TechNews Pictorial PriceGrabber Video Tue Nov 26 12:21:05 2024

PopYard--computer

[First][Next][Previous] Page 23
| computer | electronics | industries | education | careers | government | business |

  • Researchers present new breakthroughs for fundamental proble - University of Bristol (4726 bytes) (2015-10-26)
  • Simulating two types of brain cells may allow robots to navi - Bob Yirka (2072 bytes) (2015-10-26)
  • Computer Security and Privacy: Benefits and Risks of the Int - NSF (6135 bytes) (2015-10-26)
  • Artificial intelligence can go wrong ? but how will we know? - Mary Branscombe (13662 bytes) (2015-10-26)
  • New Optimization Algorithm Promises Order-of-magnitude Speed - Larry Hardesty (5201 bytes) (2015-10-25)
  • New breakthroughs for fundamental problems in computer scien - University of Bristol (4708 bytes) (2015-10-22)
  • The Search for the God Algorithm - Tantalizing (8023 bytes) (2015-10-21)
  • Comet: A supercomputer for the p~plong tailp~p of science - NSF (5968 bytes) (2015-10-21)
  • Crypto researchers: Time to use something better than 1024-b - Tim Greene (4775 bytes) (2015-10-20)
  • C++ Turns 30 ? Looking Forward to the Future - Rud Merriam (1307 bytes) (2015-10-19)
  • Big Data Analysis System Replaces Human Intuition with Algor - Larry Hardesty (5131 bytes) (2015-10-19)
  • UCF software helps count heads in large crowds - UCF (801 bytes) (2015-10-19)
  • Fundamental Problems in Computer Science see New Breakthroug - University of Bristol (4626 bytes) (2015-10-19)
  • New tool: How to get meaningful information out of big data - University of Southern Denmark (3223 bytes) (2015-10-17)
  • Think twice about android root - University of California - Riverside (4244 bytes) (2015-10-17)
  • New research method identifies stealth attacks on complicate - Virginia Tech (3623 bytes) (2015-10-17)
  • How to Protect Yourself from NSA Attacks on 1024-bit DH - Joseph Bonneau and Bill Budington (4923 bytes) (2015-10-16)
  • New research method identifies stealth attacks on complicate - Virginia Tech (3673 bytes) (2015-10-13)
  • Researchers create method of detecting most violent behavior - Harvard University (3472 bytes) (2015-10-12)
  • When Military Robots Can Predict Your Next Move - University of Illinois (4803 bytes) (2015-10-12)
  • Meet the virtual woman who may take your job - Patrick Thibodeau (1655 bytes) (2015-10-11)
  • Cloud Computing Finally Gets Some Startups - Jack Clark (4553 bytes) (2015-10-09)
  • Theoretical computer science provides answers to data privac - National Science Foundation (8165 bytes) (2015-10-08)
  • Psychic Robot will know What You Really Meant to Do - Jeanne Galatzer-Levy (3061 bytes) (2015-10-08)
  • Predicting Change in the Alzheimer’s Brain - Larry Hardesty (5633 bytes) (2015-10-07)
  • How artificial intelligence could lead to self-healing airpl - Dominic Basulto (6417 bytes) (2015-10-07)
  • The fastest and bestest way to learn how to do computer imag - Mark Gibbs (3714 bytes) (2015-10-05)
  • Cloud computing: A data-centric business model - Kevin Jackson (7204 bytes) (2015-10-04)
  • New supercomputer software takes one giant step closer to si - Wendy Ellison (3196 bytes) (2015-10-02)
  • Extending a batteryp~ps lifetime with heat - AIP (3535 bytes) (2015-10-02)
  • More-flexible machine learning - Massachusetts Institute of Technology (6367 bytes) (2015-10-02)
  • Science DMZ Infrastructure Architecture Breaks down Barriers - Berkeley Lab Computing Sciences (19314 bytes) (2015-10-02)
  • UC Berkeley, Stanford researchers win MacArthur p~pgenius gr - Joe Rodriguez (4294 bytes) (2015-09-30)
  • Quantum Computing Kills Encryption - Elliot Williams (7740 bytes) (2015-09-30)
  • US biotech to apply artificial intelligence to UK genome stu - Julie Steenhuysen (2841 bytes) (2015-09-30)
  • Automated voice imitation can fool humans and machines - University of Alabama at Birmingham (6799 bytes) (2015-09-28)
  • Artificial Intelligence To Improve Breast Cancer Patient Out - Rogan (2964 bytes) (2015-09-28)
  • The new cyber kill chain - Ayse Kaya Firat, CloudLock (5500 bytes) (2015-09-28)
  • Scientists stop and search malware hidden in shortened urls - Engineering and Physical Sciences Resear (4379 bytes) (2015-09-26)
  • Linux creator explains why a truly secure computing platform - Andy Meek (6203 bytes) (2015-09-26)
  • Learning language by playing games - Larry Hardesty (5382 bytes) (2015-09-25)

  • © 2021 PopYard - Technology for Today!| about us | privacy policy |