6.001 Structure and Interpretation of Computer Programs, Spring 2005
Course Features Course Highlights This course features projects and supporting documentation. This course has virtually all of its course materials online. 6.001 is the first course in the core of departmental subjects which is required for all undergraduates in Electrical Engineering and Computer Science. It offers an online version of the textbook for the course, Structure and Interpretation of Computer Programs, 2nd ed., by Abelson, Sussman, and Sussman. Course Description This course introduces students to the principles of computation.
http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/6-001-structure-and-interpretation-of-computer-programs-spring-2005/index.htm
Introduction to Neural Networks
CS-449: Neural Networks Fall 99 Instructor: Genevieve Orr Willamette University Lecture Notes prepared by Genevieve Orr, Nici Schraudolph, and Fred Cummins [Content][Links]
CSI Knowledge: How Bloodstain Pattern Analysis Works (Infographic) : Discovery Channel
You know how it goes: Right before Horatio Caine puts on his sunglasses and throws off a corny one-liner as the The Who screams, the forensics team is looking at a blood splatter on the wall and determining that it was a gunshot wound from close range by a six-foot tall, left handed shooter who wore sandals and had a limp. READ MORE: Whisky, Buried in Antarctic Ice for 100 Years, is Finally Ready for You to Drink Far fetched?
Game Emulation In Linux
Computer gaming is nothing new. Even in the earliest days of computing, we began to see an immediate desire to run games. In 1951, the NIMROD computer was built with the sole purpose of playing the game of NIM. Some twenty years later, we began to see growth of games on both PCs and consoles.
Carl de Marcken: Inside Orbitz
(Here's an email Carl de Marcken of ITA Software sent to a friend, describing their experiences using Lisp in one of the software industry's most demanding applications.) Date: Fri, 12 Jan 2001 15:42:34 -0500 From: Carl de Marcken Geoffrey, Here are some tidbits...
Laboratory Fundamentals of Synthetic Biology
From OpenWetWare Syllabus Class Format
Greg's Jumbo Patches for John Bradley's XV
Intro XV is John Bradley's shared-source, shareware image viewer for the X Window System. It has an outstanding user interface, an excellent suite of tools, and read/write support for a large number of image formats. Even grumpy editors like it. On the other hand, the last official release of XV was more than a decade ago, and as far as Greg has been able to determine, no part of the XV web site gets updated more frequently than once every two to four years.* There have been quite a number of third-party patches produced, and many of the older ones are even listed on the XV Downloads page.
Introduction: Why Lisp?
Copyright © 2003-2005, Peter Seibel If you think the greatest pleasure in programming comes from getting a lot done with code that simply and clearly expresses your intention, then programming in Common Lisp is likely to be about the most fun you can have with a computer. You'll get more done, faster, using it than you would using pretty much any other language. That's a bold claim. Can I justify it? Not in a just a few pages in this chapter--you're going to have to learn some Lisp and see for yourself--thus the rest of this book.
Synbio 2007
From OpenWetWare General Info Spring 2007 Instructor: Jay Keasling (keasling@berkeley.edu) GSI: Jeffrey Dietrich (jadietrich@gmail.com)
SIP.edu Cookbook : Introduction
The Session Initiation Protocol (SIP), is a signaling protocol used for establishing voice, video, and instant messaging communications over the Internet. SIP has been widely adopted by telecommunications carriers and computer software vendors as a means to support next generation communications services. SIP standards are being developed within the Internet Engineering Task Force (IETF) SIP working group. The goals of the Internet2 SIP.edu project are to: Increase the number of SIP-reachable users within Internet2; Promote the convergence of voice and email identities; Build a community of Internet2 schools that is experimenting with offering enterprise SIP services. By becoming "SIP.edu-enabled", a school makes all of its telephones (and users) reachable via SIP.
Practical Common Lisp
This page, and the pages it links to, contain text of the Common Lisp book Practical Common Lisp published by Apress These pages now contain the final text as it appears in the book. If you find errors in these pages, please send email to book@gigamonkeys.com. These pages will remain online in perpetuity—I hope they will serve as a useful introduction to Common Lisp for folks who are curious about Lisp but maybe not yet curious enough to shell out big bucks for a dead-tree book and a good Common Lisp tutorial for folks who want to get down to real coding right away.
VOIP Encryption
There are basically four ways to eavesdrop on a telephone call. One, you can listen in on another phone extension. This is the method preferred by siblings everywhere. If you have the right access, it's the easiest. While it doesn't work for cell phones, cordless phones are vulnerable to a variant of this attack: A radio receiver set to the right frequency can act as another extension.
Related:
Related: