CyberPhish seminar gave thoughtful insight to fight phishing
To explain the importance of recognising and mitigating the impact of phishing attacks, our institute organised a CyberPhish seminar on 13 October, which was attended by more than 35 participants,...
View ArticleJakob Mass: „Process management for Internet of mobile things“
On the 9th of December Jakob Mass defended his PhD thesis on „Process management for Internet of mobile things“. The Internet of Things (IoT) promotes solutions such as a smart city, where everyday...
View ArticleGamal Elkoumy: “Privacy-Enhancing Technologies for Business Process Mining”
Data privacy has become trending, and nowadays, people are talking more and more about it. With process mining, privacy becomes more relevant. Because process mining makes it easier to expose the...
View ArticleLidia Feklistova: „Learners of an introductory programming MOOC: background...
On the 13th of December Lidia Feklistova defended her PhD thesis on „Learners of an introductory programming MOOC: background variables, engagement patterns and performance” We constantly improve our...
View ArticleMohamed Ragab: „Bench-ranking: a prescriptive analysis approach for large...
We are living in a world in which data is not just getting bigger; it is also getting more and more interconnected. Large graph analytics is a useful tool for gaining insights from large volumes of...
View ArticleAlgorithms and data structures are a core foundation of computer science
Jaak Vilo, Kallol Roy Algorithmics (MTAT.03.238) is an obligatory course in the Computer Science MSc curriculum. As such it is intended to remind everyone of the foundations of algorithms and data...
View ArticleAn interactive tool for exploring data science books
Kea Kohv, Master Student in Data Science An interactive tool developed by Data Science Master’s student Kea Kohv helps find highly rated and popular data science books sold on Amazon. A query for data...
View ArticleMis tunne on teha IT-tööstusmagistrantuuri?
Alguses võib IT-tööstusmagistrantuur tunduda nagu võõras asi, kuid paljud UT tudengid on selle edukalt ning õnnelikult läbinud! Järgnevalt saad lugeda kahe tudengi – Lukase (inglise keeles) ning...
View ArticleMohammad Anagreh: “Privacy-preserving parallel computations for graph problems”
Introduction: Privacy-preserving computation is a crucial discipline that protects the privacy of confidential data while facilitating secure analysis. In graph problems, secure multiparty computation...
View ArticleRahul Goel: “Mining Social Well-being Using Mobile Data”
Building healthy relationships and meaningful interactions with those around us is essential for social well-being. These interactions with our friends, family, and colleagues might occur in person,...
View Article