It is known that if a 2-universal hash function H is applied to elements of a block source (X1, . . . , XT ), where each item Xi has enough min-entropy conditioned on the previous...
The paper first deals with the much discussed issue of defining the term informatics. Then it explores how the term information science is understood by the students of the Facult...
Samuel Driessen, Willem-Olaf Huijsen, Marjan Groot...
The study of self-testing/correcting programs was introduced in [8] in order to allow one to use program P to compute function f without trusting that P works correctly. A self-te...
Peter Gemmell, Richard J. Lipton, Ronitt Rubinfeld...
There has been much recent interest in how to help students in higher education develop their generic skills, especially since this is a focus of the Bologna process that aims to ...
Abstract: Nowadays, more and more users make use of web-based collaborative systems. Users participate in communities or search for and provide information in webbased systems. The...