Computing goes beyond keyboards, can now be controlled even - Nandagopal Rajan (2824 bytes) (2014-03-11)
Red Hat programmer discovers major security flaw in Linux - Bob Yirka (2384 bytes) (2014-03-08)
Data gains power through graphics and charts - Beth Giudicessi (5103 bytes) (2014-03-07)
The future of biometric technology - Michelle Wheeler (2759 bytes) (2014-03-07)
Software analyzes apps for malicious behavior - University Saarland (644 bytes) (2014-03-07)
When Disaster Strikes: Safeguarding Networks - (S. Ferdousi (3684 bytes) (2014-03-06)
Computational study finds maximum packing density of 55,000 - Bob Yirka (4086 bytes) (2014-03-05)
New technique targets C code to spot, contain malware attack - North Carolina State University (3340 bytes) (2014-03-05)
Copied from nature: Detecting software errors via genetic al - University Saarland (2946 bytes) (2014-03-05)
New technique targets C code to spot, contain malware attack - Matt Shipman (4394 bytes) (2014-03-04)
New book details a new theory of information propagation in - Larry Hardesty (5283 bytes) (2014-03-04)
Jarvis is an intelligent OS inspired by Iron Man - Nandagopal Rajan (2730 bytes) (2014-03-04)
Keeping pace with the data explosion - Robert W. Fisher (6517 bytes) (2014-03-03)
Researchers develop cluster management tool that triples ser - Stanford University (8294 bytes) (2014-03-03)
Ease and security of password protections improved - University of Alabama at Birmingham (4062 bytes) (2014-03-03)
New search engine delivers content matched to ability - Jim Steele (5470 bytes) (2014-03-01)
Talking in 3D: Discussing and administrating complex constru - EurekAlert (3724 bytes) (2014-02-27)
Wacom??s New WILL Project Aims To Make A New Universal Compu - Darrell Etherington (1727 bytes) (2014-02-27)
Software maps ambiguous names in texts to the right person - University Saarland (3388 bytes) (2014-02-27)
Creating animated characters outdoors - University Saarland (3336 bytes) (2014-02-26)
ScienceDaily: Your source for the latest research news Feat - Massachusetts Institute of Technology (5074 bytes) (2014-02-26)
First contagious airborne WiFi virus discovered - University of Liverpool (2331 bytes) (2014-02-26)
How do you build a large-scale quantum computer? - Joint Quantum Institute, University of M (5567 bytes) (2014-02-26)
Computers will be smarter than even the smartest people - Evann Gastaldo (1100 bytes) (2014-02-25)
What researchers can learn from the #selfie - City University of New York (1942 bytes) (2014-02-25)
Applep~ps OS X security hole affects slew of apps - Trevor Mogg (1987 bytes) (2014-02-25)
EU project to build lie detector for social media - University of Sheffield (3275 bytes) (2014-02-24)
Deep Learning: Teaching Computers To Tell Things Apart - Geoff Brumfie (3821 bytes) (2014-02-22)
Researchers develop automated technologies to analyze causes - DARPA (4321 bytes) (2014-02-22)
Computer generated math proof is too large for humans to ch - arXiv (3753 bytes) (2014-02-19)
Faster searches on computers and hand-held devices - Case Western Reserve University (7102 bytes) (2014-02-19)
Computer arranges pictures based on their artistic aspects - Saarland University (3038 bytes) (2014-02-18)
Artificial Intelligence Pioneer Gives ??Her?? A Thumbs Up - DAVID BLOOM (3089 bytes) (2014-02-18)
IPython founder details road map for interactive computing p - Paul Krill (9751 bytes) (2014-02-15)
The Dawn of the Age of Artificial Intelligence - Joel Ryan (9970 bytes) (2014-02-15)
Data links quick fix - University of Isfahan (2874 bytes) (2014-02-13)
Quantum computers could crack existing codes but create othe - David Kielpinski (6486 bytes) (2014-02-13)
The physics of curly hair: Researchers develop first detaile - Massachusetts Institute of Technology (5714 bytes) (2014-02-13)
The Quantum Quest for a Revolutionary Computer - Lev Grossman (1571 bytes) (2014-02-12)
Computer scientist looks for deeper meaning in webcam videos - Keith Hautala (1726 bytes) (2014-02-11)
Biometrics on a mass scale - University of Cambridge (7458 bytes) (2014-02-10)
|