824B
-rw-r--r--content/ml-notes/Tree models and ensembles/index.md109L
-rw-r--r--content/ml-notes/_index.md135L
-rw-r--r--content/ml-notes/formula-cheat-sheet.pdf136069B
-rw-r--r--content/ml4qs-notes/ML4QS.apkg16588B
-rw-r--r--content/ml4qs-notes/_index.md15L
-rw-r--r--content/ml4qs-notes/clustering.md46L
-rw-r--r--content/ml4qs-notes/feature-engineering.md48L
-rw-r--r--content/ml4qs-notes/handling-sensory-noise.md98L
-rw-r--r--content/ml4qs-notes/introduction-basics-of-sensory-data.md25L
-rw-r--r--content/ml4qs-notes/supervised-learning.md39L
-rw-r--r--content/networksgraphs-notes/0f4a0b89454e0d874eafae79938429a2.jpg671794B
-rw-r--r--content/networksgraphs-notes/214d9e2b0d23378e800b1449f2e28520.jpg891957B
-rw-r--r--content/networksgraphs-notes/5be17db7825abe6d50eb84d85b256ea9.jpg1060912B
-rw-r--r--content/networksgraphs-notes/7092a5efdde00ffce7b56ea19fc91056.jpg725096B
-rw-r--r--content/networksgraphs-notes/79fc463a5f36837d4858f5422fae1e57.jpg996439B
-rw-r--r--content/networksgraphs-notes/8dbc3a38e3b9c81cf9af5d58c8b3e18e.jpg908027B
-rw-r--r--content/networksgraphs-notes/Cheat sheet of stuff I always forget.md78L
-rw-r--r--content/networksgraphs-notes/Colourings.md22L
-rw-r--r--content/networksgraphs-notes/Communities/87d425bcaf98351d8984e7eb8fa5db75.png54846B
-rw-r--r--content/networksgraphs-notes/Communities/c310d078a34b26f7c74e800c66475f34.png33885B
-rw-r--r--content/networksgraphs-notes/Communities/index.md54L
-rw-r--r--content/networksgraphs-notes/Connectivity.md38L
-rw-r--r--content/networksgraphs-notes/Digraphs & orientations.md33L
-rw-r--r--content/networksgraphs-notes/Drawing graphs.md18L
-rw-r--r--content/networksgraphs-notes/Euler_ edges matter.md54L
-rw-r--r--content/networksgraphs-notes/Fundamentals.md50L
-rw-r--r--content/networksgraphs-notes/Graph representations & morphisms.md20L
-rw-r--r--content/networksgraphs-notes/Hamilton_ vertices matter/ba0b20e18d5e71412dc9848cf341f3ec.png19202B
-rw-r--r--content/networksgraphs-notes/Hamilton_ vertices matter/index.md36L
-rw-r--r--content/networksgraphs-notes/Network analysis/34c58d5a3e4dbf813a123e1c5aa35244.png81006B
-rw-r--r--content/networksgraphs-notes/Network analysis/889ea68b02076b45c13330d43ddb76ff.png85232B
-rw-r--r--content/networksgraphs-notes/Network analysis/index.md56L
-rw-r--r--content/networksgraphs-notes/Random graphs.md85L
-rw-r--r--content/networksgraphs-notes/Shortest path algorithms.md55L
-rw-r--r--content/networksgraphs-notes/The Web - PageRank.md22L
-rw-r--r--content/networksgraphs-notes/Trees.md35L
-rw-r--r--content/networksgraphs-notes/What to learn.md12L
-rw-r--r--content/networksgraphs-notes/_index.md21L
-rw-r--r--content/networksgraphs-notes/b4b87ec0ce315950a62924d62df888ee.png4048B
-rw-r--r--content/networksgraphs-notes/c431ee85c43c929032eb392cded1616a.png7925B
-rw-r--r--content/networksgraphs-notes/cae7a9358b2cbf85e1bcc52873f93106.jpg1533825B
-rw-r--r--content/networksgraphs-notes/d47c3ac0185d59d2fc5a29e17242ded0.jpg997890B
-rw-r--r--content/networksgraphs-notes/d70eea2522ce6d3a6f51a7e6d15322d7.jpg905100B
-rw-r--r--content/networksgraphs-notes/d71e93e105d62545e21d174c115bcae8.png3767B
-rw-r--r--content/os-notes/A2 Allocator/e7a83a5bb7b8d2b79b58bb44f1ea936c.png31592B
-rw-r--r--content/os-notes/A2 Allocator/index.md93L
-rw-r--r--content/os-notes/Basics of memory_ no abstraction/458fb8144ed8fbbd4f8529f5aa8aa32a.png49604B
-rw-r--r--content/os-notes/Basics of memory_ no abstraction/cc06de8ddf6b063f1bea853621c4d835.png57925B
-rw-r--r--content/os-notes/Basics of memory_ no abstraction/d7fc124e438d318abe731701af147149.png20672B
-rw-r--r--content/os-notes/Basics of memory_ no abstraction/index.md25L
-rw-r--r--content/os-notes/Deadlocks/6d1576bb6afe5fa2751e8663ef0b1e79.png79342B
-rw-r--r--content/os-notes/Deadlocks/a7241241701e69e8d77915481bf9cc40.png78064B
-rw-r--r--content/os-notes/Deadlocks/c4a7c1a80885366e5cdc38a9aca3fb38.png101936B
-rw-r--r--content/os-notes/Deadlocks/index.md92L
-rw-r--r--content/os-notes/Design issues.md51L
-rw-r--r--content/os-notes/Devices.md47L
-rw-r--r--content/os-notes/File system layout/0d30522d012c79b891b3120ed9c2f8b3.png60431B
-rw-r--r--content/os-notes/File system layout/0db1d8b55f787cdbab5a378ac5038ad0.png34303B
-rw-r--r--content/os-notes/File system layout/1ce3484b2773ce6c1c6283327e880159.png81322B
-rw-r--r--content/os-notes/File system layout/4cec0a62f74e7cce20c9970d024cf93b.png93370B
-rw-r--r--content/os-notes/File system layout/4ea0e1f1384708f15599dc2e8ac8c858.png196355B
-rw-r--r--content/os-notes/File system layout/555ca3a94b042070cc8360acf834fd98.png23893B
-rw-r--r--content/os-notes/File system layout/680ce86101ebb0f5559e3c485512297d.png46522B
-rw-r--r--content/os-notes/File system layout/9574c3243ae1aec42c16a87811967973.png41825B
-rw-r--r--content/os-notes/File system layout/989ec9c9f66e3d39587fe99eefeeb1f6.png119019B
-rw-r--r--content/os-notes/File system layout/d6e774bac420b1585709a558b8aba44f.png66745B
-rw-r--r--content/os-notes/File system layout/fc97a31fa9f8ded5eaa7caf1ad4720dc.png246207B
-rw-r--r--content/os-notes/File system layout/index.md70L
-rw-r--r--content/os-notes/Files/3830a931cb0e4b33017ef22e25f71c96.png44270B
-rw-r--r--content/os-notes/Files/7e47431605b7501bcca744b7f1330c8b.png89843B
-rw-r--r--content/os-notes/Files/e803342509f8f738d741afcea618c4cc.png254739B
-rw-r--r--content/os-notes/Files/index.md55L
