COURSE DETAIL
This course is part of the Laurea Magistrale program. The course is intended for advanced level students only. Enrollment is by consent of the instructor. The course focuses on relevant research themes related to peer-to-peer systems, blockchain technologies, cryptocurrencies and novel applications that can be built over the blockchain. Nowadays, the most prominent peer-to-peer systems are related to the blockchain and distributed ledgers. Thus, the main part of this course is devoted to these topics. Bitcoin and novel cryptocurrencies gathered momentum in the last months. More and more investors look with interest to these technologies, while others label them as a dangerous speculative bubble. The truth is that the blockchain, and the alternative implementations of a distributed ledger, represent very interesting technologies, that can be exploited to build novel distributed applications. The underlying building blocks are related to many concepts and research areas of computer science in general. This course illustrates the main principles and conceptual foundations of the blockchain and the Bitcoin network. Topics covered: Introduction to peer-to-peer systems; Overlay topologies and decentralization; Introduction to Crypto and Cryptocurrencies; The blockchain: how to achieve decentralization; Transactions and transaction scripting languages; Mining; Attacks to the blockchain; Anonymity; Smart contracts.
COURSE DETAIL
The course is designed to prepare students for leadership in a globally interdependent and culturally diverse workforce. Throughout the course, students are challenged to question, think, and respond thoughtfully to the issues they observe and encounter in the internship setting, and the designated city in general. Students have the opportunity to cultivate the leadership skills as defined by the National Association of Colleges and Employers (NACE), such as critical thinking, teamwork, and diversity. Assignments focus on building a portfolio that highlights those competencies and their application to workplace skills. The hybrid nature of the course allows students to develop their skills in a self-paced environment with face-to-face meetings and check-ins to frame their intercultural internship experience. Students complete 45 hours of in-person and asynchronous online learning activities and 225-300 hours at their internship placement.
COURSE DETAIL
This class offers an introduction to the fundamental concepts of distributed systems. Topics include: synchronization; distributed algorithms; distributed architecture; distributed file systems; end-to-end systems (P2P); distributed transactions.
COURSE DETAIL
COURSE DETAIL
Emerging technologies like artificial intelligence, the Internet of Things, and Blockchain Technology have an increasingly transformative impact on people and society. This course introduces the different ways to theorize emerging technology, reflect on its ethical impacts, and use practical tools to integrate ethical reflection in day-to-day projects. The course consists of three parts. The first part of the course covers the basics: presenting major ethical issues with emerging technologies from a historical perspective, explaining the link between ethical theories and technology, and presenting different ways to think about technological mediation. The second part focuses on ethics of particular types of emerging technologies: of artificial intelligence (e.g. deep learning), artificial life (e.g. genetic modification), and existential machines (e.g. the atomic bomb). The third part contextualizes the ethics of emerging technologies in a discussion of three global challenges: global citizenship and human rights, climate change, and violence. The course uses methods of philosophical reflection, argumentation, empirical and historical research, and applied ethics.
COURSE DETAIL
The six-week summer lab research program at National Taiwan University places students in various science, engineering and social science research labs and/or projects under the supervision of faculty. Students spend approximately 30 hours per week in lab activities.
COURSE DETAIL
In this course, students develop, plan, manage, and control projects successfully in a business environment. This requires an awareness of general project management principles, methodologies, and the tools and techniques as applied within multi-disciplined projects, specifically to large IT projects. They also examine formal approaches to managing risk, opportunity, uncertainty, and value in these projects.
COURSE DETAIL
COURSE DETAIL
This course introduces the basic concepts of information system security and the design principles of classic information system security mechanisms, systematically discussing security threats and corresponding system security protection strategies from two aspects: security analysis technology and security protection mechanism. Information system vulnerabilities and malicious behavior analysis techniques, authentication, information protection and isolation mechanisms, access control and other security protection mechanisms are discussed. Using the latest data processing application software as an example, the course analyzes the use of information system security technology, combining case analysis and course experiments, and analyzes the security mechanism design of mainstream information systems and common security detection and security defense technologies.
COURSE DETAIL
This course provides an introduction to the field of quantum computing and information, covering a variety of topics ranging from computation and cryptography to foundations of quantum physics. It explores current research topics and discusses how quantum phenomena give rise to new algorithms for machine learning, quantum computational supremacy, cryptographic schemes with unprecedented security guarantees, and device-independent protocols. Topics include fundamentals of quantum computing; the circuit model; basic quantum algorithms and the concept of quantum computational supremacy; Bell inequalities, non-local games, and the concept of device-independence; and basic quantum protocols for cryptography. As part of the exercises, students run simple quantum programs on an actual quantum computer available through the cloud.
Pagination
- Previous page
- Page 72
- Next page