Operating System 操作系统代写

操作系统 OS 课程主要包括进程管理, 内存管理, 设备管理和文件系统.

CS 6035 Binary Exploitation

GT CS 6035: Introduction to Information Security Project Binary Exploitation! Learning Goals of this Project: Students will learn introductory level concepts about binary exploitation. This lab develops understanding of control flow hijacking through different taskschallenges designed to show certain vulnerabilities or weaknesses in a C program. A python library pwntools will be used to show …

CS 6035 Binary Exploitation Read More »

Homework 4

Homework 4 starter code dense data In this homework, we will implement an object detector from scratch. This assignment should be solved individually. No collaboration, sharing of solutions, or exchange of models is allowed. Please, do not directly copy existing code from anywhere other than your previous solutions, or the previous master solution. We will …

Homework 4 Read More »

Homework 3

Homework 3 starter code data dense data In this homework, we will use all the trick at our disposal to tune a classification network on supertux. We then make this classification network fully convolutional and solve a semantic labeling task (labeling every pixel in the image). This assignment should be solved individually. No collaboration, sharing …

Homework 3 Read More »

Homework 5

Homework 5 starter code In this homework, we will train a CNN to do vision-based driving in SuperTuxKart. This assignment should be solved individually. No collaboration, sharing of solutions, or exchange of models is allowed. Please, do not directly copy existing code from anywhere other than your previous solutions, or the previous master solution. We …

Homework 5 Read More »

extra

Extra credit homework starter code In this homework, you will work with character-level language models. These models take as input a sequence of characters and predict the next character. You will first implement functionalities for an abstract language model, then build a new Temporal Convolutional Network (TCN). This assignment should be solved individually. No collaboration, …

extra Read More »

DL Homework 2

Homework 2 starter code data In this homework, we will train a convolutional network to classify images from SuperTuxKart. This assignment should be solved individually. No collaboration, sharing of solutions, or exchange of models is allowed. Please, do not directly copy existing code from anywhere other than your previous solutions, or the previous master solution. …

DL Homework 2 Read More »

attacklab

15-213, Fall 20xx The Attack Lab: Understanding Buffer Overflow Bugs Assigned: Tue, Sept. 29 Due: Thu, Oct. 8, 11:59PM EDT Last Possible Time to Turn in: Sun, Oct. 11, 11:59PM EDT 1 Introduction This assignment involves generating a total of five attacks on two programs having different security vul- nerabilities. Outcomes you will gain from …

attacklab Read More »

Coursework 2 Mastermind in C and Assembler

Hardware-Software Interface Coursework 2 – Mastermind in C and Assembler Hans-Wolfgang Loidl (adapted by Adam Sampson) School of Mathematical and Computer Sciences, Heriot-Watt University The aim of this coursework is to develop a simple, systems-level application in C and ARM Assembler, running on a Raspberry Pi with attached devices. The learning objective of this coursework …

Coursework 2 Mastermind in C and Assembler Read More »

COMP2300 6300 Final Exam 2018

COMP2300/6300 Final Exam 2018 Student ID: Reading time: 15 minutes Writing time: 180 minutes Permittedmaterials: one A4 page with notes on both sides Make sure you read eachquestion carefully. Somewords have footnotes1 to clarify what they mean in the context of the question. Questions are not equally weighted, and the size of the answer box …

COMP2300 6300 Final Exam 2018 Read More »