Contradictions in advanced cloud-computing research - University of California - San Diego (9589 bytes) (2013-09-11)
Detecting program-tampering in the cloud - Larry Hardesty (5871 bytes) (2013-09-11)
New Cryptography Could Result In More Secure Computing - Peter Suciu (3276 bytes) (2013-09-10)
Touch Goes Digital: Electronic Recording and Replay of Human - Doug Ramsey (5365 bytes) (2013-09-10)
Synthetic Speech System Puts a Dampener On Noisy Announcemen - University of Edinburgh (1650 bytes) (2013-09-09)
Precomputing speeds up cloth imaging - Cornell University (3764 bytes) (2013-09-05)
Researchers developing new systems to improve voice recognit - University of Texas at Dallas (5372 bytes) (2013-09-04)
Not enough data scientists, MIT expert tells Computing - Danny Palmer (2683 bytes) (2013-09-04)
Computer Program Predicts Functions of Bacterial Gene Regula - Jens Georg (2941 bytes) (2013-08-30)
Hack attacks, explained - Harvard University (4458 bytes) (2013-08-30)
For honest voting, write a message the p~pman in the middlep - Bill Steele (3687 bytes) (2013-08-29)
p~pZero knowledgep~p may answer computer security question - Bill Steele (3863 bytes) (2013-08-29)
MIT 3D Mapping Algorithm Solves Pesky ??Drift?? Problem - ee Rannals (2987 bytes) (2013-08-29)
Computer Graphics Honored By Katayanagi Prizes - Carnegie Mellon University (3175 bytes) (2013-08-29)
Model of p~pNear-Optimalp~p Genetic Code Developed - J. Jee (3192 bytes) (2013-08-28)
Linguistics Researcher Develops New System to Help Computers - University of Texas at Austin (1701 bytes) (2013-08-26)
Newly Discovered Flaw May Open The Tesla Model S To Potentia - Reuven Cohen (2947 bytes) (2013-08-23)
Encryption is less secure than we thought - Massachusetts Institute of Technolog (6569 bytes) (2013-08-23)
Virtual companions making interaction more social - CORDIS (3432 bytes) (2013-08-22)
Quantum Algorithm Could Improve Stealth Fighter Design - Johns Hopkins University Applied Physics (4284 bytes) (2013-08-21)
Quantum cryptography takes flight - Andrew Grant (1737 bytes) (2013-08-20)
Malware Bites and How to Stop It - Inderscience Publishers (2172 bytes) (2013-08-16)
Networking for high performance computing - CORDIS (3288 bytes) (2013-08-15)
Data-sharing scheme shows the way towards low-cost, flexible - Agency for Science, Technology and Rese (2636 bytes) (2013-08-15)
MySQL Workbench 6.0 Increases Productivity with New Design a - Redwood Shores (3855 bytes) (2013-08-13)
More Realistic Simulated Cloth for More Realistic Video Game - University of California - San Diego (4145 bytes) (2013-08-13)
IBM creates new foundation to program SyNAPSE chips inspired - IBM (6834 bytes) (2013-08-11)
IQ boost for web intelligence - University Vienna (4520 bytes) (2013-08-11)
IBMp~ps Cognitive Computing Software May Serve As Architectu - Modha (2704 bytes) (2013-08-10)
Coding for brain chips gives cognitive computing boost - Douglas Heaven (2440 bytes) (2013-08-10)
Visualization Tool Helps Researchers See Their Data Like Nev - ROLLA, Mo (4141 bytes) (2013-08-09)
IBM researchers get closer to brain-like computing - Jordan Novet (3746 bytes) (2013-08-09)
Integrating Left Brain and Right, on a Computer - Larry Greenemeier (5989 bytes) (2013-08-09)
IBM Develops Programming Language Inspired By The Human Brai - Alex Knapp (4445 bytes) (2013-08-08)
Public Key Cryptography Set To Fail In Five Years - Mike James (4496 bytes) (2013-08-08)
Making Connections in the Eye: Wiring Diagram of Retinal Neu - Massachusetts Institute of Technology (6447 bytes) (2013-08-08)
Throwing a Lifeline to Scientists Drowning in Data - Lawrence Berkeley (7531 bytes) (2013-08-06)
Reliable Communication, Unreliable Networks - Massachusetts Institute of Technology (6905 bytes) (2013-08-06)
You Should Be Afraid of Artificial Intelligence - John Havens (14853 bytes) (2013-08-05)
Anonymouth Hides Identity - Sue Gee (2820 bytes) (2013-08-05)
Georgia Tech uncovers iOS security weaknesses - Georgia Institute of Technology (3628 bytes) (2013-08-02)
|