Java Still Not Safe, Security Experts Say - Mathew J. Schwartz (4953 bytes) (2012-09-07)
Applying algorithm to social networks can reveal hidden conn - University of Alberta (3568 bytes) (2012-09-06)
Mapping neurological disease??New algorithm can analyze info - Helen Knight (2499 bytes) (2012-09-05)
Making Web applications more efficient - Larry Hardesty (7645 bytes) (2012-09-04)
Smarter searching in archives using newly developed interfac - Netherlands Organisation for Scientific (3085 bytes) (2012-09-04)
Computer Viruses Could Take a Lesson from Showy Peacocks - Michigan State University (2566 bytes) (2012-08-30)
Shifty, but Secure Eyes: New Biometric Security System - Martti Juhola et al (1985 bytes) (2012-08-30)
p~pAnternetp~p Discovered: Behavior of Harvester Ants as The - Balaji Prabhakar (4695 bytes) (2012-08-29)
BIG DATA: Is it Artificial Intelligence, or Authentic Stupid - sylvia kronstadt (16023 bytes) (2012-08-27)
Internet architecture is at odds with its use - Jarno Rajahalme (4151 bytes) (2012-08-24)
Making crowdsourcing easier - Massachusetts Institute of Technology (7612 bytes) (2012-08-24)
New BIOS Security Standards Aimed at Fighting Rootkit Attack - Ellen Messmer (4806 bytes) (2012-08-23)
Web Semantics: Computing and Visualizing the 19th-Century Li - Bruce Sterling (4155 bytes) (2012-08-23)
Scientists Create Chemical p~pBrainp~p: Giant Network Links - Mikołaj Kowalik, Chris M. Gothard (6029 bytes) (2012-08-23)
Computer program recognises any language - Norunn K. Torheim/Else Lie (2615 bytes) (2012-08-22)
Anthrax Targets - Ravi V. Gutlapalli (2179 bytes) (2012-08-22)
Information Overload in the Era of p~pBig Datap~p - R. L. Walls, B. Athreya (3740 bytes) (2012-08-22)
Security first: New NIST guidelines on securing BIOS for ser - Amy Walters (5293 bytes) (2012-08-22)
Computer-simulated knitting goes right down to the yarn - Cornell University (3545 bytes) (2012-08-21)
Scientists make animated collisions sounds realistic - Bill Steele (3401 bytes) (2012-08-21)
Artificial Intelligence Allows Automated Worm Sorting - Matthew M Crane, (6061 bytes) (2012-08-20)
Search Technology That Can Gauge Opinion and Predict the Fut - CORDIS (6818 bytes) (2012-08-20)
Search technology that can gauge opinion and predict the fut - CORDIS (6892 bytes) (2012-08-16)
Advance algorithms used to detect online behaviour trends - University of Sydney (2149 bytes) (2012-08-16)
Fighting back against click-spam - Vacha Dave (4191 bytes) (2012-08-16)
Swiss scientists develop algorithm to locate malware, spam a - Pedro Pinto (1665 bytes) (2012-08-15)
Trivia Tuesday: All About Operating Systems - Tyler Holman (4632 bytes) (2012-08-15)
Kaspersky pleads for crypto help to probe Gauss malware - Gregg Keizer (2806 bytes) (2012-08-15)
Computer memory leaks a turn off - Inderscience (3060 bytes) (2012-08-14)
Researchers develop new physical face cloning method - Disney Research (3864 bytes) (2012-08-14)
New algorithm tracks down the origins of internet attacks - H-Online (1230 bytes) (2012-08-14)
Googlep~ps Deep Learning - Speech Recognition - Alex Armstrong (4249 bytes) (2012-08-14)
Swiss develop algorithm to trace virus sources - Nasa.gov (1554 bytes) (2012-08-10)
Supercomputer-level millisecond-scale sampling for protein s - Levi C.T. Pierce (8269 bytes) (2012-08-09)
Imagining how light behaves in 2-D world gives researchers i - Wojciech Jarosz (2698 bytes) (2012-08-07)
Java EE PaaS and Application Server Interoperability - Srinivasan Sundara Rajan (3055 bytes) (2012-08-06)
Computers may need patterns to think better - Charles Sturt (3742 bytes) (2012-08-03)
MIT offers a new programming language for the visual web - Stacey Higginbotham (4305 bytes) (2012-08-02)
Internet Research to Level the Playing Field - The Research Council of Norway. (6205 bytes) (2012-08-02)
Writing Graphics Software Gets Much Easier: New Programming - EurekAlert! (6336 bytes) (2012-08-02)
New Computational Technique Relieves Logjam from Massive Amo - J. Pell, A. Hintze, R. Canino-Koning, A. (2389 bytes) (2012-08-02)
|