I want to design a game for people to play. The game should be challenging, but also winnable by a player with modest or no skill. It should be enjoyable, and it has to be a computer game. Is there a particular experience I want this game to create? Something that I would want toContinue reading “The Game”
Category Archives: Uncategorized
Cooperative Cellular Networks
I imagine the day where people no longer have to pay for their cellular service. What’s that gonna look like? Well, say you move into this new neighborhood, this isolated city where people operate their own cells. The cell is able to hook up automatically to neighboring cells, and any participant in this system isContinue reading “Cooperative Cellular Networks”
Winter after winter, nothing changes, same snow, same people, same faces. Last year I went to a conference in Colorado. I spent the three days in my room smoking weed. Another rejection from a journal. What’s the point of writing this shit anymore. Rejection after rejection after rejection, from people you don’t know. I can’tContinue reading
Lorde is a godess in the making
Definition of Love
So in a high session I decided to come up with an abstract definition of love. Here’s what I could come up with: Love is acceptance of the other as they are, and it can only be garnered by seeing what they could be.
What Does it Mean for a Medium Access Protocol to Maintain a User’s Privacy?
The hacker doesn’t want to be identified on the wireless medium. Her individual presence on the medium should not be inferrable (except with negligible probability of course). I don’t want to be identified on the wireless medium. When I say ‘I’, I mean an I as an end-user of a WiFi-enabled device, e.g., my phoneContinue reading “What Does it Mean for a Medium Access Protocol to Maintain a User’s Privacy?”
Chip Obfuscation
So I plan on designing and constructing a program that takes as input a behavioral description of a chip, and outputs a gate-level netlist that reveals nothing on the intended function of the chip, yet functions correctly when a certain register in the netlist is programmed with a given secret. The length of this secretContinue reading “Chip Obfuscation”
My First Blog Post
Be yourself; Everyone else is already taken. — Oscar Wilde. This is the first post on my new blog. I’m just getting this new blog going, so stay tuned for more. Subscribe below to get notified when I post new updates.
Introduce Yourself (Example Post)
This is an example post, originally published as part of Blogging University. Enroll in one of our ten programs, and start your blog right. You’re going to publish a post today. Don’t worry about how your blog looks. Don’t worry if you haven’t given it a name yet, or you’re feeling overwhelmed. Just click theContinue reading “Introduce Yourself (Example Post)”
