TechNews Pictorial PriceGrabber Video Tue Nov 26 20:44:49 2024

PopYard--computer

[First][Next][Previous] Page 27
| computer | electronics | industries | education | careers | government | business |

  • From the depths of a microscopic world, spontaneous cooperat - Carl R. Woese Institute for Genomic Biol (4439 bytes) (2015-05-10)
  • System designed to label visual scenes turns out to detect p - Massachusetts Institute of Technology (6291 bytes) (2015-05-10)
  • How Difficult is it to Break Encryption? - Veronica Jackson, Andrew Konia, Clare Le (3636 bytes) (2015-05-10)
  • Quantum Computing Gets an OS - Graham Prophet (1631 bytes) (2015-05-06)
  • New gold standard established for open and reproducible rese - Matthew (4116 bytes) (2015-05-04)
  • Algorithm combines videos from unstructured camera arrays in - Disney Research (2862 bytes) (2015-05-04)
  • Online voting a step closer thanks to breakthrough in securi - University of Birmingham (3037 bytes) (2015-05-01)
  • Enron becomes unlikely data source for computer science rese - Matt Shipman (3776 bytes) (2015-04-30)
  • Computers are knocking on the door of the company boardroom - Graham Kendall (5340 bytes) (2015-04-30)
  • Computer program to take on worldp~ps best in Texas Hold p~p - Carnegie Mellon University (2148 bytes) (2015-04-26)
  • Reducing big data using ideas from quantum theory makes it e - M. De Domenico (2633 bytes) (2015-04-26)
  • With ransomware on the rise, cryptographers take it personal - Lucian Constantin (4780 bytes) (2015-04-25)
  • Cloud security reaches silicon: System for defending against - Massachusetts Institute of Technology (6008 bytes) (2015-04-22)
  • Computer scientists present guarantees for online anonymity - Saarland University (3152 bytes) (2015-04-18)
  • Research identifies barriers in tracking meals and what food - Georgia Institute of Technology (4442 bytes) (2015-04-18)
  • The long, strange life, death, and rebirth of Java - Andy Patrizio (15017 bytes) (2015-04-17)
  • How Twitter Can Help Predict Emergency Room Visits - Alexis Blue (6583 bytes) (2015-04-17)
  • Microsoft makes debugging PHP less painful with new Azure to - Joab Jackson (2475 bytes) (2015-04-17)
  • Analysis of mobile phone data applied to economic and social - Carlos III University of Madrid (8243 bytes) (2015-04-16)
  • Fighting the next generation of cyberattacks - University of Utah (3863 bytes) (2015-04-16)
  • Researchers send out an extensive look into email behavior - University of Missouri-Columbia (4983 bytes) (2015-04-14)
  • Ebola analysis finds virus hasnp~pt become deadlier, yet - University of Manchester (4205 bytes) (2015-04-14)
  • Algorithm able to identify online trolls - Bob Yirka (3858 bytes) (2015-04-14)
  • Probabilistic programming does in 50 lines of code what used - Larry Hardesty (6020 bytes) (2015-04-13)
  • p~pDarwin Nukep~p Vulnerability Discovered in Applep~ps OS X - Jennifer LeClaire (2921 bytes) (2015-04-11)
  • Stanford Computer Scientists Develop ?°Troll-Spotting Algori - Charles Johnson (1421 bytes) (2015-04-11)
  • Computer surveillance is a trade-off - Ced Kurtz (3022 bytes) (2015-04-07)
  • Teaching a Computer Not to Forget - drienne LaFrance (2583 bytes) (2015-04-07)
  • The hazards of presumptive computing - Michael Cowling (6434 bytes) (2015-04-03)
  • Crowdsourced tool for depression - Massachusetts Institute of Technology (6713 bytes) (2015-03-31)
  • Professor analyzes online data to predict future fashion tre - Moriah Nastasi (7574 bytes) (2015-03-31)
  • Big data allows computer engineers to find genetic clues in - Washington University in St. Louis (5690 bytes) (2015-03-30)
  • Novel graph method detects cyber-attack patterns in complex - Choudhury S, L Holder, G Chin Jr, K Agar (5009 bytes) (2015-03-30)
  • The brain in the supermarket: Index strategy informs decisio - Massachusetts Institute of Technology (5011 bytes) (2015-03-30)
  • Virginia Tech powers DNA analysis with PC parallel computing - Cliff Saran (3146 bytes) (2015-03-29)
  • Better Debugger: Algorithm Automatically Finds Integer-overf - Larry Hardesty (6064 bytes) (2015-03-29)
  • Quantum compute this -- WSU mathematicians build code to tak - Washington State University (4209 bytes) (2015-03-27)
  • Many password strength meters are downright WEAK, researcher - Bob Brown (3329 bytes) (2015-03-27)
  • Computer science professor Allison Lewko specializes in prot - Zoe Wood (4110 bytes) (2015-03-26)
  • Java: The once and future king of Internet programming - Cameron Laird (11995 bytes) (2015-03-26)
  • Database pioneer Stonebraker rocks $1M ?°Nobel Prize in Comp - Bob Brown (3089 bytes) (2015-03-26)

  • © 2021 PopYard - Technology for Today!| about us | privacy policy |