Pinned Repositories
120-Data-Science-Interview-Questions
Answers to 120 commonly asked data science interview questions.
augustine-nips17-weightlearning-experiments
Experiments for a NIPS 2017 workshop paper.
Fragmentation-Reassembly-IP-Packets
A program showing demonstration of how IP Packets are fragmented and and how they are again reassembled in the network.
joy
A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.
klish
framework for implementing a CISCO-like CLI on a UNIX systems
psl
The PSL software from the University of Maryland and the University of California Santa Cruz
psl-examples
Various examples to showcase the functionality of PSL.
psl-utils
psl-weightlearning-experiments
ucsc-incominggrad
FAQ for University of CaliforniaSanta Cruz 2019 Incoming Grads
shrestabs's Repositories
shrestabs/ucsc-incominggrad
FAQ for University of CaliforniaSanta Cruz 2019 Incoming Grads
shrestabs/120-Data-Science-Interview-Questions
Answers to 120 commonly asked data science interview questions.
shrestabs/augustine-nips17-weightlearning-experiments
Experiments for a NIPS 2017 workshop paper.
shrestabs/Fragmentation-Reassembly-IP-Packets
A program showing demonstration of how IP Packets are fragmented and and how they are again reassembled in the network.
shrestabs/joy
A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring.
shrestabs/klish
framework for implementing a CISCO-like CLI on a UNIX systems
shrestabs/psl
The PSL software from the University of Maryland and the University of California Santa Cruz
shrestabs/psl-examples
Various examples to showcase the functionality of PSL.
shrestabs/psl-utils
shrestabs/psl-weightlearning-experiments
shrestabs/python_reference
Useful functions, tutorials, and other Python-related things
shrestabs/settings
Preference configuration across various softwares
shrestabs/thrift
Apache Thrift
shrestabs/translearn
Code implementation of the paper "With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning", at USENIX Security 2018
shrestabs/UCSC-CMPE252A-dht
Chord Implementation
shrestabs/UCSC-CMPS240-Assignments
Implementation of alpha-beta search algorithm and the expectimax search algorithm for connect 4