The strength of a cryptographic function depends on the amount of entropy in the cryptovariables that are used as keys. Using a large key length with a strong algorithm is false co...
Although artificial intelligence has been successfully introduced to enhance Education through technologies in the past few years, major challenges still remain. One of them is how...
We propose a method to search for a lemma in a goq proof library by using the lemma type as a key. The method is based on the concept of type isomorphism developed within the funct...
In this paper we investigate how people use online rating information to inform decision making. We examine whether a theory of searching for information to discriminate between a...
We developed a set of didactic games and activities that can be used to illustrate and teach various concepts from Information Theory. For each of the games and activities we list ...