
JMTAN.WORDPRESS.COM
Life in Grey | Just another student’s life.Just another student's life.
http://jmtan.wordpress.com/
Just another student's life.
http://jmtan.wordpress.com/
TODAY'S RATING
>1,000,000
Date Range
HIGHEST TRAFFIC ON
Sunday
LOAD TIME
0.5 seconds
16x16
32x32
PAGES IN
THIS WEBSITE
12
SSL
EXTERNAL LINKS
9
SITE IP
192.0.78.13
LOAD TIME
0.495 sec
SCORE
6.2
Life in Grey | Just another student’s life. | jmtan.wordpress.com Reviews
https://jmtan.wordpress.com
Just another student's life.
Parallel Composition | Life in Grey
https://jmtan.wordpress.com/2007/02/20/parallel-composition
Composite processes and handshakes →. February 20, 2007 · 1:46 pm. The parallel composition operator, , allows a new process to be made from two or more processes. The following code:. MAKE = (make- ready- MAKE). ASSEMBLE = (ready- produce- ASSEMBLE). FACTORY = (MAKE ASSEMBLE). Will result in this FACTORY diagram:. Composed processes may also be made from other composed processes, like so:. COMPANY = (FACTORY SHIPPING). Also, I just found out that LTS stands for “Labelled State Transition”.
More ciphers | Life in Grey
https://jmtan.wordpress.com/2009/09/18/more-ciphers
September 18, 2009 · 2:17 am. Here are a couple more ciphers, these are actually still in use today. Cipher, one of the first few public-key ciphers, achieves security via the factorisation problem. You’ll have to provide two large primes to generate the key-pair first. It uses the Sieve of Eratosthenes to find a random prime for the public key exponent, it’s quite time-consuming. Back to symmetric block ciphers, we have the AES. Leave a Reply Cancel reply. Enter your comment here.
Composite processes and handshakes | Life in Grey
https://jmtan.wordpress.com/2007/03/01/composite-processes-and-handshakes
New semester begins →. March 1, 2007 · 11:45 am. Composite processes and handshakes. I did badly for a FSP quiz, ironically the quiz answers came out in our tutorial also. Given two primitive processes:. P = (a- b- P). Q = (c- b- Q). What is the result of:. S1 = (P Q). S2 = (a- c- b- S2 c- a- b- S2). New semester begins →. One response to “. Composite processes and handshakes. November 10, 2008 at 4:08 am. Leave a Reply Cancel reply. Enter your comment here. Address never made public). You are commenting...
Discretisation | Life in Grey
https://jmtan.wordpress.com/2009/01/16/discretisation
Basic definitions in data mining. Frequent Pattern Analysis →. January 16, 2009 · 8:15 pm. Continuous variables can be discretised into interval ranges to reduce the number of possible values. One example of a discretisation technique is Binning. Which refers to dividing the data set into lesser chunks (called bins) and then changing each value into a single representative value, usually the mean, for each bin. Each bin contains an equal number of items. E.g. Bin 1 – [4.5, 6.5, 8.5]. Fill in your details...
Camera Systems | Life in Grey
https://jmtan.wordpress.com/2009/01/26/camera-systems
Cryptography in python →. January 26, 2009 · 7:29 pm. Any device which captures an image (e.g. the human eye, cameras) consists of 3 basic components:. Aperture – Controls the amount of light rays entering the device. Optical system(lens) – Focuses incoming light rays to converge on the screen. Screen – Captures the image using photoreceptors. When determining how the image will be formed, two questions to ask are: where does a point on the scene appear in the image, and how bright does that point appear?
TOTAL PAGES IN THIS WEBSITE
12
October | 2009 | We all live in the Metaverse
https://metaverseblog.wordpress.com/2009/10
We all live in the Metaverse. Privacy addon to public DHTs. Based on that, and defensive strategies which rely on the DHT replication strategy seems irrelevant, the figures associated are not as big as needed, even if we talk about 1 million Vuze nodes, regarding the consistent living time of a self-destruct message [currently 8 hours or more using a proxy, but I guess the. So for a while, I really thought those Unvanish guys were right, as they conclude in their paper :. And as a result, one answer is r...
Hello Metaverse ! | We all live in the Metaverse
https://metaverseblog.wordpress.com/2009/09/20/hello-world
We all live in the Metaverse. One question still struggles me… Should this blog be in french or not? Bah we’ll see :). The real question would probably be something else, like “What the hell, again a blog? 8221; Yes, and as most of the times, that’s a way for me to put my ideas, questions, projects, whatever on “paper” instead of forgetting them… And as I totally forgot how to use a pen, let’s use that black keyboard which lies in front of me a couple of hours a day. Au delà de notre univers. Jeff Moser&...
Resources | We all live in the Metaverse
https://metaverseblog.wordpress.com/resources
We all live in the Metaverse. Links and other stuff related to the posts. Vanish and related topics. Vanish : http:/ vanish.cs.washington.edu/. Unvanish : http:/ z.cs.utexas.edu/users/osa/unvanish/. Encrypted E-Mail Company Hushmail Spills to Feds : http:/ www.wired.com/threatlevel/2007/11/encrypted-e-mai/. Modern cryptography : http:/ www.queen.clara.net/pgp/art5.html. Benlog : security, privacy, transparency. Gnagnaki, Tobé's blog. Jeff Moser's adventures. The Hardware Side of Cryptography.
Quotes | We all live in the Metaverse
https://metaverseblog.wordpress.com/quotes
We all live in the Metaverse. Some quotes I particularly like about Security, Hacking,…. Steven Levy, Hackers: Heroes of the Computer Revolution, Preface. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual,. The Mentor, The Conscience of a Hacker. The Realm of Wonder.
September | 2009 | We all live in the Metaverse
https://metaverseblog.wordpress.com/2009/09
We all live in the Metaverse. Je n’ai pas eu le temps de consacrer un post à Vanish (et tout le bien que j’en pense) mais la publication récente de Unvanish m’a tellement perturbé que quelques mots autour du “comment être sûr que notre vie privée reste privée” me paraissent bienvenus. C’est le but de Vanish, fournir un mécanisme qui rendent ces informations volatiles. Et stockée sur les noeuds de DHTs publiques (OpenDHT et Vuze). En développant un client Vuze très optimisé (en empreinte mémoire et cpu) q...
Les protocoles auto-appliqués, la panacée ? Self-enforcing protocols, solution to everything ? | We all live in the Metaverse
https://metaverseblog.wordpress.com/2009/09/21/les-protocoles-auto-appliques-la-panacee-self-enforcing-protocols-solution-to-everything
We all live in the Metaverse. Les protocoles auto-appliqués, la panacée? Self-enforcing protocols, solution to everything? Et ces protocoles à 3 parties sont certes relativement efficaces mais coûteux et en général la tierce personne n’intervient qu’en cas de litige [quand les problèmes surviennent]. Though, there are ways to avoid this complexity [and troubles], that’s. I thought about those examples a few minutes, and I was wondering if self-enforcing protocols are the solution to most of our issues, e...
Metaverse ? | We all live in the Metaverse
https://metaverseblog.wordpress.com/metavers-metaverse
We all live in the Metaverse. I think this word itself deserves a page. Why? Because what is important is not what could be the Metaverse but more how we see it. Let’s be clear. If you look for Metaverse in Wikipedia for example, you would probably react like this “Oh, ok, that’s just a way to call a virtual world”. And that’s a consistent way to react :). Do we really behave differently? Are they closed environments? I’m not that sure…. Leave a Reply Cancel reply. Enter your comment here.
Confidentialité implique-t-il privé ? | We all live in the Metaverse
https://metaverseblog.wordpress.com/2009/09/28/confidentialite-implique-t-il-prive
We all live in the Metaverse. Je n’ai pas eu le temps de consacrer un post à Vanish (et tout le bien que j’en pense) mais la publication récente de Unvanish m’a tellement perturbé que quelques mots autour du “comment être sûr que notre vie privée reste privée” me paraissent bienvenus. C’est le but de Vanish, fournir un mécanisme qui rendent ces informations volatiles. Et stockée sur les noeuds de DHTs publiques (OpenDHT et Vuze). En développant un client Vuze très optimisé (en empreinte mémoire et cpu) q...
TOTAL LINKS TO THIS WEBSITE
9
JM TALLERS
Agraïm la vostra visita a la nostra pàgina web, des d’on podreu consultar les nostres. Des de JM Tallers, us volem oferir un servei proper, directe i personalitzat. La nostra. Voluntat és satisfer les necessitats dels nostres clients oferint el millor servei al millor. Estem al vostre servei. DISPOSEM DE VEHICLE DE SUBSTITUCIÓ GRATUÏT. Durant tot el temps que tingui el seu vehicle en reparació JM Tallers li ofereix un cotxe de substitució sense cost. PRESSUPOSTOS SENSE COMPROMÍS. Enviar a un amigo.
