p~pYour password is invalidp~p: Improving website password p - Soolmaz Moshfeghian and Young Sam Ryu (2144 bytes) (2012-01-31)
Harnessing the predictive power of virtual communities - Šubelj L., Bajec M (2203 bytes) (2012-01-31)
Cloud Computing Vs. Grid Computing: How Do They Differ? - Preeti Sunil (9499 bytes) (2012-01-31)
Researchers to patent vulnerability search algorithm - Hai Vu (681 bytes) (2012-01-30)
The worldp~ps first computer password? It was useless, too - Robert McMillan (4763 bytes) (2012-01-29)
NVIDIA dresses up CUDA parallel computing platform - Nancy Owano (3816 bytes) (2012-01-29)
Visual nudge improves accuracy of mammogram readings - Washington University in St. Louis (9406 bytes) (2012-01-27)
Facebook Is a Community - Emilio Ferrara (2411 bytes) (2012-01-27)
p~pGenetic programmingp~p: The mathematics of taste - Christine Daniloff (4382 bytes) (2012-01-25)
Better mathematics boosts image-processing algorithm - Jacob Aron (2480 bytes) (2012-01-24)
Neural network gets an idea of number without counting - Celeste Biever (3271 bytes) (2012-01-23)
The advantage of ambiguity - Emily Finn (5853 bytes) (2012-01-23)
p~pThe Algorithmic Art of Scott Dravesp~p: dreams of Electri - Mary Thomas (2517 bytes) (2012-01-23)
Neural Networks and Genetic Algorithms - Eralp (2053 bytes) (2012-01-23)
Quantum leap in the works for super-secure cloud computing - l33tdawg (1156 bytes) (2012-01-20)
Quantum computing could head to p~pthe cloudp~p - Jason Palmer (3957 bytes) (2012-01-20)
Amazon launches home-grown NoSQL database - Barb Darrow (3003 bytes) (2012-01-19)
Faster-Than-Fast Fourier Transform - SODA (5947 bytes) (2012-01-19)
Computer Simulations Could Enlighten Alternative Fuel Produc - Sotiris Xantheas (5744 bytes) (2012-01-19)
A new artificial intelligence technique to speed the plannin - Carlos III University of Madrid (5531 bytes) (2012-01-18)
Cloud Computing Is Driving A Digital Arts Renaissance - Tom Foremski (5871 bytes) (2012-01-18)
Zappos Breach Illustrate the Need for Stronger Password Rule - Fahmida Y. Rashid (5019 bytes) (2012-01-17)
Facebook Study Reveals Facebook Is Not An Echo Chamber - Devin Coldewey (4057 bytes) (2012-01-17)
After Zappos hack, how to protect yourself online - John R. Quain (3937 bytes) (2012-01-17)
Improving web search - Daniel Crabtree (2364 bytes) (2012-01-17)
5 ways the new Android design guidelines will make apps bett - Ryan Whitwam (3173 bytes) (2012-01-16)
What might a post-Windows world look like? - Mike Halsey (3547 bytes) (2012-01-16)
Did Web Search kill Artificial Intelligence? - Data Mining (1558 bytes) (2012-01-16)
NMSU researcher helps computers anticipate human reactions - Tonya Suther (3812 bytes) (2012-01-16)
Microsoftp~ps Trustworthy Computing, Security Still Priority - Kees de Vos (1190 bytes) (2012-01-15)
PC security: Wep~pve come a long way, baby - Robert X. Cringely (3712 bytes) (2012-01-13)
10 Reasons Why Windows Phone 7 is Better Than Android - Alan Fackler (7062 bytes) (2012-01-13)
Sandia cyber project looks to help IT professionals with com - Sandia National Laboratories (4958 bytes) (2012-01-12)
The quantifier: Building software that interprets medical im - MIT (5281 bytes) (2012-01-12)
Do We Need Doctors Or Algorithms? - Vinod Khosla (18191 bytes) (2012-01-11)
Want To Make Your iPhone??s PIN More Secure? - Greg Kumparak (2895 bytes) (2012-01-10)
How the BBC Micro started a computing revolution - Charles Arthur (6328 bytes) (2012-01-10)
Six security vulnerabilities addressed in OpenSSL - Lucian Constantin (2506 bytes) (2012-01-09)
Understanding the security framework behind RSA SecurID - Mohit Arora (3241 bytes) (2012-01-09)
Mobile Phone Best Practices: Having a VPN - Allison Reilly (2058 bytes) (2012-01-09)
New app uses mathematical theory to match your face to celeb - Siân Halkyard (1665 bytes) (2012-01-09)
|