Author page of Benjamin Coban

Hi there, Benjamin here! Interested in theoretical computer science, DevOps and being a tiny gem of musical expression with caffine addiction, I try to reach the public with posts about theory, applications and their interaction. Feel free to stop by and start a discussion! :)

Blog content of this author

Step up your game – Upgrade from C to C++

When writing complex programs in C, one will be confronted with the topic of code redundancy and accessibility control issues. C++ was first introduced in 1983, called “C with classes”, and solves a bunch of hurdles stumpling upon programming in C.

The advantages of object-oriented programming languages

Defining complex data structures in C remembers of defining records in a functional programming language. When defining methods over several similar structures, the code redundancy gets clear – every struct needs its own implementation. For all functions or calls.

Read full article…

Recipe: How To Translate A Recursive Function Into An Implicite One

In order to determine the runtime of a recursive function, it is helpful to translate this function into an implicite one. This blog post illustrates a straight-forward approach, intuitively – with exactly 5 steps on a small example. This approach is also applicable for almost every recursive function.

Why Tho?

The reason to resolve a recursive function lies in the analysis and application. When interested in runtime analysis, the implicite function will serve as a guidance for the total runtime of the recursive function. When interested in application, the implicite function will have the same

Read full article…

An (in-)formal Introduction To Attack Defense Trees

It is widely known that the security of a system seen as property is not static. Therefore, there cannot exist a general algorithm deciding whether or not a given system is secure in its sense. IT-Security Architects and Engineers are stuck with persistent research of bug reports of the technology the respective enterprise is using. In the industry, IT security is one use case of many others. The types of systems to examine vary depending on context. For instance, the construction of a museum is considered as a system and it is of interest to guarantee that the objects, stored in this kind of facility, are considered safe and sound. In consequence, it is urgent to establish a formal model for system description and security evaluation. There are various challenges to overcome, for instance:

  • What are the best defensive measures to invest in?
  • How can it be decided whether a defensive measure from the past is still necessary?
  • How can newly discovered attacks be efficiently documented?
Read full article…

A Few Words On Algorithm Complexity

One of the key properties of a given algorithm is its complexity. A computer scientist is interested in the adequacy of the algorithm runtime relative to the size of the input. While there exist sharp runtime lower bounds for any given algorithm, for upper bounds however, the sky is the limit. It depends on the quality of optimization.

Read full article…


Projects of this author

Sadly there is no content here yet!