-rw-r--r--content/os-notes/Interrupt Handling & Scheduling.md30L
-rw-r--r--content/os-notes/Kernels/0e624a52ade3b11abb07f9a24a963169.png77805B
-rw-r--r--content/os-notes/Kernels/2b9ac9aed621fe6db99275ca232c4ac2.png36553B
-rw-r--r--content/os-notes/Kernels/4b168ee0b75e0b83e6a2836382ad2698.png49228B
-rw-r--r--content/os-notes/Kernels/55b6743c4ad50038449a7386842f601b.png130035B
-rw-r--r--content/os-notes/Kernels/c4b6fb9769649f44cf95457e873af74d.png28953B
-rw-r--r--content/os-notes/Kernels/c67b727b70fbbe38dcdbbec5ab520c95.png39459B
-rw-r--r--content/os-notes/Kernels/d9c66553585d53ea07bf5a4bfc141b28.png101844B
-rw-r--r--content/os-notes/Kernels/index.md75L
-rw-r--r--content/os-notes/Principles of IO hardware/be015fe1d43f1123b2e111bd1bc8f36c.png91455B
-rw-r--r--content/os-notes/Principles of IO hardware/index.md60L
-rw-r--r--content/os-notes/Principles of IO software/0c612b134cd53709365f563b566a86ea.png109145B
-rw-r--r--content/os-notes/Principles of IO software/index.md52L
-rw-r--r--content/os-notes/Process management.md43L
-rw-r--r--content/os-notes/Process model/23974f8c561b0cddc2bc33aca9f237de.png196671B
-rw-r--r--content/os-notes/Process model/6e8f99942767b51c636065cbe3df0d53.png113133B
-rw-r--r--content/os-notes/Process model/9ce90ac9631400010ab118e5c8100a8c.png31250B
-rw-r--r--content/os-notes/Process model/f6c6156909b358184921daccb51cdf1c.png54729B
-rw-r--r--content/os-notes/Process model/index.md72L
-rw-r--r--content/os-notes/Race conditions & mutual exclusion/70290486387a9647f1aacc196879d382.png51096B
-rw-r--r--content/os-notes/Race conditions & mutual exclusion/8e61971770a4e43c57310ecaa0755f84.png105868B
-rw-r--r--content/os-notes/Race conditions & mutual exclusion/d5e55212031521c6b0b19606037fe5d8.png108611B
-rw-r--r--content/os-notes/Race conditions & mutual exclusion/index.md109L
-rw-r--r--content/os-notes/Reliability & Performance/9f1775d17b641473033931c7009a2fa0.png256642B
-rw-r--r--content/os-notes/Reliability & Performance/a7298bb639635540af0873ab67b18f2c.png217732B
-rw-r--r--content/os-notes/Reliability & Performance/b46b5bb2c4b52cf4be0ce975af65fb60.png106688B
-rw-r--r--content/os-notes/Reliability & Performance/bf1de095db2a876b4fc51249dbeff88f.png92351B
-rw-r--r--content/os-notes/Reliability & Performance/c306c2cc8e85ffa6074cac359f53d93a.png90629B
-rw-r--r--content/os-notes/Reliability & Performance/index.md73L
-rw-r--r--content/os-notes/Scheduling/398c403baa8dc5f07716b89ffffeb916.png217613B
-rw-r--r--content/os-notes/Scheduling/40813826aa1c77152c749b7af5e45803.png34051B
-rw-r--r--content/os-notes/Scheduling/f3c4b201c6a3c89bd40bba1da9eedef0.png36939B
-rw-r--r--content/os-notes/Scheduling/index.md92L
-rw-r--r--content/os-notes/Signal handling/039ab127aa97667446c4b511855273ca.png295515B
-rw-r--r--content/os-notes/Signal handling/index.md24L
-rw-r--r--content/os-notes/System calls/3008f702882cb6bfcab5abd16d53719a.png381234B
-rw-r--r--content/os-notes/System calls/5b26d2fb6045ae318661888ee0febe89.png151365B
-rw-r--r--content/os-notes/System calls/7398350cc1064e43b0aa996f2fa2b199.png134541B
-rw-r--r--content/os-notes/System calls/d9c7a810130c9f8fd2152d4c2c1e48b5.png54969B
-rw-r--r--content/os-notes/System calls/index.md89L
-rw-r--r--content/os-notes/The Memory Address Space/3c804f4ae4f360f7be9a2b2d47f73b67.png156102B
-rw-r--r--content/os-notes/The Memory Address Space/index.md47L
-rw-r--r--content/os-notes/Threads/68f6da63d8006625153c23148f477ac3.png506337B
-rw-r--r--content/os-notes/Threads/79ff59028342a53fae33cbd60a02dcf7.png180736B
-rw-r--r--content/os-notes/Threads/fe2bd8611012458563c85e4d08b7b87f.png98037B
-rw-r--r--content/os-notes/Threads/index.md51L
-rw-r--r--content/os-notes/Virtual memory/198c95a2a7f69c555676baa912028e4b.png162059B
-rw-r--r--content/os-notes/Virtual memory/3988f921a66ef19047b780a13ae1e66a.png175752B
-rw-r--r--content/os-notes/Virtual memory/4608c2300f7ddffc335b3ae18a963ef5.png52201B
-rw-r--r--content/os-notes/Virtual memory/4dd5cb94db2dbf5b80b56a635895825e.png40015B
-rw-r--r--content/os-notes/Virtual memory/557379a5f0c8c9909a650253e0f18be4.png81542B
-rw-r--r--content/os-notes/Virtual memory/fd03668ada38d2f73122f7619b9b343f.png38411B
-rw-r--r--content/os-notes/Virtual memory/index.md88L
-rw-r--r--content/os-notes/What is an OS_/640094eca22df17a21654aee082f8780.png169388B
-rw-r--r--content/os-notes/What is an OS_/c4fe4a6540f1d2f4165a65943a276a74.png93638B
-rw-r--r--content/os-notes/What is an OS_/cbc52110fdee2f262361bdee3d6f21ba.png105490B
-rw-r--r--content/os-notes/What is an OS_/index.md45L
-rw-r--r--content/os-notes/_index.md31L
-rw-r--r--content/os-notes/files-highlevel.md28L
-rw-r--r--content/philosophy-notes/Lecture 1 subjectivism & objectivism.md22L
-rw-r--r--content/philosophy-notes/Lecture 2 egoism, contractualism.md28L
-rw-r--r--content/philosophy-notes/Lecture 3 theories of well-being.md65L
-rw-r--r--content/philosophy-notes/Lecture 4 utilitarianism.md35L
-rw-r--r--content/philosophy-notes/Lecture 5 Kantian ethics.md18L
-rw-r--r--content/philosophy-notes/_index.md11L
-rw-r--r--content/physcomp-notes/Audio signals.md61L
-rw-r--r--content/physcomp-notes/Classification 2/41a367424533a6e08fb95638b9c2b11e.png92316B
-rw-r--r--content/physcomp-notes/Classification 2/6690bab9dc8c17cf8396b94cd09f3d6f.png46492B
-rw-r--r--content/physcomp-notes/Classification 2/9ae5328bcc3da5561497f7ac32aff1a6.png17499B
-rw-r--r--content/physcomp-notes/Classification 2/e57408d5aa6439eabd8137bda295d117.png102684B
-rw-r--r--content/physcomp-notes/Classification 2/f43f65c9be0fe3566b08e933c48e957a.png168998B
-rw-r--r--content/physcomp-notes/Classification 2/index.md67L
-rw-r--r--content/physcomp-notes/Classification/4f6a745e243088e8189c73f7eca571a0.png17246B
-rw-r--r--content/physcomp-notes/Classification/b7159d61e48e0091c9bcc952dbdd9472.png153508B
-rw-r--r--content/physcomp-notes/Classification/index.md106L
-rw-r--r--content/physcomp-notes/Control systems.md43L
-rw-r--r--content/physcomp-notes/Image processing/0fd98b013f8e2be2b21982bb51ab196d.png16622B
-rw-r--r--content/physcomp-notes/Image processing/8f49a40caa697b2f19f15994ac58ee51.png68410B
-rw-r--r--content/physcomp-notes/Image processing/ae1cea520f55cfdc0379fdf98f0651cd.png131811B
-rw-r--r--content/physcomp-notes/Image processing/index.md52L
-rw-r--r--content/physcomp-notes/Images.md19L
-rw-r--r--content/physcomp-notes/Morphological operations/5823a4727aa3da50d8f101bd342ae265.png93943B
-rw-r--r--content/physcomp-notes/Morphological operations/f29ae7fc6a951cebc39d401c516693ca.png88172B
-rw-r--r--content/physcomp-notes/Morphological operations/index.md30L
-rw-r--r--content/physcomp-notes/Neighborhood processing/069d57e32b2bfb0f851662a3d4d6bab0.png42873B
-rw-r--r--content/physcomp-notes/Neighborhood processing/6c9075b1d48e76a1b390804c138dcfe1.png28398B
-rw-r--r--content/physcomp-notes/Neighborhood processing/index.md27L
-rw-r--r--content/physcomp-notes/Pervasive computing system.md11L
-rw-r--r--content/physcomp-notes/Point processing/14678296b2a9a5e2df1e024513278322.png96999B
-rw-r--r--content/physcomp-notes/Point processing/3324add035d108efc1dc36a5adc53f9f.png31055B
-rw-r--r--content/physcomp-notes/Point processing/4f05a88f44157b44d30209a3fa3a1941.png44514B
-rw-r--r--content/physcomp-notes/Point processing/index.md38L
-rw-r--r--content/physcomp-notes/Sound processing/2f8ad86778ebb0b91e9ebc527decb0d4.png71276B
-rw-r--r--content/physcomp-notes/Sound processing/5a9081f841b448d241811917f4eea3e3.png122351B
-rw-r--r--content/physcomp-notes/Sound processing/8ecb6e39f786a6738ceaea52c1640948.png54093B
-rw-r--r--content/physcomp-notes/Sound processing/e90248e66991c5183a713e851b9fbda8.png262446B
-rw-r--r--content/physcomp-notes/Sound processing/fb0360fdcbdf2c0fa8c15ce7ddbe6670.png127776B
-rw-r--r--content/physcomp-notes/Sound processing/fe629573739f7ff022dd7c5ae666c281.png136053B
-rw-r--r--content/physcomp-notes/Sound processing/index.md89L
-rw-r--r--content/physcomp-notes/Systems engineering/76a8d624923f4b72c0bfb09fd42428a4.png74658B
-rw-r--r--content/physcomp-notes/Systems engineering/8ca002b539212b99d661276d2fd11d9f.png57407B
-rw-r--r--content/physcomp-notes/Systems engineering/index.md20L
-rw-r--r--content/physcomp-notes/_index.md18L
-rw-r--r--content/programming-multi-core-and-many-core-systems/_index.md12L
-rw-r--r--content/programming-multi-core-and-many-core-systems/exam-review-notes.md209L
-rw-r--r--content/programming-multi-core-and-many-core-systems/lecture-1.md62L
-rw-r--r--content/programming-multi-core-and-many-core-systems/lecture-2.md55L
-rw-r--r--content/programming-multi-core-and-many-core-systems/lecture-3.md39L
-rw-r--r--content/programming-multi-core-and-many-core-systems/lecture-4.md40L
-rw-r--r--content/programming-multi-core-and-many-core-systems/lecture-5.md60L
-rw-r--r--content/programming-multi-core-and-many-core-systems/lectures-gpu.md270L
-rw-r--r--content/softcont-notes/_index.md22L
-rw-r--r--content/softcont-notes/affinity-and-anti-affinity.md37L
-rw-r--r--content/softcont-notes/configmaps-secrets.md80L
-rw-r--r--content/softcont-notes/controlling-access-to-kubernetes-api.md63L
-rw-r--r--content/softcont-notes/deployment-updates.md28L
-rw-r--r--content/softcont-notes/helm.md26L
-rw-r--r--content/softcont-notes/introduction/containers-vs-vms.png111975B
-rw-r--r--content/softcont-notes/introduction/docker-engine-architecture.png146583B
-rw-r--r--content/softcont-notes/introduction/docker-image-architecture.png117005B
-rw-r--r--content/softcont-notes/introduction/index.md117L
-rw-r--r--content/softcont-notes/istio/architecture.png84147B
-rw-r--r--content/softcont-notes/istio/index.md22L
-rw-r--r--content/softcont-notes/kubernetes-architecture.md32L
-rw-r--r--content/softcont-notes/network-policies.md119L
-rw-r--r--content/softcont-notes/networking.md116L
-rw-r--r--content/softcont-notes/pod-disruption-budget.md17L
-rw-r--r--content/softcont-notes/pods-and-containers.md20L
-rw-r--r--content/softcont-notes/software-containerization.apkg14745B
-rw-r--r--content/softcont-notes/statefulset.md11L
-rw-r--r--content/softcont-notes/storage.md27L
-rw-r--r--content/softcont-notes/workload-resources-and-controllers.md33L
-rw-r--r--content/softcont-notes/yaml-syntax.md11L
-rw-r--r--content/softdesign-notes/_index.md60L
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/composite-state-diagram.png53611B
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/decision-node-notation.png10531B
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/external-state-transition.png34888B
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/final-state-notation.png8190B
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/index.md146L
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/initial-state-notation.png7525B
