Authors: Juan Benet What I learned: Distributed networking protocols, distributed hash tables, Merkle DAG. The future of the WWW lies in distributed technologies.
Authors: Marc Dacier, Yves Deswarte, Mohamed Kaaniche What I learned: Operational security can be quantifiably measured... with Markov chains.
Authors: A. Martins, Jan Eloff What I learned: Information security culture is best implemented in an organisation via a best example method.
Authors: filecoin.io What I learned: This paper introduced a new interesting cryptocurrency that would base its proof of concept on providing a decentralized data storage facility to users rather than just random numbers.
Authors: terry Kuny What I learned: The importance of archiving digital information. This paper also describes a problem commonly known as 'bit rot' and the looming dangers of a digital dark age of disappearing information.
Authors: Renata Kovačević, Tin Kramberger, Davor Cafuta, Ivica Dodig What I learned: The IoT can be used to allow pet owners to monitor their pets, especially nocturnal pets.
Authors: Sanja Brekalo, Klaudio Pap, Nevenka Breslauer What I learned: Scripting in additional fuctionality can make software products easier to use for the general public and therefore it improves the quality of the end product. It allows more experienced users to be of help to less experienced users.
Authors: Robert G. Michnowicz What I learned: OPSEC is an always evolving issue that should be addressed with the evolution of new information technologies. Even large organizations, especially large organizations need to take care of OPSEC.
Authors: Bev Littlewood, Sarah Brocklehurst, Norman Fenton, John Dobson, John McDonald, Dieter Gollmann What I learned: How operational security can be measured via effort and or time. Also how security compares with reliability.
Authors: Garry Williams What I learned: What is OPSEC. How attackers can gain information trough bad OPSEC. Examples of OPSEC failures.
Authors: Rodolhe Ortalo, Yves Deswarte, Mohamed Kaaniche What I learned: OPSEC can be quantitatively measured with graphs.
Authors: Mladen Maksimović, Valter Perinović, Dubravko Žigman What I learned: Network analysis devices help to improve the overall network QoS and indirectly help to improve Network security.
Authors: Dario Pintarić, Zvonimir Begić, Dubravko Žigman What I learned: RADIUS is useful to imprvoe the security of a computer network. Other useful RADIUS features are it's accounting capability, the possibility of creating user groups, and it's VLAN and domain support.
Authors: Stjepan Jambrak, Dubravko Žigman What I learned: Advanced OSPF features as well as the fact that OSPF is good for inter vendor routing.
Authors: Davor Lozić, Alen Šimec What I learned: If you want to master PHP it is good to also learn C, so you can extend PHP with modules.
Authors: Tomislav Marjanović What I learned: The intricacies of WEP, WPA1 and WPA2 security, wireless criminal law as well as prevalence of wireless security protocols.
Authors: john Bell
What I learned: The problematics of fully formulating measurements in quantum mechanics. How do we define what is a good enough measurement of a 'system' for all intents and purposes? how precise is precise?
Authors: Stjepan Car
What I learned: Nanotechnology R&D could be a big boon for the economy. Nanotechnology could enable us to create completely new and so far unimaginable materials. The problem with nanotechnology research lies in the fact how interdisciplinary it is.
Authors: Alfred Renyi
What I learned: What is information and how does it relate to entropy.
Authors: A. Einstein, B. Podolsky and N. Rosen
What I learned: No matter how precise the measuring instrument may be, it will always disturb the measured system and change it's properties at least to a very minimal degree.
Authors: Kris Sangani
What I learned: Japanese anime fans are increasingly becoming a part of the engineering workforce. Not only that, but their economic power and preferences are creating a whole new market. How can businesses use this to their advantage?
Authors: Annalee Newitz
What I learned: How does Japanese animation attract and create it's abroad subculture and what are it's effects and characteristics on it's abroad fandom.
Authors: Joseph Christopher Schaub
What I learned: The view of gender and humanity in a potential cyborg sci-fi future. Does it matter if you are male or female if you can transplant your brain at will into another either male or female cyborg body in a matter of minutes?
Authors: Matt Hills
What I learned: How the western Japanese animation fandom have appropriated the Japanese animation subculture. And how does japanese animation interreact with the western fandom.
Authors: Werner Almesberger
What I learned: Linux Network traffic control consists of qeueing disciplines, classes, filters and policing. It is a modular design which can be used in most modern traffic control tasks and it can be exteded on will. It can create a DiffServ type of QoS.
Authors: Robert Zovko, Dubravko Žigman
What I learned: The history of virtualization and its advantages and disadvantages.
Authors: Jana Žiljak Vujić, Ljiljana Matuško Antonić, Slaven Crnjac
What I learned: Documents can be protected both with graphical watermarks as well with computer protections and online document databases. This paper also projected an interesting document printing protection system which protected the document during the printing process.
Authors: Petar Osterman
What I learned: Video conferencing when integrated into the learning process can help improve learning in group learning environments.
Authors: Damir Mehić, Dubravko Žigman, Danijela Pongrac
What I learned: VLANs are a great tool to help create network segmentation.
Authors: Nives Mikelić Preradović, Petar Jandrić
What I learned: Keeping video journals improves the learning process for all ages.
Authors: Han-Jen Niu, Yung-Sung Chiang, Hsien-Tang Tsai
What I learned: This paper tries to research the buying and economical habits of the japanese animation fandom.
Authors: Jennifer G. Steiner, Clifford Neuman, Jeffrey I. schiller
What I learned: This paper gives a detailed overview of the kerberos authentication protocol and how it operates.
Authors: Radia Perlman
What I learned: The inner working of the Spanning tree protocol used in networks switches.
Authors: Keith Decker, Anandeep Pannu, Katia Sycara, Mike Williamson
What I learned: The behaviour and design of Information agents. In a way this paper is a precursor to 3 tier applications as well as many modern smartphone applications and software bots.
Authors: Rudolf Ahlswede, ning Cai, Shuo-Yen Robert Li, Raymond W. Yeung
What I learned: How does information flow trough a network. Also this paper starts research on network coding rather than just broadcasting information trough all the switches.