Events

DH Asia Webinar Series: New Horizon of Digital Humanities? Computational Social Science and its Application by Dr. Hsuanlei Shao
DH Asia Webinar Series: New Horizon of Digital Humanities? Computational Social Science and its Application by Dr. Hsuanlei Shao


Michael Choi (National University of Singapore) – Markov Chains + X: Markov Chain Entropy Games and the Geometry of their Nash Equilibria
Michael Choi (National University of Singapore) – Markov Chains + X: Markov Chain Entropy Games and the Geometry of their Nash Equilibria


Ariel Neufeld (Nanyang Technological University) – Markov Decision Processes under Model Uncertainty
Ariel Neufeld (Nanyang Technological University) – Markov Decision Processes under Model Uncertainty

Brian Lim (Primer AI) – NLP/LLM Applications in Industry
In this talk, Brian will share on industry use cases for Natural Language Processing (NLP) technologies, focusing on the financial and defence sectors, as well as discuss how recent developments such as Large Language Models (LLMs) are being integrated and utilized.

Subhro Ghosh (National University of Singapore) – The Unreasonable Effectiveness of Negative Association
Subhro Ghosh (National University of Singapore) – The Unreasonable Effectiveness of Negative Association


Aadhaar Chaturvedi (The University of Auckland Business School) – Contracting and Information Sharing in Supply Chains with a Common Retailer & Competing Manufacturers
Aadhaar Chaturvedi (The University of Auckland Business School) – Contracting and Information Sharing in Supply Chains with a Common Retailer & Competing Manufacturers


HASS Conversations in Design, Technology, and Society Series | Hazardous Data: The Entanglements of Digital Debt in India
HASS Conversations in Design, Technology, and Society Series | Hazardous Data: The Entanglements of Digital Debt in India


Lavanya Marla (University of Illinois at Urbana-Champaign) – Greedy Policies and Penalized Information-Relaxation Bounds for EMS: Allocation and Performance Assessment
Lavanya Marla (University of Illinois at Urbana-Champaign) – Greedy Policies and Penalized Information-Relaxation Bounds for EMS: Allocation and Performance Assessment


Feng Li (Shandong University) – Distributed Intelligence: From An Algorithmic Perspective
Feng Li (Shandong University) – Distributed Intelligence: From An Algorithmic Perspective

Eugene Lim (GOVTECH) – Reverse Engineering Cryptographic Implementations in Software and Teo Sui Guan (GOVTECH) – Cryptography and its use in Government
Encryption is used everywhere in software, from custom network protocols to password vaults. We will walk through the process of reverse-engineering software to identify encryption protocols and analysing them for vulnerabilities through real-world applications. We will look at common encryption patterns in source code as well as common mistakes made by developers.