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/internal-state-transition.png31985B
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/orthogonal-state-diagram.png40406B
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/parallelization-node-notation.png9176B
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/simple-example.png125690B
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/submachine-state-diagram.png46302B
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/synchronization-node-notation.png8977B
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/syntax-of-transitions.png35651B
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/table-of-transition-timing.png86045B
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/terminate-node-notation.png7649B
-rw-r--r--content/softdesign-notes/modeling-behavior-state-machines/transition-diagram.png35597B
-rw-r--r--content/softdesign-notes/oo-design-patterns/adapter-diagram-1.png27949B
-rw-r--r--content/softdesign-notes/oo-design-patterns/adapter-diagram-2.png20974B
-rw-r--r--content/softdesign-notes/oo-design-patterns/chain-of-responsibility-diagram.png97859B
-rw-r--r--content/softdesign-notes/oo-design-patterns/factory-method-diagram.png120698B
-rw-r--r--content/softdesign-notes/oo-design-patterns/index.md261L
-rw-r--r--content/softdesign-notes/oo-design-patterns/observer-diagram.png93370B
-rw-r--r--content/softdesign-notes/oo-design-patterns/singleton-solution-diagram.png69491B
-rw-r--r--content/softdesign-notes/philosophy-of-software-design.md35L
-rw-r--r--content/softdesign-notes/requirements-engineering/actor-generalization.png72735B
-rw-r--r--content/softdesign-notes/requirements-engineering/actor-notations.png27368B
-rw-r--r--content/softdesign-notes/requirements-engineering/index.md160L
-rw-r--r--content/softdesign-notes/requirements-engineering/non-func-requirements.png54620B
-rw-r--r--content/softdesign-notes/requirements-engineering/requirement-notation-p1.png58739B
-rw-r--r--content/softdesign-notes/requirements-engineering/requirement-notation-p2.png91577B
-rw-r--r--content/softdesign-notes/requirements-engineering/uml-diagrams.png114739B
-rw-r--r--content/softdesign-notes/requirements-engineering/use-case-extensions.png73897B
-rw-r--r--content/softdesign-notes/requirements-engineering/use-case-notations.png31469B
-rw-r--r--content/softdesign-notes/requirements-engineering/usecase-actor-rel.png39938B
-rw-r--r--content/softdesign-notes/requirements-engineering/usecase-generalisation.png36096B
-rw-r--r--content/softdesign-notes/requirements-engineering/usecase-include-rel.png38905B
-rw-r--r--content/softdesign-notes/sequence-diagrams/alt-fragment.png9146B
-rw-r--r--content/softdesign-notes/sequence-diagrams/assert-fragment.png28509B
-rw-r--r--content/softdesign-notes/sequence-diagrams/asynchronous-message.png8576B
-rw-r--r--content/softdesign-notes/sequence-diagrams/break-fragment.png8713B
-rw-r--r--content/softdesign-notes/sequence-diagrams/combined-fragment-example.png40739B
-rw-r--r--content/softdesign-notes/sequence-diagrams/consider-fragment.png31044B
-rw-r--r--content/softdesign-notes/sequence-diagrams/critical-fragment.png45922B
-rw-r--r--content/softdesign-notes/sequence-diagrams/exchanging-messages-example-on-diagram.png51810B
-rw-r--r--content/softdesign-notes/sequence-diagrams/exchanging-messages-rules.png73804B
-rw-r--r--content/softdesign-notes/sequence-diagrams/found-message.png8528B
-rw-r--r--content/softdesign-notes/sequence-diagrams/ignore-fragment.png30167B
-rw-r--r--content/softdesign-notes/sequence-diagrams/index.md203L
-rw-r--r--content/softdesign-notes/sequence-diagrams/loop-fragment.png8853B
-rw-r--r--content/softdesign-notes/sequence-diagrams/lost-message.png8452B
-rw-r--r--content/softdesign-notes/sequence-diagrams/neg-fragment.png24529B
-rw-r--r--content/softdesign-notes/sequence-diagrams/object-creation-.png10172B
-rw-r--r--content/softdesign-notes/sequence-diagrams/object-destruction-.png8464B
-rw-r--r--content/softdesign-notes/sequence-diagrams/opt-fragment.png8464B
-rw-r--r--content/softdesign-notes/sequence-diagrams/par-fragment-.png47567B
-rw-r--r--content/softdesign-notes/sequence-diagrams/response-message.png9105B
-rw-r--r--content/softdesign-notes/sequence-diagrams/seq-fragment.png35452B
-rw-r--r--content/softdesign-notes/sequence-diagrams/sequence-diagram-example.png53307B
-rw-r--r--content/softdesign-notes/sequence-diagrams/state-invariant-diagram.png38076B
-rw-r--r--content/softdesign-notes/sequence-diagrams/strict-fragment.png27394B
-rw-r--r--content/softdesign-notes/sequence-diagrams/synchronous-message.png8554B
-rw-r--r--content/softdesign-notes/sequence-diagrams/time-consuming-message.png9234B
-rw-r--r--content/softdesign-notes/software-abstraction-modeling.md35L
-rw-r--r--content/softdesign-notes/software-design.apkg370031B
-rw-r--r--content/softdesign-notes/software-development-process/index.md66L
-rw-r--r--content/softdesign-notes/software-development-process/waterfall-dev.png37210B
-rw-r--r--content/softdesign-notes/structure-modeling/index.md173L
