Avatar
Gao
  • C
  • C#

see more about me on my Github profile.


Authenticated Encryption

Glossary Cryptographic Hash Function It is a one-way function that maps data of arbitrary size (often called the message) to a bit array of a fixed...


Information Security

Information Security Information security(infosec), is the practice of protecting information by mitigating information risks like ...


Testable Design

Guidelines for Testable Design Testability issues A programmer struggling to write a test is facing off against one of a few common show-stoppers....


SOLID Design Principles

In object-oriented computer programming, SOLID is acronym and stands for a set of five design principles documented by Robert C. Martin. Keep your...


Test Case Design Techniques

| Approach/Implementation | White Box | Black Box | | | |-------------------------|---------------------------|-------------------|---|---| |...


Build Simple Bootstrap Linux System Image

Kernel Image for Emulation We will create a tiny Linux system with absolute minimum additional software. We reuse host kernel image vmlinuz to...


Java Stream

Streams A stream represents a sequence of elements and can perform a series of operations on them strings.stream() .filter(s -> !s.equals(""))...


MongoDB

Scalability NoSQL is intented to offer more scalability. A balance between the scalability and the consistency. Vertical Functional decomposition ...


Matrices in Computer Graphics

Matrix Transformations The matrices are used frequently in computer graphics and the matrix transformations are one of the core mechanics of any 3D...


Tree Diameter

Definition The diameter of a tree is the distance of the longest path between two end nodes $\arg\max_{(u, v) \in G}d(u, v)$, where $d(u, v)$ is the...