Lecture 11
Statistics
Lecture 10 - Multi-Party Computation Protocols
Understanding your data with Bayesian networks (in Python) by Bartek Wilczynski PyData SV 2014
Hick-Hyman & Fitts Law _Jing
Information Theory in Software Metrics (Assessment and Issues) Steve Counsell, (Brunel University and CREST)
Minimalism in Cryptography: The Even-Mansour Scheme Revisited Orr Dunkelman, Nathan Keller, and Adi Shamir Haifa University, Bar-Ilan University, and The.
___________________________________________________________________________________________________ SCHOOL OF INTERACTIVE ARTS + TECHNOLOGY [SIAT] | .
Efficient Non-Malleable Codes and Key-derivations against Poly-size Tampering Circuits PRATYAY MUKHERJEE (Aarhus University) Joint work with Sebastian.
1 © 2012 Prof. Dr. Franz J. Brandenburg Graph Drawing main achievements and latest trends an update to 2002 Franz J. Brandenburg University of Passau.
Answering the fermi paradox exploring the mechanisms of universal transcention by john m smart
Rovina: Robot for Exploration, digital preservation and visualization of archeological sites - Ziparo