-rw-r--r--content/softdesign-notes/structure-modeling/uml-attribute-syntax.png43532B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-class-abstract.png48427B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-class-association-class.png38130B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-class-association-vs-regular.png85313B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-class-binary-association.png81528B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-class-composition-example.png2609B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-class-generalisation.png66743B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-class-shared-aggregation-example.png53644B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-class-ternary-association.png38364B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-class.png94166B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-data-types.png34413B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-natural-text-association-class.png94447B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-natural-text-binary-association.png67818B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-natural-text-composition.png41993B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-natural-text-generalization.png65524B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-natural-text-inheritance.png86619B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-natural-text-shared-aggregation.png78441B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-operation-parameter-notation.png45443B
-rw-r--r--content/softdesign-notes/structure-modeling/uml-operation-syntax.png50218B
-rw-r--r--content/softsec-notes/Softsec.apkg41313B
-rw-r--r--content/softsec-notes/_index.md22L
-rw-r--r--content/softsec-notes/aeg-pipeline.md14L
-rw-r--r--content/softsec-notes/aslr-brop.md42L
-rw-r--r--content/softsec-notes/buffer-overflow.md48L
-rw-r--r--content/softsec-notes/crypto.md164L
-rw-r--r--content/softsec-notes/defenses-and-bypassing-them/defenses-overview.png118311B
-rw-r--r--content/softsec-notes/defenses-and-bypassing-them/dop-example.png340099B
-rw-r--r--content/softsec-notes/defenses-and-bypassing-them/index.md230L
-rw-r--r--content/softsec-notes/format-strings.md13L
-rw-r--r--content/softsec-notes/fuzzing/index.md46L
-rw-r--r--content/softsec-notes/fuzzing/vuzzer-diagram.png297859B
-rw-r--r--content/softsec-notes/heap-overflows.md66L
-rw-r--r--content/softsec-notes/integer-overflows.md28L
-rw-r--r--content/softsec-notes/intro.md18L
-rw-r--r--content/softsec-notes/local-privilege-escalation.md31L
-rw-r--r--content/softsec-notes/shellcode.md96L
-rw-r--r--content/softsec-notes/simple-attacks.md21L
-rw-r--r--content/softsec-notes/temporal-errors.md45L
-rw-r--r--content/softsec-notes/type-confusion-cpp.md17L
-rw-r--r--content/softsec-notes/web-security/csrf-diagram.png236777B
-rw-r--r--content/softsec-notes/web-security/http-mitm-attack-diagram.png233238B
-rw-r--r--content/softsec-notes/web-security/http-request-smuggling.png198771B
-rw-r--r--content/softsec-notes/web-security/index.md345L
-rw-r--r--content/software-architecture/Architecture & quality/763b9ad1accc441f86cd948bc2e76a21.png155323B
-rw-r--r--content/software-architecture/Architecture & quality/index.md91L
-rw-r--r--content/software-architecture/Architecture design/23eb8f7cbed047d6809b00fbe3d25822.png306959B
-rw-r--r--content/software-architecture/Architecture design/380b44cc14444bb59b6d4d891d489f29.png201099B
-rw-r--r--content/software-architecture/Architecture design/42d47395d53f4c7684f4123e6bcbe80b.png143855B
-rw-r--r--content/software-architecture/Architecture design/4b5dc70b99da495abcb2a2c384d0b441.png119639B
-rw-r--r--content/software-architecture/Architecture design/93f9279778fe4e70a343a6a526348792.png145573B
-rw-r--r--content/software-architecture/Architecture design/index.md119L
-rw-r--r--content/software-architecture/Architecture representation/543e94d9807540b59fb5d808ff646387.png210721B
-rw-r--r--content/software-architecture/Architecture representation/7f091d7ea68f427298f3332e45870d4a.png135645B
-rw-r--r--content/software-architecture/Architecture representation/index.md55L
-rw-r--r--content/software-architecture/Case Study/7d0ab84b042b48cc80c6bc0b8fc8cc8a.png224919B
-rw-r--r--content/software-architecture/Case Study/index.md80L
-rw-r--r--content/software-architecture/Introduction/b785f7ab5a684a5cb9e6654d71fd00de.png49429B
-rw-r--r--content/software-architecture/Introduction/index.md74L
-rw-r--r--content/software-architecture/Requirements/02efe4c6962a45acb18af0a8190c0eba.png201385B
-rw-r--r--content/software-architecture/Requirements/9db20224d3104417a9bc0658af70d85e.png197124B
-rw-r--r--content/software-architecture/Requirements/c38c9e7dc12745b580ec4a2b3bcb60fe.png58717B
-rw-r--r--content/software-architecture/Requirements/e93dae14295c4b9ea44923fadf19695c.png173878B
-rw-r--r--content/software-architecture/Requirements/index.md84L
-rw-r--r--content/software-architecture/_index.md37L
-rw-r--r--content/stats-notes/Continuous probability distribution.md40L
-rw-r--r--content/stats-notes/Discrete probability distributions.md26L
-rw-r--r--content/stats-notes/Introduction_ Data.md62L
-rw-r--r--content/stats-notes/Probability intro.md87L
-rw-r--r--content/stats-notes/Relationships between variables/4670b5bf474343b006017ea93ea64fdb.png53567B
-rw-r--r--content/stats-notes/Relationships between variables/6de852d30c13f092f1d0954f4d21c2c6.png55785B
-rw-r--r--content/stats-notes/Relationships between variables/index.md88L
-rw-r--r--content/stats-notes/Sampling distributions & estimators.md25L
-rw-r--r--content/stats-notes/Summarising data/121a30a0247a9ef2c8d6f222df0e39ba.png92900B
