4636
Lumen
A database for searching for DMCA filings and defamation assertions
legal  dmca 
3 hours ago
The President’s Role in Advancing Criminal Justice Reform
Obama published in the Harvard Law Review a few days before leaving office
law 
10 days ago
OpenIntro
Three CC textbooks on statistics
Statistics  ebooks 
5 weeks ago
The Power of Big Data and Psychographics - YouTube
In a 10 minute presentation at the 2016 Concordia Summit, Mr. Alexander Nix discusses the power of big data in global elections. Cambridge Analytica’s revolutionary approach to audience targeting, data modeling, and psychographic profiling has made them a leader in behavioral microtargeting for election processes around the world.
big-data  privacy 
6 weeks ago
New UTSA study describes method to detect dishonesty online
Crazy assumption that people can be identified solely by their writing. Not serious statistics.
plagiarism 
9 weeks ago
IT CAN'T HAPPEN HERE
Well, it did happen here, 2016
Sinclair-Lewis  Trump 
9 weeks ago
CCCAC - Keyless Klau
Mit einer simplen Relai kann man "keyless" cars öffnen und fahren.
security  automotive  hack 
11 weeks ago
EDQ | Massive possibilities
"MOOCs are not going to take over the world and replace degrees – we realised that a few years ago.” So states Dr Demetra Katsifli, Senior Director at online learning platform Blackboard, and Dr David LeFevre from Imperial College agrees. “There was a great deal of hype surrounding MOOCs around 2012–13, and this has inevitably been followed by a backlash as online sites failed to achieve the grandiose transformation in education that some commentators were predicting.”
MOOC 
october 2016
A kilobit hidden SNFS discrete logarithm computation
Joshua Fried1, Pierrick Gaudry2, Nadia Heninger1, Emmanuel Thomé2
1 University of Pennsylvania
2 INRIA, CNRS, Université de Lorraine

Abstract. We perform a special number field sieve discrete logarithm computation in a 1024-bit prime field. To our knowledge, this is the first kilobit-sized discrete logarithm computation ever reported for prime fields. This computation took a little over two months of calendar time on an academic cluster using the open-source CADO-NFS software. Our chosen prime p looks random, and p􀀀1 has a 160-bit prime factor, in line with recommended parameters for the Digital Signature Algorithm. However, our p has been trapdoored in such a way that the special number field sieve can be used to compute discrete logarithms in Fp, yet detecting that p has this trapdoor seems out of reach. Twenty-five years ago, there was considerable controversy around the possibility of backdoored parameters for DSA. Our computations show that trapdoored primes are entirely feasible with current computing technology. We also describe special number field sieve discrete log computations carried out for multiple weak primes found in use in the wild.
cryptography  discrete-logarithm  DSA 
october 2016
Plagiarism in Higher Education
Custom essay writing services: an exploration and
next steps for the UK higher education sector
contract-cheating  ghostwriter 
september 2016
« earlier      
academia academic academic-dishonesty academic-integrity academic-misconduct access accessibility advertising agile algorithm algorithms animation anonymity anonymization anonymous art authorship bccn bea berlin bibliothek bildung bitcoin blog blogging blogs bsmb c++ calendar ccc censorship cheating china citation citations cloud collaboration color comic computing constructive-criticism contract-cheating cooking copyright corruption creativecommons cryptanalysis cryptography cs culture data data-mining datenschutz detection didaktik diploma-mills dissertation duplicate dww e-learning e-voting ecompetence education egk elearning elsevier encryption english epass eportfolio ethics ethik evoting facebook fake fake-conferences fake-degrees filetype:jpg filetype:pdf film fiw foto fraud frauen funny game games geek gender gender-bias germany geschichte ghostwriter google gute guttenberg guttenplag hack hacker handball hash herrmann/brach history history-of-computing htw human hypertext iceland icelandic identity images imi informatik integrity intellectual-property interface internet java joke journalism journals junk jura law learning library literatur locks mac management math mathematics mathematik md5 media media:document media:image medicine medizin misconduct modelling mooc moodle music nerd norway nsa oer olpc online ontology open open-access opensource owl paper-mill passwords patient-data-security paul peer peer-review pgp philosophy physics pirate-party plagiarism plagiarism-detection-software plagiat plagiatserkennungs-software plagiatserkennungssoftware plagtest2008 powerpoint pp praxis predatory presentations privacy productivity professors programming programming-education programming-language promotion public_speaking publication publishing rdf recht research retraction retractions review rfid rhetoric rights ruby russia schavan schule schweiz science scientific scientific-misconduct scientific-publishing scigen search secondlife security semantic semantic-web semanticweb seo skm social social-network software software-engineering spam ssl statistics storytelling sweden t-shirt teaching terrorism test10 time-management titel tools tor translation turing turnitin tutorial twitter typography unicode urheberrecht urteil usa usability video virus visualization voting vroniplag watson web web-2.0 web-applications web2.0 whistleblowing wiki wikidata wikileaks wikimedia wikipedia wissenchaftliches-fehlverhalten wissenschaft wissenschaftliches-fehlverhalten women writing zensur überwachung

Copy this bookmark:



description:


tags: