Close Menu
CheraghchiCheraghchi
  • Home
  • Privacy Policy
  • Disclaimer
  • Disclaimer
  • About
  • Terms of Service
  • News
  • Research
  • Trending
What's Hot

How America’s Elite CS Theory PhD Programs Are Producing the Researchers Who Will Define the Next Decade of AI

May 2, 2026

The Water Cost of AI: The Hidden Environmental Toll of Training Large Language Models

May 1, 2026

At ‘AI Coachella,’ Stanford Students Line Up to Learn From Silicon Valley Royalty

May 1, 2026
  • All
  • Trending
  • News
  • Research
CheraghchiCheraghchi
Subscribe
  • Home
  • Privacy Policy
  • Disclaimer
  • Disclaimer
  • About
  • Terms of Service
  • News
  • Research
  • Trending
CheraghchiCheraghchi
Home » Privacy Policy

Privacy Policy

Who we are

Our website address is: http://cheraghchi.info.

Comments

When visitors leave comments on the site we collect the data shown in the comments form, and also the visitor’s IP address and browser user agent string to help spam detection.

An anonymized string created from your email address (also called a hash) may be provided to the Gravatar service to see if you are using it. The Gravatar service privacy policy is available here: https://automattic.com/privacy/. After approval of your comment, your profile picture is visible to the public in the context of your comment.

Media

If you upload images to the website, you should avoid uploading images with embedded location data (EXIF GPS) included. Visitors to the website can download and extract any location data from images on the website.

Cookies

If you leave a comment on our site you may opt-in to saving your name, email address and website in cookies. These are for your convenience so that you do not have to fill in your details again when you leave another comment. These cookies will last for one year.

If you visit our login page, we will set a temporary cookie to determine if your browser accepts cookies. This cookie contains no personal data and is discarded when you close your browser.

When you log in, we will also set up several cookies to save your login information and your screen display choices. Login cookies last for two days, and screen options cookies last for a year. If you select “Remember Me”, your login will persist for two weeks. If you log out of your account, the login cookies will be removed.

If you edit or publish an article, an additional cookie will be saved in your browser. This cookie includes no personal data and simply indicates the post ID of the article you just edited. It expires after 1 day.

Embedded content from other websites

Articles on this site may include embedded content (e.g. videos, images, articles, etc.). Embedded content from other websites behaves in the exact same way as if the visitor has visited the other website.

These websites may collect data about you, use cookies, embed additional third-party tracking, and monitor your interaction with that embedded content, including tracking your interaction with the embedded content if you have an account and are logged in to that website.

Who we share your data with

If you request a password reset, your IP address will be included in the reset email.

How long we retain your data

If you leave a comment, the comment and its metadata are retained indefinitely. This is so we can recognize and approve any follow-up comments automatically instead of holding them in a moderation queue.

For users that register on our website (if any), we also store the personal information they provide in their user profile. All users can see, edit, or delete their personal information at any time (except they cannot change their username). Website administrators can also see and edit that information.

What rights you have over your data

If you have an account on this site, or have left comments, you can request to receive an exported file of the personal data we hold about you, including any data you have provided to us. You can also request that we erase any personal data we hold about you. This does not include any data we are obliged to keep for administrative, legal, or security purposes.

Where your data is sent

Visitor comments may be checked through an automated spam detection service.

Research

How America’s Elite CS Theory PhD Programs Are Producing the Researchers Who Will Define the Next Decade of AI

contact@samadtech.comMay 2, 2026

Every Tuesday afternoon, the scene on the fourth floor of MIT’s Stata Center is consistently…

The Water Cost of AI: The Hidden Environmental Toll of Training Large Language Models

May 1, 2026

At ‘AI Coachella,’ Stanford Students Line Up to Learn From Silicon Valley Royalty

May 1, 2026
Most Popular

How America’s Elite CS Theory PhD Programs Are Producing the Researchers Who Will Define the Next Decade of AI

May 2, 20260 Views

The Water Cost of AI: The Hidden Environmental Toll of Training Large Language Models

May 1, 20260 Views

At ‘AI Coachella,’ Stanford Students Line Up to Learn From Silicon Valley Royalty

May 1, 20260 Views
About
About

The research published here sits at the boundary of theoretical computer science, coding theory, information theory, and cryptography. The central questions driving this work are mathematical in nature: what are the fundamental limits of reliable communication over noisy channels? How much information can be protected against adversarial tampering? How can high-dimensional sparse signals be recovered from few measurements? How does randomness help — or hinder — efficient computation?
These questions matter both as deep mathematical problems and as foundations for practical systems in data storage, communications, privacy, and security.

Discalimer

This website makes research papers, preprints, and manuscripts accessible for scholarly and instructional purposes. Research findings are subject to revision, correction, and peer review even though every attempt is made to ensure accuracy. The final published versions of preprints and manuscripts may be different from those posted here. For reference and citation purposes, readers should refer to the official published versions. A paper is not endorsed by any journal, conference, or publisher just because it appears on this website.

No Expert Guidance
This website does not provide any legal, financial, investment, medical, or other professional advice. Applications in communications, cryptography, data security, and computer systems are the subject of theoretical and scholarly research discussions. They shouldn’t be used as a guide when making operational, financial, or commercial decisions. A qualified professional should be consulted by readers who need professional advice.

Disclosure of Finances
Under grants NSF CCF-2107345 and NSF CCF-2006455, the US National Science Foundation provided partial funding for research carried out and published through this website. This funding does not constitute a financial stake in any commercial product, business, or technology; rather, it solely supports academic research activities.
This website doesn’t accept sponsored content, run advertisements, or get paid for highlighting, endorsing, or linking to any goods, services, or businesses. Any external links are not endorsements or commercial relationships; they are only included for academic reference and convenience.
Any business or product that may be discussed or cited in research published on this website has no financial stake in the author and is not compensated by them. Any significant changes to this will be made publicly known.

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Privacy Policy
  • Disclaimer
  • Disclaimer
  • About
  • Terms of Service
  • News
  • Research
  • Trending
© 2026 ThemeSphere. Designed by ThemeSphere.

Type above and press Enter to search. Press Esc to cancel.