Professor proposes alternative to p~pTuring Testp~p - Georgia Tech (2682 bytes) (2014-11-26)
Bitcoin, virtual money: Userp~ps identity can be revealed mu - Universit (590 bytes) (2014-11-26)
Supercomputing 2014 Sets New Records - SC14 (3017 bytes) (2014-11-25)
Donp~pt get hacked! Research shows how much we ignore online - Brigham Young University (3635 bytes) (2014-11-24)
New computer model predicts gut metabolites to better unders - Kyongbum (4313 bytes) (2014-11-24)
Turing Test Alternative Proposed By Georgia Tech??s Mark Rie - Chuck Bednar (3447 bytes) (2014-11-24)
Does being first in supercomputing still matter? - Patrick Thibodeau (4667 bytes) (2014-11-21)
Attackers use Citadel malware to target password management - Lucian Constantin (3217 bytes) (2014-11-21)
An alternative to the p~pTuring Testp~p for artificial intel - Georgia Tech (2680 bytes) (2014-11-20)
Testing if a computer has human-level intelligence: Alternat - Georgia Institute of Technology (2673 bytes) (2014-11-19)
Researchers create first image-recognition software that gre - Dartmouth College (2769 bytes) (2014-11-18)
Converting data into knowledge - Jessica Stoller-Conrad (7521 bytes) (2014-11-17)
Artificial Intelligence Creates Magic Tricks - Williams H and McOwan (2653 bytes) (2014-11-17)
Magic tricks created using artificial intelligence for the f - University of Queen Mary London (3137 bytes) (2014-11-17)
Model for evaluating product-recommendation algorithms sugge - Larry Hardesty (5528 bytes) (2014-11-14)
Self-repairing software tackles malware - University of Utah (4837 bytes) (2014-11-14)
Software models more detailed evolutionary networks from gen - Rice University (3973 bytes) (2014-11-13)
p~pMasque Attackp~p Bug Threatens iOS Users - tephanie Mlot (3151 bytes) (2014-11-11)
Cyber-Attackers Creating More Sophisticated Apple OS Malware - Robert Lemos (3316 bytes) (2014-11-10)
Cybersecurity experts discover lapses in Heartbleed bug fix - University of Maryland (3416 bytes) (2014-11-09)
Dynamic graph analytics tackle social media and other big da - Georgia Institute of Technology (5446 bytes) (2014-11-07)
New research shows vulnerability in mobile phones?? applicat - University of Alabama at Birmingham (5467 bytes) (2014-11-06)
New Malware Targets Apple Devices - Palo Alto Networks (1791 bytes) (2014-11-06)
Next for DARPA: p~~pAutocompletep~~p for programmers - Rice University (3594 bytes) (2014-11-05)
Crypto attack that hijacked Windows Update goes mainstream i - Dan Goodin (7047 bytes) (2014-11-05)
Computer scientist sees new possibilities for ocular biometr - National Science Foundation (2579 bytes) (2014-11-04)
Raising cryptographyp~ps standards - Massachusetts Institute of Technology (6219 bytes) (2014-11-04)
Want to fairly split rent or share credit? CMUp~ps got a web - Justine Coyne (1797 bytes) (2014-11-04)
Automata processing naturally inspired by neural networks - Micron (2180 bytes) (2014-11-02)
Researcher aims to develop system to detect app clones on An - Pennsylvania State University (7796 bytes) (2014-11-02)
Calculating encryption schemesp~p theoretical security guara - Larry Hardesty (7043 bytes) (2014-11-01)
Ant behavior might shed insight on problems facing electroni - Virginia Tech (4362 bytes) (2014-11-01)
Harnessing error-prone chips: New system would allow program - Massachusetts Institute of Technology (5855 bytes) (2014-10-31)
How to leak sensitive data from an isolated computer (air-ga - Ben Gurion University (1802 bytes) (2014-10-29)
Saving lots of computing capacity with a new algorithm - University of Luxembourg (3298 bytes) (2014-10-29)
Identifying p~pstance takingp~p cues to enable sophisticated - Presentation #2pSC18 (4120 bytes) (2014-10-28)
CrypTool: experiment with cryptographic algorithms - Martin Brinkmann (2750 bytes) (2014-10-27)
Powerful new software plug-in detects bugs in spreadsheets - University of Massachusetts Amherst (3411 bytes) (2014-10-24)
Scientists track Internet usage as it pulses across the glob - University of Southern California (2141 bytes) (2014-10-22)
Computer scientists can predict the price of Bitcoin - Adam Conner-Simons (3298 bytes) (2014-10-22)
Researchers developing algorithms to detect fake reviews - Mike Krings (4003 bytes) (2014-10-22)
|