From the depths of a microscopic world, spontaneous cooperat - Carl R. Woese Institute for Genomic Biol (4439 bytes) (2015-05-10)
System designed to label visual scenes turns out to detect p - Massachusetts Institute of Technology (6291 bytes) (2015-05-10)
How Difficult is it to Break Encryption? - Veronica Jackson, Andrew Konia, Clare Le (3636 bytes) (2015-05-10)
Quantum Computing Gets an OS - Graham Prophet (1631 bytes) (2015-05-06)
New gold standard established for open and reproducible rese - Matthew (4116 bytes) (2015-05-04)
Algorithm combines videos from unstructured camera arrays in - Disney Research (2862 bytes) (2015-05-04)
Online voting a step closer thanks to breakthrough in securi - University of Birmingham (3037 bytes) (2015-05-01)
Enron becomes unlikely data source for computer science rese - Matt Shipman (3776 bytes) (2015-04-30)
Computers are knocking on the door of the company boardroom - Graham Kendall (5340 bytes) (2015-04-30)
Computer program to take on worldp~ps best in Texas Hold p~p - Carnegie Mellon University (2148 bytes) (2015-04-26)
Reducing big data using ideas from quantum theory makes it e - M. De Domenico (2633 bytes) (2015-04-26)
With ransomware on the rise, cryptographers take it personal - Lucian Constantin (4780 bytes) (2015-04-25)
Cloud security reaches silicon: System for defending against - Massachusetts Institute of Technology (6008 bytes) (2015-04-22)
Computer scientists present guarantees for online anonymity - Saarland University (3152 bytes) (2015-04-18)
Research identifies barriers in tracking meals and what food - Georgia Institute of Technology (4442 bytes) (2015-04-18)
The long, strange life, death, and rebirth of Java - Andy Patrizio (15017 bytes) (2015-04-17)
How Twitter Can Help Predict Emergency Room Visits - Alexis Blue (6583 bytes) (2015-04-17)
Microsoft makes debugging PHP less painful with new Azure to - Joab Jackson (2475 bytes) (2015-04-17)
Analysis of mobile phone data applied to economic and social - Carlos III University of Madrid (8243 bytes) (2015-04-16)
Fighting the next generation of cyberattacks - University of Utah (3863 bytes) (2015-04-16)
Researchers send out an extensive look into email behavior - University of Missouri-Columbia (4983 bytes) (2015-04-14)
Ebola analysis finds virus hasnp~pt become deadlier, yet - University of Manchester (4205 bytes) (2015-04-14)
Algorithm able to identify online trolls - Bob Yirka (3858 bytes) (2015-04-14)
Probabilistic programming does in 50 lines of code what used - Larry Hardesty (6020 bytes) (2015-04-13)
p~pDarwin Nukep~p Vulnerability Discovered in Applep~ps OS X - Jennifer LeClaire (2921 bytes) (2015-04-11)
Stanford Computer Scientists Develop ?°Troll-Spotting Algori - Charles Johnson (1421 bytes) (2015-04-11)
Computer surveillance is a trade-off - Ced Kurtz (3022 bytes) (2015-04-07)
Teaching a Computer Not to Forget - drienne LaFrance (2583 bytes) (2015-04-07)
The hazards of presumptive computing - Michael Cowling (6434 bytes) (2015-04-03)
Crowdsourced tool for depression - Massachusetts Institute of Technology (6713 bytes) (2015-03-31)
Professor analyzes online data to predict future fashion tre - Moriah Nastasi (7574 bytes) (2015-03-31)
Big data allows computer engineers to find genetic clues in - Washington University in St. Louis (5690 bytes) (2015-03-30)
Novel graph method detects cyber-attack patterns in complex - Choudhury S, L Holder, G Chin Jr, K Agar (5009 bytes) (2015-03-30)
The brain in the supermarket: Index strategy informs decisio - Massachusetts Institute of Technology (5011 bytes) (2015-03-30)
Virginia Tech powers DNA analysis with PC parallel computing - Cliff Saran (3146 bytes) (2015-03-29)
Better Debugger: Algorithm Automatically Finds Integer-overf - Larry Hardesty (6064 bytes) (2015-03-29)
Quantum compute this -- WSU mathematicians build code to tak - Washington State University (4209 bytes) (2015-03-27)
Many password strength meters are downright WEAK, researcher - Bob Brown (3329 bytes) (2015-03-27)
Computer science professor Allison Lewko specializes in prot - Zoe Wood (4110 bytes) (2015-03-26)
Java: The once and future king of Internet programming - Cameron Laird (11995 bytes) (2015-03-26)
Database pioneer Stonebraker rocks $1M ?°Nobel Prize in Comp - Bob Brown (3089 bytes) (2015-03-26)
|