TechNews Pictorial PriceGrabber Video Wed Nov 27 05:29:42 2024

PopYard--computer

[First][Next][Previous] Page 31
| computer | electronics | industries | education | careers | government | business |

  • Professor proposes alternative to p~pTuring Testp~p - Georgia Tech (2682 bytes) (2014-11-26)
  • Bitcoin, virtual money: Userp~ps identity can be revealed mu - Universit (590 bytes) (2014-11-26)
  • Supercomputing 2014 Sets New Records - SC14 (3017 bytes) (2014-11-25)
  • Donp~pt get hacked! Research shows how much we ignore online - Brigham Young University (3635 bytes) (2014-11-24)
  • New computer model predicts gut metabolites to better unders - Kyongbum (4313 bytes) (2014-11-24)
  • Turing Test Alternative Proposed By Georgia Tech??s Mark Rie - Chuck Bednar (3447 bytes) (2014-11-24)
  • Does being first in supercomputing still matter? - Patrick Thibodeau (4667 bytes) (2014-11-21)
  • Attackers use Citadel malware to target password management - Lucian Constantin (3217 bytes) (2014-11-21)
  • An alternative to the p~pTuring Testp~p for artificial intel - Georgia Tech (2680 bytes) (2014-11-20)
  • Testing if a computer has human-level intelligence: Alternat - Georgia Institute of Technology (2673 bytes) (2014-11-19)
  • Researchers create first image-recognition software that gre - Dartmouth College (2769 bytes) (2014-11-18)
  • Converting data into knowledge - Jessica Stoller-Conrad (7521 bytes) (2014-11-17)
  • Artificial Intelligence Creates Magic Tricks - Williams H and McOwan (2653 bytes) (2014-11-17)
  • Magic tricks created using artificial intelligence for the f - University of Queen Mary London (3137 bytes) (2014-11-17)
  • Model for evaluating product-recommendation algorithms sugge - Larry Hardesty (5528 bytes) (2014-11-14)
  • Self-repairing software tackles malware - University of Utah (4837 bytes) (2014-11-14)
  • Software models more detailed evolutionary networks from gen - Rice University (3973 bytes) (2014-11-13)
  • p~pMasque Attackp~p Bug Threatens iOS Users - tephanie Mlot (3151 bytes) (2014-11-11)
  • Cyber-Attackers Creating More Sophisticated Apple OS Malware - Robert Lemos (3316 bytes) (2014-11-10)
  • Cybersecurity experts discover lapses in Heartbleed bug fix - University of Maryland (3416 bytes) (2014-11-09)
  • Dynamic graph analytics tackle social media and other big da - Georgia Institute of Technology (5446 bytes) (2014-11-07)
  • New research shows vulnerability in mobile phones?? applicat - University of Alabama at Birmingham (5467 bytes) (2014-11-06)
  • New Malware Targets Apple Devices - Palo Alto Networks (1791 bytes) (2014-11-06)
  • Next for DARPA: p~~pAutocompletep~~p for programmers - Rice University (3594 bytes) (2014-11-05)
  • Crypto attack that hijacked Windows Update goes mainstream i - Dan Goodin (7047 bytes) (2014-11-05)
  • Computer scientist sees new possibilities for ocular biometr - National Science Foundation (2579 bytes) (2014-11-04)
  • Raising cryptographyp~ps standards - Massachusetts Institute of Technology (6219 bytes) (2014-11-04)
  • Want to fairly split rent or share credit? CMUp~ps got a web - Justine Coyne (1797 bytes) (2014-11-04)
  • Automata processing naturally inspired by neural networks - Micron (2180 bytes) (2014-11-02)
  • Researcher aims to develop system to detect app clones on An - Pennsylvania State University (7796 bytes) (2014-11-02)
  • Calculating encryption schemesp~p theoretical security guara - Larry Hardesty (7043 bytes) (2014-11-01)
  • Ant behavior might shed insight on problems facing electroni - Virginia Tech (4362 bytes) (2014-11-01)
  • Harnessing error-prone chips: New system would allow program - Massachusetts Institute of Technology (5855 bytes) (2014-10-31)
  • How to leak sensitive data from an isolated computer (air-ga - Ben Gurion University (1802 bytes) (2014-10-29)
  • Saving lots of computing capacity with a new algorithm - University of Luxembourg (3298 bytes) (2014-10-29)
  • Identifying p~pstance takingp~p cues to enable sophisticated - Presentation #2pSC18 (4120 bytes) (2014-10-28)
  • CrypTool: experiment with cryptographic algorithms - Martin Brinkmann (2750 bytes) (2014-10-27)
  • Powerful new software plug-in detects bugs in spreadsheets - University of Massachusetts Amherst (3411 bytes) (2014-10-24)
  • Scientists track Internet usage as it pulses across the glob - University of Southern California (2141 bytes) (2014-10-22)
  • Computer scientists can predict the price of Bitcoin - Adam Conner-Simons (3298 bytes) (2014-10-22)
  • Researchers developing algorithms to detect fake reviews - Mike Krings (4003 bytes) (2014-10-22)

  • © 2021 PopYard - Technology for Today!| about us | privacy policy |