-rw-r--r--content/stats-notes/Summarising data/1be3b41077a33b1704f30d44a6e6f2a3.png68720B
-rw-r--r--content/stats-notes/Summarising data/2622ba4db3e301150ce401c70344ceba.png54923B
-rw-r--r--content/stats-notes/Summarising data/353a35bb43541880822a45b4aedccc33.png137673B
-rw-r--r--content/stats-notes/Summarising data/6d7b91f79d3d9d8dfea9b17bc06a0b94.png51530B
-rw-r--r--content/stats-notes/Summarising data/c712f8daf000f5fb759e01c0e0cae513.png42687B
-rw-r--r--content/stats-notes/Summarising data/f30ee8b3f6ad23ca7a4a2967d3200a47.png58589B
-rw-r--r--content/stats-notes/Summarising data/index.md85L
-rw-r--r--content/stats-notes/Testing characteristics of samples.md82L
-rw-r--r--content/stats-notes/_index.md25L
-rw-r--r--content/stats-notes/hypothesis-testing.md136L
-rw-r--r--content/sysarch-notes/Accessing I_O devices.md20L
-rw-r--r--content/sysarch-notes/Adding_subtracting floating point values/doc.png297604B
-rw-r--r--content/sysarch-notes/Adding_subtracting floating point values/index.md12L
-rw-r--r--content/sysarch-notes/Addition & subtraction with signed integers/index.md17L
-rw-r--r--content/sysarch-notes/Addition & subtraction with signed integers/screenshot-1.png11978B
-rw-r--r--content/sysarch-notes/Addition & subtraction with signed integers/screenshot-2.png15235B
-rw-r--r--content/sysarch-notes/Addition_subtraction logic unit/a5b4b0e66c6d8e53ab1bfbcf8f5c2d49.png12185B
-rw-r--r--content/sysarch-notes/Addition_subtraction logic unit/index.md39L
-rw-r--r--content/sysarch-notes/Addition_subtraction logic unit/screenshot-51.png18323B
-rw-r--r--content/sysarch-notes/Addition_subtraction logic unit/screenshot-52.png15272B
-rw-r--r--content/sysarch-notes/Addition_subtraction logic unit/screenshot-53.png8197B
-rw-r--r--content/sysarch-notes/Addition_subtraction logic unit/screenshot-54.png12011B
-rw-r--r--content/sysarch-notes/Addition_subtraction logic unit/screenshot-55.png33142B
-rw-r--r--content/sysarch-notes/Addition_subtraction logic unit/shot.png16371B
-rw-r--r--content/sysarch-notes/Addressing modes/index.md23L
-rw-r--r--content/sysarch-notes/Addressing modes/screenshot-7.png85043B
-rw-r--r--content/sysarch-notes/Assembly.md27L
-rw-r--r--content/sysarch-notes/Basic concepts.md19L
-rw-r--r--content/sysarch-notes/Basic logic gates/circuit.gif49522B
-rw-r--r--content/sysarch-notes/Basic logic gates/index.md46L
-rw-r--r--content/sysarch-notes/Basic logic gates/screenshot-26.png13386B
-rw-r--r--content/sysarch-notes/Basic logic gates/screenshot-27.png24438B
-rw-r--r--content/sysarch-notes/Basic logic gates/screenshot-28.png12313B
-rw-r--r--content/sysarch-notes/Basic logic gates/screenshot-29.png19997B
-rw-r--r--content/sysarch-notes/Basic processing unit.md61L
-rw-r--r--content/sysarch-notes/Branch delays/index.md53L
-rw-r--r--content/sysarch-notes/Branch delays/screenshot-40.png43229B
-rw-r--r--content/sysarch-notes/Branch delays/screenshot-41.png36816B
-rw-r--r--content/sysarch-notes/Branch delays/screenshot-42.png85494B
-rw-r--r--content/sysarch-notes/Buses/index.md39L
-rw-r--r--content/sysarch-notes/Buses/screenshot-30.png33861B
-rw-r--r--content/sysarch-notes/Buses/screenshot-31.png40120B
-rw-r--r--content/sysarch-notes/Cache coherence.md61L
-rw-r--r--content/sysarch-notes/Cache memory.md35L
-rw-r--r--content/sysarch-notes/Conversion between bases.md16L
-rw-r--r--content/sysarch-notes/Counters/index.md13L
-rw-r--r--content/sysarch-notes/Counters/screenshot-3.png20535B
-rw-r--r--content/sysarch-notes/Data dependencies/index.md40L
-rw-r--r--content/sysarch-notes/Data dependencies/screenshot-4.png38039B
-rw-r--r--content/sysarch-notes/Data dependencies/screenshot-5.png58659B
-rw-r--r--content/sysarch-notes/Data dependencies/screenshot-6.png36216B
-rw-r--r--content/sysarch-notes/Data path & instructions/index.md50L
-rw-r--r--content/sysarch-notes/Data path & instructions/screenshot-8.png58008B
-rw-r--r--content/sysarch-notes/Data path & instructions/screenshot-9.png88845B
-rw-r--r--content/sysarch-notes/Decoders/index.md9L
-rw-r--r--content/sysarch-notes/Decoders/screenshot-33.png37272B
-rw-r--r--content/sysarch-notes/Direct Memory Access (DMA).md15L
-rw-r--r--content/sysarch-notes/Empirical Laws of Computing.md11L
-rw-r--r--content/sysarch-notes/Flip-Flops/index.md45L
-rw-r--r--content/sysarch-notes/Flip-Flops/screenshot-43.png26190B
-rw-r--r--content/sysarch-notes/Flip-Flops/screenshot-44.png28727B
-rw-r--r--content/sysarch-notes/Flip-Flops/screenshot-45.png18979B
-rw-r--r--content/sysarch-notes/Flip-Flops/screenshot-46.png25759B
-rw-r--r--content/sysarch-notes/Flip-Flops/screenshot-47.png26341B
-rw-r--r--content/sysarch-notes/Hardware components/1200px-Von_Neumann_Architecture.svg.png39275B
-rw-r--r--content/sysarch-notes/Hardware components/CPU.png21456B
-rw-r--r--content/sysarch-notes/Hardware components/index.md43L
-rw-r--r--content/sysarch-notes/Hardware components/screenshot-59.png26011B
-rw-r--r--content/sysarch-notes/Hardware components/screenshot-60.png39383B
-rw-r--r--content/sysarch-notes/Hardware components/screenshot-61.png29311B
-rw-r--r--content/sysarch-notes/Instruction Set Architecture.md29L
-rw-r--r--content/sysarch-notes/Instruction execution.md24L
-rw-r--r--content/sysarch-notes/Internal organisation of memory chips/index.md17L
-rw-r--r--content/sysarch-notes/Internal organisation of memory chips/screenshot-36.png64588B
