Database pioneer Stonebraker rocks $1M ?°Nobel Prize in Comp - Bob Brown (3089 bytes) (2015-03-26)
System to automatically find a common type of programming bu - Massachusetts Institute of Technology (5177 bytes) (2015-03-25)
Supercomputers give universities a competitive edge - Clemson University (4668 bytes) (2015-03-25)
Cooperative software framework helps tame p~~ptoo bigp~~p da - Castellana VG (4790 bytes) (2015-03-25)
Computer programming: System automatically finds common type - Massachusetts Institute of Technology (6275 bytes) (2015-03-25)
New image-analysis methods can automate identification of co - David L. Chandler (7107 bytes) (2015-03-25)
Canp~pt remember your password? - Brandon Bailey (4756 bytes) (2015-03-20)
Intelligent computers solving the trust equation in difficul - A*STAR (3197 bytes) (2015-03-20)
Future robotics: Think self-fixing bridges; shoes that optim - University of Colorado at Boulder (3217 bytes) (2015-03-20)
OpenSSL fixes serious denial-of-service bug, 11 other flaws - Lucian Constantin (3835 bytes) (2015-03-19)
Windows 10 Eliminates Passwords - Kelly Sheridan (4379 bytes) (2015-03-18)
Socially intelligent computers can turn difficult online neg - Agency for Science (3007 bytes) (2015-03-18)
Researchers find same RSA encryption key used 28,000 times - Jeremy Kirk (3988 bytes) (2015-03-17)
Build your own Siri: An open-source digital assistant - University of Michigan (5840 bytes) (2015-03-15)
Mobile quarantine station for malicious android apps - University Saarland (3513 bytes) (2015-03-15)
Computer scientists present guarantees for online anonymity - Saarland University (3150 bytes) (2015-03-15)
In pursuit of the perfectly animated cloud of smoke - Technical University Munich (3199 bytes) (2015-03-15)
MIT launches three-pronged effort to thwart cyber attacks - Tim Greene (3603 bytes) (2015-03-14)
In pursuit of the perfectly animated cloud of smoke - James Gregson (3099 bytes) (2015-03-13)
Guarantees for online anonymity? - University Saarland (3056 bytes) (2015-03-13)
Researchers develop ?°visual Turing test?± - Kevin Stacey (3977 bytes) (2015-03-12)
Detecting deception online is not so easy, says professor - Iowa State University (4097 bytes) (2015-03-11)
The changing face of meetings - Sapuppo (3332 bytes) (2015-03-11)
Algorithm tests your Twitter skills and predicts virality of - Cornell (3615 bytes) (2015-03-11)
The changing face of meetings - Sapuppo (3330 bytes) (2015-03-11)
To stop the machines taking over we need to think about fuzz - Simon James (7570 bytes) (2015-03-10)
Chappie??s artificial intelligence asks real questions about - Bob Brown (2281 bytes) (2015-03-10)
Researchers design a type of Turing test for computer vision - Bob Yirka (7765 bytes) (2015-03-10)
Find out what your apps are really doing - University Saarland (3384 bytes) (2015-03-10)
Evolving robot brains - American Physical Society (2386 bytes) (2015-03-07)
Research reveals we may need a new definition for privacy - Carol Peters (6440 bytes) (2015-03-06)
Web Security Haunted by Freak Vulnerability - Shirley Siluk (4345 bytes) (2015-03-06)
Addressing the human brainp~ps big data challenge with Brain - Xerxes D. Arsiwalla (2225 bytes) (2015-03-05)
IEEE Rebooting Computing Launches Initiative to Rethink the - IEEE (4095 bytes) (2015-03-05)
Pennies reveal new insights on nature of randomness - Princeton University (3013 bytes) (2015-03-04)
Latest Web Security Bug Might FREAK You Out - Stephanie Mlot (2247 bytes) (2015-03-04)
Newly found online security flaw stems from 1990s - INRIA (2663 bytes) (2015-03-04)
Reading speed harnessed to automatically control text displa - University Saarland (3446 bytes) (2015-03-04)
New paper focuses on degree centrality in networks - William G. Gilroy (3793 bytes) (2015-02-26)
Linguists tackle computational analysis of grammar - Benjamin Recchie (4180 bytes) (2015-02-26)
HAL wins: Computer program bests humans at p~pSpace Invaders - Seth Borenstein (4207 bytes) (2015-02-26)
|