AI found better at diagnosing, treating patients, than docto - Lucas Mearian (3834 bytes) (2013-02-14)
Scientists Create Automated p~pTime Machinep~p to Reconstruc - A. Bouchard-Cote (4933 bytes) (2013-02-13)
Pushing Boundaries of Virtual Reality - University of Texas, Dallas (5771 bytes) (2013-02-07)
The largest prime number yet discovered ¨C all 17 million di - Bettmann/Corbis (2108 bytes) (2013-02-06)
Microsoft / Technion effort mines old news for predictions - Nancy Owano (2925 bytes) (2013-02-05)
Biometrics Using Internal Body Parts: Knobbly Knees in Compe - Lior Shamir. (2407 bytes) (2013-01-25)
Grammar badness makes cracking harder the long password - Dan Goodin (5885 bytes) (2013-01-24)
The p~~pSciencep~~p in Computer Science - Piaw (2772 bytes) (2013-01-22)
Java software said to put computers in peril - CERT (1066 bytes) (2013-01-11)
How computer scientists are trying to stop smartphones and t - Dipankar Raychaudhuri (2881 bytes) (2013-01-11)
The day Watson the super computer learned to swear - Martha Gill (1573 bytes) (2013-01-11)
Solving Puzzles Without a Picture: New Algorithm Assembles C - Andy Fell (3491 bytes) (2013-01-11)
New algorithm for message dissemination in decentralized net - Larry Hardesty (5217 bytes) (2013-01-09)
Spear phishing: Researchers work to counter email attacks th - John Toon (5603 bytes) (2013-01-09)
Measuring image quality made easier with new computational m - Aalto University (3401 bytes) (2013-01-09)
Analysis: data scientists ¨C a case of quality versus quanti - Sooraj Shah (4317 bytes) (2013-01-09)
All computing isn??t equal: Here are the four types - Stacey Higginbotham (6016 bytes) (2013-01-08)
The future of the internet - Matt Warman (5399 bytes) (2013-01-08)
Computer Scientists Find Vulnerabilities in Cisco VoIP Phone - Holly Evarts (4326 bytes) (2013-01-07)
Software detects and extracts text from within video frames, - Shivakumara, P., Sreedhar, R. P., Phan, (2856 bytes) (2013-01-04)
Developing for wearable brain-powered Artificial Intelligenc - Adrian Bridgwater (2140 bytes) (2013-01-04)
How Computers Push On the Molecules They Simulate - David A. Sivak, John D. Chodera, Gavin E (5568 bytes) (2013-01-04)
Ubuntu mobile OS has potential, but therep~ps a long, uncert - Ben Woods (4735 bytes) (2013-01-03)
The algorithmic origins of life - Sara I. Walker, Paul C. W. Davies (1483 bytes) (2013-01-02)
Tool to Evaluate Genome Sequencing Method Developed - Francesco Vezzi, Giuseppe Narzisi, Bud M (4526 bytes) (2013-01-02)
Ubuntu operating system comes to Android smartphones - Leo Kelion (5230 bytes) (2013-01-02)
Artificial intelligence project is creates recipe ideas - Lav Varshney (506 bytes) (2013-01-01)
Monkey See, Monkey Do: Visual Feedback Is Necessary for Imit - R. Cook (2163 bytes) (2012-12-28)
TED TALK: Algorithms Are Controlling Your World - Linette Lopez (1726 bytes) (2012-12-26)
Viewpoint: Computer code frees us to think in new ways - Tom Armitage (6136 bytes) (2012-12-26)
Top 12 Security Slideshows of 2012 - Thor Olavsrud (2594 bytes) (2012-12-25)
FACT: Hackers Know Your Password in Less Than 6 Hours - J. D. Redmond (3349 bytes) (2012-12-24)
Mathematical technique gives researchers access to personal - Erica Klarreich (24219 bytes) (2012-12-20)
Follow the eyes: Head-mounted cameras could help robots unde - Carnegie Mellon University (384 bytes) (2012-12-20)
Artificial Intelligence Helps Sort Used Batterie - Thomas Melin (2992 bytes) (2012-12-20)
Explained: Graphs - Larry Hardesty (5061 bytes) (2012-12-19)
Artificial intelligence project builds A Puzzling Present - Megan Geuss (6333 bytes) (2012-12-18)
New research could yield the ability to detect fake tweets - Shane McGlaun, (1851 bytes) (2012-12-17)
Speeding algorithms by shrinking data - Larry Hardesty (7001 bytes) (2012-12-14)
TACC develops visualization software for humanities research - University of Texas at Austin (4787 bytes) (2012-12-12)
Ada Lovelace: p~pThe Enchantress of Numbersp~p (+video) - David Clark Scott (3385 bytes) (2012-12-11)
|