Android Vulnerability Debugged - Fondazione Bruno Kessler (2656 bytes) (2012-04-13)
First-Ever Model Simulation of the Structuring of the Observ - Jean-Michel Alimi (6770 bytes) (2012-04-13)
Grid-Based Computing to Fight Neurological Disease - Giovanni Frison (7020 bytes) (2012-04-12)
Toward a modular defense against hackers - Gang Tan (3700 bytes) (2012-04-11)
Jailbreak/Unlock Software baseband-1.0.11,1.0.13 and 1.0.14 - Brianna (2569 bytes) (2012-04-08)
Ubuntu pitches metal-as-a-service for server provisioning - mikael ricknas (1952 bytes) (2012-04-05)
Apple releases Java patch to thwart virus - Brett Molina (1277 bytes) (2012-04-05)
Programming computers to help computer programmers - Rajeev Alur (4654 bytes) (2012-04-04)
Can computers have true artificial intelligence? - Owen Holland (7037 bytes) (2012-04-03)
Researchers use Facebook to dispel notion that social contag - Bob Yirka (5342 bytes) (2012-04-03)
Computer scientists form mathematical formulation of the bra - Hava Siegelmann (5215 bytes) (2012-04-03)
As computer scientists this year celebrate the 100th anniver - Jeremie Cabessa (4919 bytes) (2012-04-02)
Systems to handle big data might be this generation??s moon - Stacey Higginbotham (3637 bytes) (2012-04-02)
Self-sculpting sand could allow spontaneous formation of new - Larry Hardesty (6540 bytes) (2012-04-02)
Computer scientist drives for comprehensive traffic model - Jakob Eriksson (2299 bytes) (2012-03-29)
Pass notes No 3,149: Alan Turing - Royal Mail (2133 bytes) (2012-03-27)
Smarter computing systems make society better - Koen De Bosschere (2984 bytes) (2012-03-27)
Computer System Identifies Liars - Mark G. Frank (5244 bytes) (2012-03-27)
You Have a Supercomputer and Didn??t Know It - Maureen O Gara (2518 bytes) (2012-03-26)
Computer Model of Spread of Dementia Can Predict Future Dise - Ashish Raj (6125 bytes) (2012-03-23)
Researchers revolutionize closed captioning - Richang Hong, Meng Wang (5187 bytes) (2012-03-22)
Android, Linux Coming Together After Having Forged Separate - Chuong Nguyen (3169 bytes) (2012-03-21)
To Combat Identity Theft, Protect Computer, Experts Say - Thomas Holt (2531 bytes) (2012-03-20)
Man beats computer at crossword puzzles ¨C so far - Matthew Ginsberg (951 bytes) (2012-03-19)
Google making search smarter with p~psemanticp~p capabilitie - Amit Singhal (2161 bytes) (2012-03-16)
UCLA professor wins $250K computing prize for AI - NIST (896 bytes) (2012-03-16)
Android antivirus apps improve their grades--just not very m - Seth Rosenblatt (3332 bytes) (2012-03-16)
ACM Awards Judea Pearl the Turing Award for Work On Artifici - Michael J. Miller (4502 bytes) (2012-03-15)
Futurist: Wep~pll someday accept computers as human - Brandon Griggs (2784 bytes) (2012-03-14)
Software automatically transforms movie clips into comic str - Meng Wang (3704 bytes) (2012-03-14)
Wind River Android Testing Software Wins Embedded AWARD 2012 - Wind River (3016 bytes) (2012-03-14)
New distributed processing technology developed to efficient - Fujitsu (10557 bytes) (2012-03-13)
Two asteroids named after Unix co-creators - Stephen Shankland (1693 bytes) (2012-03-07)
Finding your friends and following them to where you are - University of Rochester (3141 bytes) (2012-03-07)
The trustworthy cloud - Fraunhofer-Gesellschaft (3803 bytes) (2012-03-07)
Windows Server 8: 8 Key Facts - Paul McDougall (5011 bytes) (2012-03-06)
Special computer algorithms can help doctors to make rapid d - Jan Baumbach (2976 bytes) (2012-03-05)
Schizophrenia Patientsp~p Ability to Monitor Reality May Be - Srikantan Nagarajan (5744 bytes) (2012-03-05)
Building Secure Apps - Penny Crosman (13569 bytes) (2012-03-05)
The Bright Side of Being Hacked - SOMINI SENGUPTA and NICOLE PERLROTH (6773 bytes) (2012-03-05)
Six security trends to watch for - Nick Mediati (3621 bytes) (2012-03-05)
|