40 Views0 Comments0 Likes
In this lesson, we discover the memory consistency model while focusing on issues relevant for programmers, especially when programming concurrent applications.Speaker: Tudor DAVIDEditor: El Mahdi EL MHAMDI
33 Views0 Comments0 Likes
In communications security, the Diffie-Hellman key exchange, which is the topic of this lesson, is a widely used method for creating symmetric keys. Speaker: Jean GOUBAULT-LARREC Editor: El Mahdi EL MHAMDI
68 Views0 Comments0 Likes
This video contains a short introduction to cache-coherence protocols. We first describe why we need cache cohere and then explain how coherence is implemented at a high level.Speaker: Vasileios TRIGONAKISEditor: El M...
130 Views0 Comments2 Likes
This video is based on an article published in Applied Physics Letters in 2014 http://scitation.aip.org/content/aip/journal/apl/104/25/10.1063/1.4885501 and an oral presentation made at the 2013 http://cms2013.silicon...
240 Views0 Comments0 Likes
This lesson tackles the memory hierarchy in concurrent multicores, with a focus on implementation issues. Speaker: Tudor DAVID Editor: El Mahdi EL MHAMDI
108 Views0 Comments0 Likes
In this lesson, we give a short overview of liveness and safety properties of distributed systems and their trade-offs.Speaker: Victor BUSHKOVEditor: El Mahdi EL MHAMDI
715 Views0 Comments2 Likes
This lesson highlights 7 commons errors that typically cause the rejection of scientific papers from conferences and journals. Speaker: Rachid GUERRAOUI.
1.74K Views0 Comments0 Likes
In this video, the difference of behaviour towards symmetries between electric and magnetic fields is explained. This leads to practical simplifications when dealing with highly symmetric charge distributions or curre...
1.30K Views0 Comments1 Likes
Bolzano-Weierstrass is a fundamental theorem in analysis, stating that we can extract a convergent subsequence from any bounded sequence. It is proven in this lesson using a sun shining in the horizon. Speaker: El Ma...
936 Views0 Comments0 Likes
This video summarises the results of the ASPLOS'14 paper "Finding Trojan Message Vulnerabilities in Distributed Systems", authored by Radu Banabic (speaker in the video), Prof. George Candea, and Prof. Rachid Guerraou...
459 Views0 Comments0 Likes
In this video, we discover dynamics in distributed hash tables, in particular, insertion and removing of a node. Speaker: Anne-Marie KERMARREC.
1.88K Views0 Comments0 Likes
With few calculations, we can compute the electric field thanks to symmetries and Gauss law, this is illustrated here where we avoid the calculation of the electric field with infinite integrals. Speaker: El Mahdi EL...