SiteGround System Page Coming Soon
An awesome website is coming soon to this address! The web hosting service for this web page is provided by SiteGround.com. Our client is still working on their website, but nice of you to come by. Check back again! Web Hosting for Joomla. Web Hosting for WordPress. Web Hosting for Drupal. Web Hosting for Magento. How to Post a Ticket.
INICIO
Aquesta web fa servir galetes. Si continua navegant, entendrem que les accepta. ÚS ADRECES IP I COOKIES I RECOLLIDA DE DADES ESTADÍSTIQUES. El centre l'informa que la navegació d'un usuari per aquesta web deixa com a rastre l'adreça IP que li ha estat assignada pel seu proveïdor d'accés a Internet. Només es fa servir aquesta adreça per a fins exclusivament interns, com són les estadístiques d'accés al Portal. Explorer: http:/ windows.microsoft.com/es-es/windows-vista/block-or-allow-cookies. Opera: http:/...
jared tame
I've been experimenting with a way to circumvent wifi network password screens, and found myself needing to inject jQuery into a page without having an Internet connection (see jquerify. Otherwise). Here's what I did in Chrome:. Add a new directory on your computer, add a "manifest.json" file to it, along with any JS you want to load (eg https:/ ajax.googleapis.com/ajax/libs/jquery/1.7.2/jquery.min.js). And add the following to the manifest.json file:. Name": "File holder",. Posted about 3 years ago.
The Blog
Some boring stuff about my life. Monday, May 05, 2008. What a great day, some nice weather in contrast to the scorchers we've had in the past few weeks. So, it looks like I've got the entire holidays right in front of me! My exams just ended last Friday, so I guess todays the official start :). Time for my usual holiday wish-list, hope I don't blow it playing games again like I did last time. Get some more music and books. Friday, April 04, 2008. Upgrade hardware, for:. Iain M. Banks novels. Try/Buy Sam ...
Life in Grey | Just another student’s life.
September 18, 2009 · 2:17 am. Here are a couple more ciphers, these are actually still in use today. Cipher, one of the first few public-key ciphers, achieves security via the factorisation problem. You’ll have to provide two large primes to generate the key-pair first. It uses the Sieve of Eratosthenes to find a random prime for the public key exponent, it’s quite time-consuming. Back to symmetric block ciphers, we have the AES. September 8, 2009 · 12:36 am. Next is the Hill cipher. From Modern Cryptana...
Jmtan15's Blog | PLWS (Personal Learning Website)
PLWS (Personal Learning Website). Mr Dennis Dutton was trying to answer in his keynote presentation questions about beauty. Questions like, “what is beauty? 8221; or “How do people perceive beauty? 8221; He used the Darwinian Theory of Beauty to try to answer these questions. Shared Knowledge and Personal Knowledge. Hello My name is Jeremy Matthew Tan, my friends call me Je, but I’d like to be called Jeremy. Football during Class Mentoring. Question: Would you say that being athletic could be useful?
Memory Lane
Wednesday, June 20, 2007. Hey, I'm Tan, retired teacher. Like to email. Like to listen to music and Karaoke. Like to read. Hate people who smoke and litter. Concern for the enviroment. Subscribe to: Posts (Atom). View my complete profile.
jmtanatologos
Juan Martin Tanca – Juan Martin Tanca's Blog
Is Having a Triathlete Coach Really that Important? The First Time I. Felt Like a Runner. Keeping Cool and Flying Low. Time for a new Toy. Juan – that’s me! Hey there, I’m Juan. I’m a triathlete and overall good guy. Click here. To learn more about me and my blog. Terms of Service and Privacy Policy. Proudly powered by WordPress.
JM Tax and Accounting, LLC
Our firm specializes in helping individuals, corporations and small businesses with Taxes, Accounting, Consulting, and other business solutions. We take great pride in creating a strong knowledge of our customers needs and plan ahead for a stable financial future! We look forward to reviewing your individual needs and long term growth needs. JM Tax and Accounting, LLC. What matters to you, matters to us". Accounting, tax preparation, and business solutions. What sets us apart is that we are regular peopl...