News
This course is a survey of web technologies that are used to build back-end systems that enable rich web applications. Utilizing technologies such as Python, Flask, Docker, RDBMS/NoSQL databases, and ...
The ability to represent, manipulate, and analyze structured data sets is foundational to the modern practice of data science. This course introduces students to the fundamentals of data structures ...
Nagarajan, M. and Hearst, M.A., "An Examination of Language Use in Online Dating Profiles", Proceedings of the 3rd International Conference on Weblogs and Social Media, AAAI Press (2009).
How to store, process, analyze and make sense of Big Data is of increasing interest and importance to technology companies, a wide range of industries, and academic institutions. In this course, UC ...
The Master of Information Management and Systems (MIMS) program educates information professionals to provide leadership for an information-driven world. The Master of Information and Data Science ...
Nakov, P., Schwartz, A., and Hearst, M., Citances: Citation Sentences for Semantic Analysis of Bioscience Text, in the SIGIR'04 Workshop on Search and Discovery in ...
This course on generative AI blends the theoretical foundations of LLMs with hands-on applications. Topics include transformer architectures, prompt engineering, API integration, and retrieval ...
The Bangalore Boom: From Brain Drain to Brain Circulation in K. Keniston and D. Kumar, eds. IT Experience in India: Bridging the Digital Divide New Delhi: Sage Publications, 2004 ...
In this paper we apply theory and research from sociology and social psychology to the problem of collective information sharing and exchange on the internet. We investigate the relationships between ...
This course explores the most important elements beyond technology that shape the playing field on which cybersecurity problems emerge and are managed. The course emphasizes how ethical, legal, and ...
This essay explores the changing significance of gender in fiction, asking especially whether its prominence in characterization has varied from the end of the eighteenth century to the beginning of ...
An examination of corporate privacy management in the United States, Germany, Spain, France, and the United Kingdom, identifying international best practices and making policy recommendations. Barely ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results