-rw-r--r--content/sysarch-notes/Internal organisation of memory chips/screenshot-37.png58164B
-rw-r--r--content/sysarch-notes/Interrupts/index.md48L
-rw-r--r--content/sysarch-notes/Interrupts/screenshot-32.png38364B
-rw-r--r--content/sysarch-notes/Karnaugh Maps.md26L
-rw-r--r--content/sysarch-notes/Mapping functions.md40L
-rw-r--r--content/sysarch-notes/Memory delays/index.md22L
-rw-r--r--content/sysarch-notes/Memory delays/screenshot-38.png36191B
-rw-r--r--content/sysarch-notes/Memory hierarchy/index.md15L
-rw-r--r--content/sysarch-notes/Memory hierarchy/screenshot.png44599B
-rw-r--r--content/sysarch-notes/Memory locations & addresses.md24L
-rw-r--r--content/sysarch-notes/Memory operations & instructions.md49L
-rw-r--r--content/sysarch-notes/Memory types/index.md69L
-rw-r--r--content/sysarch-notes/Memory types/screenshot-48.png21919B
-rw-r--r--content/sysarch-notes/Memory types/screenshot-49.png10878B
-rw-r--r--content/sysarch-notes/Memory types/screenshot-50.png53551B
-rw-r--r--content/sysarch-notes/Multiplexers/index.md9L
-rw-r--r--content/sysarch-notes/Multiplexers/screenshot-34.png32683B
-rw-r--r--content/sysarch-notes/Multiplexers/screenshot-35.png11737B
-rw-r--r--content/sysarch-notes/Multiplication of signed integers/index.md70L
-rw-r--r--content/sysarch-notes/Multiplication of signed integers/screenshot-14.png22632B
-rw-r--r--content/sysarch-notes/Multiplication of signed integers/screenshot-15.png27432B
-rw-r--r--content/sysarch-notes/Multiplication of signed integers/screenshot-16.png42601B
-rw-r--r--content/sysarch-notes/Multiplication of signed integers/screenshot-17.png37876B
-rw-r--r--content/sysarch-notes/Multiplication of signed integers/screenshot-18.png21493B
-rw-r--r--content/sysarch-notes/Multiplying_dividing floats/doc.png341985B
-rw-r--r--content/sysarch-notes/Multiplying_dividing floats/index.md17L
-rw-r--r--content/sysarch-notes/Multithreading.md27L
-rw-r--r--content/sysarch-notes/Numeric representations of data types/index.md89L
-rw-r--r--content/sysarch-notes/Numeric representations of data types/screenshot-39.png33306B
-rw-r--r--content/sysarch-notes/Parallel programming.md20L
-rw-r--r--content/sysarch-notes/Performance considerations.md18L
-rw-r--r--content/sysarch-notes/Program-controlled I_O/index.md44L
-rw-r--r--content/sysarch-notes/Program-controlled I_O/screenshot-20.png36799B
-rw-r--r--content/sysarch-notes/Program-controlled I_O/screenshot-21.png40653B
-rw-r--r--content/sysarch-notes/Registers and Shift Registers/index.md16L
-rw-r--r--content/sysarch-notes/Registers and Shift Registers/screenshot-19.png23587B
-rw-r--r--content/sysarch-notes/Representation of data.md68L
-rw-r--r--content/sysarch-notes/Shared-memory multiprocessors/index.md50L
-rw-r--r--content/sysarch-notes/Shared-memory multiprocessors/screenshot-25.png66729B
-rw-r--r--content/sysarch-notes/Subroutines & the Stack/index.md47L
-rw-r--r--content/sysarch-notes/Subroutines & the Stack/screenshot-24.png170294B
-rw-r--r--content/sysarch-notes/Superscalar operation/index.md31L
-rw-r--r--content/sysarch-notes/Superscalar operation/screenshot-10.png50442B
-rw-r--r--content/sysarch-notes/Superscalar operation/screenshot-11.png53597B
-rw-r--r--content/sysarch-notes/Synthesis of logic functions/index.md54L
-rw-r--r--content/sysarch-notes/Synthesis of logic functions/screenshot-58.png61638B
-rw-r--r--content/sysarch-notes/Take notes on.md11L
-rw-r--r--content/sysarch-notes/The Basic Concept/index.md19L
-rw-r--r--content/sysarch-notes/The Basic Concept/screenshot-22.png69423B
-rw-r--r--content/sysarch-notes/The Basic Concept/screenshot-23.png108185B
-rw-r--r--content/sysarch-notes/Universal gates/index.md17L
-rw-r--r--content/sysarch-notes/Universal gates/screenshot-56.png11088B
-rw-r--r--content/sysarch-notes/Universal gates/screenshot-57.png10575B
-rw-r--r--content/sysarch-notes/Vector (SIMD) processing & GPUs.md26L
-rw-r--r--content/sysarch-notes/_index.md115L
-rw-r--r--content/sysarch-notes/positional-numbering-system.md36L
-rw-r--r--content/webtech-notes/Accessibility.md45L
-rw-r--r--content/webtech-notes/Architecture of the Web.md30L
-rw-r--r--content/webtech-notes/Client-side_ JavaScript.md53L
-rw-r--r--content/webtech-notes/Evaluation of Websites.md56L
-rw-r--r--content/webtech-notes/HTML5 & W3C.md26L
-rw-r--r--content/webtech-notes/HTTP.md94L
-rw-r--r--content/webtech-notes/Internet history & overview.md44L
-rw-r--r--content/webtech-notes/Internet protocols.md45L
-rw-r--r--content/webtech-notes/Responsive Web Design.md35L
-rw-r--r--content/webtech-notes/Searching & Search Engines/58ee7e1539ec44cd88941b2d254368b2.png17368B
-rw-r--r--content/webtech-notes/Searching & Search Engines/index.md50L
-rw-r--r--content/webtech-notes/Server-side.md41L
-rw-r--r--content/webtech-notes/_index.md15L
-rw-r--r--from_vimwiki.sed19L
-rwxr-xr-xjoplin-conversion22L
-rwxr-xr-xlocalizeimages16L
-rw-r--r--sass/_base.scss199L
-rw-r--r--sass/dark.scss79L
-rw-r--r--sass/fonts.scss55L
-rw-r--r--sass/light.scss63L
-rwxr-xr-xstatic/favicon.ico15406B
-rwxr-xr-xstatic/fonts/Noto-Sans-700/Noto-Sans-700.eot16716B
-rwxr-xr-xstatic/fonts/Noto-Sans-700/Noto-Sans-700.svg336L
-rwxr-xr-xstatic/fonts/Noto-Sans-700/Noto-Sans-700.ttf29704B
-rwxr-xr-xstatic/fonts/Noto-Sans-700/Noto-Sans-700.woff12632B
-rwxr-xr-xstatic/fonts/Noto-Sans-700/Noto-Sans-700.woff29724B
