Finding good music in noisy online markets - Christine Daniloff (4470 bytes) (2012-05-31)
Could Sarcastic Computers Be in Our Future? - L.A. Cicero (3824 bytes) (2012-05-31)
People Smile When They Are Frustrated, and the Computer Know - David L. Chandler (4731 bytes) (2012-05-29)
OnLive Desktop brings the PC to tablets - MAE ANDERSON (4501 bytes) (2012-05-25)
Android vulnerability neutralised - Bruno Kessler (3106 bytes) (2012-05-25)
Computers excel at identifying smiles of frustration - Lin Edwards (3009 bytes) (2012-05-25)
WebOS: Dead? Oh, Sure, Almost Certainly - Harry McCracken (4126 bytes) (2012-05-25)
Automated image analysis arises from handcraft and machine l - Aalto University (3604 bytes) (2012-05-24)
New mathematical framework formalizes oddball programming te - Larry Hardesty (6000 bytes) (2012-05-23)
Data in the fast lane - Douglas Gantenbein (8146 bytes) (2012-05-22)
Individual typing style gives key to user authentication - Eesa Al Solami (1993 bytes) (2012-05-17)
The elusive capacity of data networks - Christine Daniloff (6353 bytes) (2012-05-15)
Drug Kills Cancer Cells by Restoring Faulty Tumor Suppressor - Alexei Vazquez (2566 bytes) (2012-05-15)
Researchers look for novel methods to defeat botnets - Narasimha Reddy (1345 bytes) (2012-05-14)
Pair recreate 70p~ps roulette-beating system - Bob Yirka (3995 bytes) (2012-05-14)
Self-Adapting Computer Network That Defends Itself Against H - Scott DeLoach (4540 bytes) (2012-05-14)
Cybersecurity experts begin investigation on self-adapting c - Scott DeLoach (4541 bytes) (2012-05-10)
ACM CHI: More Search Could Be Crowdsourced - Joab Jackson (4380 bytes) (2012-05-10)
Computer Scientists Show What Makes Movie Lines Memorable - Cristian Danescu-Niculescu-Mizil (3644 bytes) (2012-05-09)
PHP Group to try again to fix vulnerability - Bob Yirka (2432 bytes) (2012-05-08)
Can automated deep natural-language analysis unlock the powe - Bonnie Dorr (2775 bytes) (2012-05-08)
Researchers use Doppler Effect for computer gesture control - Bob Yirka (2589 bytes) (2012-05-07)
When I Think About My Computer, I Touch Myself - Matt Peckham (3987 bytes) (2012-05-07)
p~pGame-Powered Machine Learningp~p Opens Door to Google for - Lanckriet (5710 bytes) (2012-05-07)
OSCp~ps Tomko to champion high-performance computing - Ohio Supercomputer Center (3077 bytes) (2012-05-03)
p~pGame-powered machine learningp~p opens door to Google for - Catherine Hockmuth (5953 bytes) (2012-05-03)
Thwarting the Cleverest Attackers: Even Most Secure-Seeming - Guy Rothblum (5398 bytes) (2012-05-02)
Dynamic View of City Created Based On Foursquare Check-In Da - Justin Cranshaw (4822 bytes) (2012-05-02)
Algorithmic incentives: New twist on 30 year-old work could - Larry Hardesty (7406 bytes) (2012-04-25)
Stealth game steals info from Android sensors - Nancy Owano (3377 bytes) (2012-04-25)
Efficiency of Multi-Hop Wireless Networks Boosted - Parth H. Pathak, Rudra Dutta (2519 bytes) (2012-04-25)
Proof-of-concept Android Trojan uses motion sensor to determ - Lucian Constantin (3355 bytes) (2012-04-20)
Networks in motion - Adilson E. Motter (2889 bytes) (2012-04-19)
Efficiency of Multi-Hop Wireless Networks Boosted - Rudra Dutta (2519 bytes) (2012-04-19)
p~pSabpabp~p Trojan seeks out Mac OS X - Nancy Owano (3023 bytes) (2012-04-18)
Getting to the root of genetics - Jennifer Chu (6393 bytes) (2012-04-17)
Android Vulnerability Debugged - Alessandro Armando (2656 bytes) (2012-04-17)
p~pSounds of Silencep~p Proving a Hit: Worldp~ps Fastest Ran - Ping Koy Lam (2945 bytes) (2012-04-15)
Why the age of quantum computing is nearer than you think - Trevor Quirk (5089 bytes) (2012-04-13)
Novel Coding Technique Holds Promise for Next-Generation Com - Astar Cai (3619 bytes) (2012-04-13)
Android Vulnerability Debugged - Fondazione Bruno Kessler (2656 bytes) (2012-04-13)
|