1.
The Clifford Group
(define (G f) (apply (lambda (rp / tr bar alpha sg zer zer? one + - * rls basis) (list (lambda (x) (rp (car x))) ; The real part (lambda (x) (let* ((a (car ...
2.
Norman Hardy
Mug Shot (Other Norman Hardy's) Collected Links · MicroEssays on Capability Theory · Things to do with a Capability System ...
3.
Capability Theory by Sound Bytes
Capability Theory by Sound Bytes. This is a collection of insights for designing ... Foreign Travel, a metaphor; Security without Firewalls; The nature of a ...
4.
Capability Theory by Sound Bytes
Preliminary harping on “Capabilities” for Linux. Microsoft’s NGSCB (Palladium) ... Note on Tanenbaum’s “Can We Make Operating Systems Reliable and Secure?”
5.
Reduced Row Echelon Form
Here is a Scheme program to compute the Reduced Row Echelon Form of a given matrix. The reductions allowed here are:. multiplication of a row by a non-zero ...
6.
Vectors
n-tuples of field elements provide an n dimensional vector space when analogous definitions for .... In finite dimensional spaces all operators are bounded. ...
7.
ECC for Programmers
The hash might be used as a symmetric key in a ECC Diffie-Hellman system. Addition of points is highly analogous to multiplication modulo a family prime in ...
8.
Notes on Intel's IA64 Systems
I presume that privileged IA32 instructions trap within the IA64 system environment, no matter what the privilige level. Ans: It depends on which "System ...
9.
ShopSafe
Just now (2006 Nov) I have managed to make BofA’s ShopSafe thing work for me. It seems to be a newly acquired unit of Bank of America. ...
10.
Capabilities within Computer Systems
Capability ideas appear within computer systems in several guises, sometimes as hardware constructs and sometimes as software. Here are those guises which ...