-rwxr-xr-xstatic/fonts/Noto-Sans-700italic/Noto-Sans-700italic.eot16849B
-rwxr-xr-xstatic/fonts/Noto-Sans-700italic/Noto-Sans-700italic.svg334L
-rwxr-xr-xstatic/fonts/Noto-Sans-700italic/Noto-Sans-700italic.ttf28932B
-rwxr-xr-xstatic/fonts/Noto-Sans-700italic/Noto-Sans-700italic.woff12612B
-rwxr-xr-xstatic/fonts/Noto-Sans-700italic/Noto-Sans-700italic.woff29612B
-rwxr-xr-xstatic/fonts/Noto-Sans-italic/Noto-Sans-italic.eot15864B
-rwxr-xr-xstatic/fonts/Noto-Sans-italic/Noto-Sans-italic.svg337L
-rwxr-xr-xstatic/fonts/Noto-Sans-italic/Noto-Sans-italic.ttf26644B
-rwxr-xr-xstatic/fonts/Noto-Sans-italic/Noto-Sans-italic.woff12536B
-rwxr-xr-xstatic/fonts/Noto-Sans-italic/Noto-Sans-italic.woff29572B
-rwxr-xr-xstatic/fonts/Noto-Sans-regular/Noto-Sans-regular.eot16639B
-rwxr-xr-xstatic/fonts/Noto-Sans-regular/Noto-Sans-regular.svg335L
-rwxr-xr-xstatic/fonts/Noto-Sans-regular/Noto-Sans-regular.ttf29288B
-rwxr-xr-xstatic/fonts/Noto-Sans-regular/Noto-Sans-regular.woff12840B
-rwxr-xr-xstatic/fonts/Noto-Sans-regular/Noto-Sans-regular.woff29932B
-rw-r--r--static/images/icons-192.png60887B
-rw-r--r--static/images/icons-512.png347576B
-rw-r--r--static/katex/auto-render.min.js1L
-rw-r--r--static/katex/fonts/KaTeX_AMS-Regular.ttf70936B
-rw-r--r--static/katex/fonts/KaTeX_AMS-Regular.woff36912B
-rw-r--r--static/katex/fonts/KaTeX_AMS-Regular.woff231136B
-rw-r--r--static/katex/fonts/KaTeX_Caligraphic-Bold.ttf15416B
-rw-r--r--static/katex/fonts/KaTeX_Caligraphic-Bold.woff9376B
-rw-r--r--static/katex/fonts/KaTeX_Caligraphic-Bold.woff28392B
-rw-r--r--static/katex/fonts/KaTeX_Caligraphic-Regular.ttf14908B
-rw-r--r--static/katex/fonts/KaTeX_Caligraphic-Regular.woff9148B
-rw-r--r--static/katex/fonts/KaTeX_Caligraphic-Regular.woff28248B
-rw-r--r--static/katex/fonts/KaTeX_Fraktur-Bold.ttf24400B
-rw-r--r--static/katex/fonts/KaTeX_Fraktur-Bold.woff16208B
-rw-r--r--static/katex/fonts/KaTeX_Fraktur-Bold.woff213912B
-rw-r--r--static/katex/fonts/KaTeX_Fraktur-Regular.ttf23904B
-rw-r--r--static/katex/fonts/KaTeX_Fraktur-Regular.woff15880B
-rw-r--r--static/katex/fonts/KaTeX_Fraktur-Regular.woff213668B
-rw-r--r--static/katex/fonts/KaTeX_Main-Bold.ttf59972B
-rw-r--r--static/katex/fonts/KaTeX_Main-Bold.woff35056B
-rw-r--r--static/katex/fonts/KaTeX_Main-Bold.woff229932B
-rw-r--r--static/katex/fonts/KaTeX_Main-BoldItalic.ttf42872B
-rw-r--r--static/katex/fonts/KaTeX_Main-BoldItalic.woff24500B
-rw-r--r--static/katex/fonts/KaTeX_Main-BoldItalic.woff221244B
-rw-r--r--static/katex/fonts/KaTeX_Main-Italic.ttf46028B
-rw-r--r--static/katex/fonts/KaTeX_Main-Italic.woff25352B
-rw-r--r--static/katex/fonts/KaTeX_Main-Italic.woff222076B
-rw-r--r--static/katex/fonts/KaTeX_Main-Regular.ttf68880B
-rw-r--r--static/katex/fonts/KaTeX_Main-Regular.woff37856B
-rw-r--r--static/katex/fonts/KaTeX_Main-Regular.woff232312B
-rw-r--r--static/katex/fonts/KaTeX_Math-BoldItalic.ttf42300B
-rw-r--r--static/katex/fonts/KaTeX_Math-BoldItalic.woff23980B
-rw-r--r--static/katex/fonts/KaTeX_Math-BoldItalic.woff221192B
-rw-r--r--static/katex/fonts/KaTeX_Math-Italic.ttf44484B
-rw-r--r--static/katex/fonts/KaTeX_Math-Italic.woff24668B
-rw-r--r--static/katex/fonts/KaTeX_Math-Italic.woff221668B
-rw-r--r--static/katex/fonts/KaTeX_SansSerif-Bold.ttf32588B
-rw-r--r--static/katex/fonts/KaTeX_SansSerif-Bold.woff17988B
-rw-r--r--static/katex/fonts/KaTeX_SansSerif-Bold.woff215296B
-rw-r--r--static/katex/fonts/KaTeX_SansSerif-Italic.ttf29860B
-rw-r--r--static/katex/fonts/KaTeX_SansSerif-Italic.woff17044B
-rw-r--r--static/katex/fonts/KaTeX_SansSerif-Italic.woff214484B
-rw-r--r--static/katex/fonts/KaTeX_SansSerif-Regular.ttf28708B
-rw-r--r--static/katex/fonts/KaTeX_SansSerif-Regular.woff15712B
-rw-r--r--static/katex/fonts/KaTeX_SansSerif-Regular.woff213300B
-rw-r--r--static/katex/fonts/KaTeX_Script-Regular.ttf23520B
-rw-r--r--static/katex/fonts/KaTeX_Script-Regular.woff12992B
-rw-r--r--static/katex/fonts/KaTeX_Script-Regular.woff211792B
-rw-r--r--static/katex/fonts/KaTeX_Size1-Regular.ttf11932B
-rw-r--r--static/katex/fonts/KaTeX_Size1-Regular.woff6300B
-rw-r--r--static/katex/fonts/KaTeX_Size1-Regular.woff25332B
-rw-r--r--static/katex/fonts/KaTeX_Size2-Regular.ttf11080B
-rw-r--r--static/katex/fonts/KaTeX_Size2-Regular.woff6012B
-rw-r--r--static/katex/fonts/KaTeX_Size2-Regular.woff25080B
-rw-r--r--static/katex/fonts/KaTeX_Size3-Regular.ttf7028B
-rw-r--r--static/katex/fonts/KaTeX_Size3-Regular.woff4148B
-rw-r--r--static/katex/fonts/KaTeX_Size3-Regular.woff23400B
-rw-r--r--static/katex/fonts/KaTeX_Size4-Regular.ttf10008B
-rw-r--r--static/katex/fonts/KaTeX_Size4-Regular.woff5820B
-rw-r--r--static/katex/fonts/KaTeX_Size4-Regular.woff24720B
-rw-r--r--static/katex/fonts/KaTeX_Typewriter-Regular.ttf34560B
-rw-r--r--static/katex/fonts/KaTeX_Typewriter-Regular.woff19700B
-rw-r--r--static/katex/fonts/KaTeX_Typewriter-Regular.woff216868B
-rw-r--r--static/katex/script.min.js1L
-rw-r--r--static/katex/style.min.css1L
-rw-r--r--static/likelihood-notes/.gitignore306L
-rw-r--r--static/likelihood-notes/notes.pdf224846B
-rw-r--r--static/likelihood-notes/notes.tex873L
-rw-r--r--static/manifest.json21L
-rw-r--r--static/sw.js436L
-rw-r--r--syntaxes/lean.sublime-syntax114L
-rw-r--r--syntaxes/plantuml.sublime-syntax143L
-rw-r--r--templates/base.html71L
-rw-r--r--templates/index.html35L
-rw-r--r--templates/page-math.html56L
-rw-r--r--templates/page.html39L
-rw-r--r--templates/section.html14L