143 search results for “Computer programming” in the Student website
-
Article on Affective Computing by Andreas Häuselmann published in IDPL
Affective Computing (AC and sometimes called ‘Emotional AI’) provides opportunities to automatically process emotional data. However, is EU data protection law fit for purpose when it is applied to such AC approaches?
-
A computational tool that will transform bacterial genome analysis
Whether a microbe is beneficial or harmful to a plant can now be predicted with high accuracy thanks to bacLIFE. This bioinformatic tool with an intuitive interface makes it much easier to unlock the secrets of bacterial genomes. A group of Leiden biologists presented it in Nature Communications.
-
eLaw publishes article in Computer Law & Security Review
In healthcare, gender and sex considerations are crucial because they affect individuals' health and disease differences. Yet, most algorithms deployed in the healthcare context lack close consideration of these aspects and do not account for bias detection. In their latest paper, Eduard Fosch-Villaronga,…
-
MODIFED: Morphosyntactic Dialect Feature Detection Workshop
Workshop
-
Join the Columbia Summer Program on American Law in July 2023
Education
-
New course Experimentation I: Programming Psychological Experiments developed with Grass shoot grant
Last year, Dr. Henk van Steenbergen received a Grass Shoot grant to completely redevelop the research master's course 'Experimentation I: Programming Psychological Experiments'. The revised course was taught for first time last block and has just come to an end. Time for a brief recap.
-
University receives Prime Minister's Award from Korea for Korea Studies program
Ambassador Hyoung Chan Choe of South Korea paid his first visit to Leiden University Nov. 22, where he was received by President Annetje Ottow and Professor of Korea Studies Remco Breuker.
-
Gianclaudio Malgieri appointed as Associate Editor of Computer Law & Security Review
Gianclaudio Malgieri, after having served as an Editorial Board Member of Computer Law & Security Review, Elsevier (CLSR) in the last three years, has now been appointed as Associate Editor of that review.
-
Leiden Law Cast: Law and computers with Professor Jaap van den Herik
Leiden Law Cast is a podcast made by Leiden Law School, Leiden University, for everyone who wants to learn more about current legal issues.
-
Leiden Law Cast #7: Law and computers with Professor Jaap van den Herik
Leiden Law Cast is a podcast made by Leiden Law School, Leiden University, for everyone who wants to learn more about current legal issues.
-
Hai Lin
Science
-
Tom O'Brien
Science
-
Milco Wansleeben
Faculteit Archeologie
-
Alan Kai Hassen
Science
-
Nils Thonemann
Science
-
Lettie Dorst
Faculty of Humanities
-
Franz Wurm
Faculteit der Sociale Wetenschappen
-
Justin Lian
Science
-
André Mesquita Fery Antunes
Science
-
Akrati Saxena
Science
-
Michael Lew
Science
-
Hongchang Shan
Science
-
Jaap van den Herik
Faculteit Rechtsgeleerdheid
-
Levon Amatuni
Science
-
The Hague Program on International Cyber Security: looking for the elephant in the room
A new year, a new project, a new name: The Hague Program on International Cyber Security. Professor Global Security and Technology Dennis Broeders was awarded a grant of 2 million Euros by the Dutch Ministry of Foreign Affairs
-
Become a student member of the Institute of Psychology program committees
Education, Facility, Social
-
SAILS/ LIBC - Hackathon Computational Psychometrics
Lecture
-
Aris Politopoulos
Faculteit Archeologie
-
Matthew Sung
Faculty of Humanities
-
Eduard Fosch Villaronga
Faculteit Rechtsgeleerdheid
-
Nuno De Mesquita César de Sá
Science
-
Evert van Nieuwenburg
Science
-
Matthijs Westera
Faculty of Humanities
-
Martin Kroon
Faculty of Humanities
-
How the US used threats to influence foreign nuclear programs
The United States used threats to influence the nuclear programs of Iran, Libya and South Africa. How effective was this diplomatic coercion?
-
Qinyu Chen
Science
-
Geert-Jan Will
Faculteit der Sociale Wetenschappen
-
A Paragenealogy of Computational Rationality
Lecture, Research Seminar
- Join the Columbia Summer Program 2022!
-
LUCDH Lunchtime Speaker Series: Colonial Korean Print Shops through Computer Vision
Lecture
- Graduation Ceremony MSc Computer Science
- Graduation Ceremony MSc Computer Science
-
Young Star Renske Donkers: how is she doing now?
How is Young Star Renske Donkers doing now? Early this year she was the second person ever to win the Young Star Award for the best bachelor student. After her bachelor Molecular Science & Technology, Renske is now busy with her master Chemical Process Engineering in Delft. ‘This award was a great boost…
-
Thesis and papers
When writing a thesis or paper you must make good use of the insights you have gained during your lectures and studies so far. You should also refer to relevant literature and carry out your own research on the topic.
-
SAILS researcher Anne Meuwese awarded PDI-SSH grant
The PDI-SSH grant will be used by Meuwese to create a web portal and collection of tools and resources, named ‘WetSuite’, that will help researchers apply Natural Language Processing (NLP) methods to legal textual data from public bodies.
-
Aske Plaat
Science
-
Thomas Bäck
Science
-
'ALICE': Understanding SLURM: Simplifying High-Performance Computing
Workshop
-
A+ for Leiden astronomy student who simulated chaotic interactions of black holes
Leiden astronomy Master's student Arend Moerman has received an A+ for his thesis research on the simulation of chaotic interactions of three black holes. The simulations, which he carried out together with his Leiden and Oxford colleagues, show that lighter black holes tend to slingshot each other…
-
Post-quantum cryptography should keep our DigiD, bank accounts and state secrets safe
Our banking, DigiD and sensitive medical data: what if our entire digital infrastructure can no longer be trusted? Jelle Don has this question permanently in mind as he goes about his research. And that is no bad thing because without new digital security measures, our society will be extremely vuln…