... |
... |
@@ -30,7 +30,7 @@ |
30 |
30 |
*** Signature (either by printing and scanning or with a valid digital signature) |
31 |
31 |
** Annex II: Duration of the processing |
32 |
32 |
** Annex III: Prospective Processors add to the list of technical and organisational measures carried out to ensure the security of the data, particularly in regard to the safety of the processing after downloading and decrypting the data. |
33 |
|
-* Prospective Processors send the signed document to the controller (michael.schirner@bih-charite.de and petra.ritter@bih-charite.de) which will evaluate and sign the agreement and arrange the transmission of the data. |
|
33 |
+* Prospective Processors send the signed document to the controller (petra.ritter@bih-charite.de) which will evaluate and sign the agreement and arrange the transmission of the data. |
34 |
34 |
|
35 |
35 |
== License note == |
36 |
36 |
|
... |
... |
@@ -38,7 +38,7 @@ |
38 |
38 |
|
39 |
39 |
== Reference publication == |
40 |
40 |
|
41 |
|
-Data access will be provided when the related publication “XYZ by XYZ” is published. |
|
41 |
+Schirner, Michael, Gustavo Deco, and Petra Ritter. "**Learning how network structure shapes decision-making for bio-inspired computing.**" //Nature Communications// 14.1 (2023): 2963. |
42 |
42 |
))) |
43 |
43 |
|
44 |
44 |
|