Search for "Sven" returned 2036 results

33 min
Robot Music
The Robots Play Our Music and What Do We Do?

51 min
Ecuador: how an authoritarian government is fooling the entire world
Guess what? The Government of Rafael Correa actually is…

55 min
White-Box Cryptography
Survey

64 min
"Exploit" in theater
post-existentialism is the question, not post-privacy

60 min
Buffering sucks!
An attempt of calculating the economic cost of buffering.

51 min
Uncovering vulnerabilities in Hoermann BiSecur
An AES encrypted radio system

61 min
Programming FPGAs with PSHDL
Let's create the Arduino for FPGAs

46 min
You can -j REJECT but you can not hide: Global scanning of the IPv6 Internet
Finding interesting targets in 128bit of entropy

31 min
JODI - Apache is functioning normally
A net.art collective since 1995. Understanding the browser…

14 min
c3 NewsShow
Tag 1

63 min
Analyze the Facebook algorithm and reclaim data sovereignty
Algorithms define your priorities. Who else besides you can…

62 min
The Ghost in the Machine
An Artificial Intelligence Perspective on the Soul

49 min
Toward a Cognitive "Quantified Self"
Activity Recognition for the Mind

32 min
Craft, leisure, and end-user innovation
How hacking is conceived in social science research

36 min
Long Distance Quantum Communication
Concepts and components for intercontinal communication…

49 min
BREACH in Agda
Security notions, proofs and attacks using dependently…

54 min