Keyword Tag Sort by

Computer Science News (55 articles)



Mimicking the Brain, in Silicon

New computer chip models how neurons communicate with each other at synapses. CAMBRIDGE, Mass. — For decades, scientists have dreamed of building computer systems that could replicate the human brain’s talent for learning new tasks. MIT researchers have now taken a major step toward...

Published on 15 November 2011, 04:11


Software Creates Privacy Mode To Help Secure Android Smartphones

Researchers at North Carolina State University have developed software that helps Android smartphone users prevent their personal information from being stolen by hackers.“There are a lot of concerns about potential leaks of personal information from smartphones,” says Dr. Xuxian Jiang, an...

Published on 13 April 2011, 09:52


New Study Shows that Mobile Online Social Networks Add a New Dimension to Privacy Leakage Concerns

 WPI Researcher Shows that 20 Mobile Online Social Networks Share Private Information, Including a User's Location, with Third Party Tracking SitesAfter documenting for the first time in a 2009 study that online social networking sites leak personally identifiable information to...

Published on 22 June 2010, 15:21


Computational Model Sheds Light on How the Brain Recognizes Objects

CAMBRIDGE, Mass. — Researchers at MIT’s McGovern Institute for Brain Research have developed a new mathematical model to describe how the human brain visually identifies objects. The model accurately predicts human performance on certain visual-perception tasks, which suggests that it’s a...

Published on 7 June 2010, 12:55


Major Step Ahead for Cryptography

Imagine you could work out the answer to a question, without knowing what the question was. For example, suppose someone thinks of two numbers and then asks another person to work out their sum, without letting them know what the two numbers are.  However, they are given an encryption of the...

Published on 26 May 2010, 05:25


Can Clever Hackers Target Smart Phones?

Two computer scientists explored how smart phones can be hacked, hijacked and exploited without their owner’s knowledge.Smart phones are becoming a common part of everyday life. Millions of Americans are using these powerful devices whose impressive capabilities and features rival that of...

Published on 2 April 2010, 13:44


New Gestural Computing System

CAMBRIDGE, Mass. — On Dec. 19 at Siggraph Asia, MIT researchers will present a technique for turning innovative new touch-screen displays into giant lensless cameras. They’ve also built a prototype that demonstrates one application of such displays: letting users manipulate on-screen images...

Published on 14 December 2009, 07:31


Watching me, watching you

Software that tracks shoppers’ eye movements as they browse supermarket shelves may seem a bit Big Brother, but the latest technology in ‘eye-tracking’, which monitors what grabs a person’s attention, could have far-reaching implications for consumers and result in services being tailored...

Published on 21 October 2009, 07:58


iPhone the Body Electric

U of Utah iPhone 'Apps' Visualize Human Anatomy.Oct. 8, 2009 - University of Utah researchers created new iPhone programs - known as applications or "apps" - to help scientists, students, doctors and patients study the human body, evaluate medical problems and analyze other...

Published on 8 October 2009, 14:32


Findings could lead to improved lip-reading training for the deaf

A new study by the University of East Anglia suggests computers are now better at lip-reading than humans.The peer-reviewed findings will be presented for the first time at the eighth International Conference on Auditory-Visual Speech Processing (AVSP) 2009, held at the University of East Anglia...

Published on 10 September 2009, 16:35


From Terabytes to Petabytes: Computer Scientists at Yale Develop New Hybrid Database System

New Haven, Conn. — As the amounts of data being stored by databases around the world enters the realm of the petabyte (the amount of data stored in a mile-high stack of CD-ROM disks), efficient data management is becoming more and more important. Now computer scientists at Yale University...

Published on 26 August 2009, 12:20


Online Social Networks Leak Personal Information to Third-Party Tracking Sites

Leakage Puts Social Network Users at Risk of Having Their Identity Linked With Their Browsing Behavior.WORCESTER, Mass.–More than a half billion people use online social networks, posting vast amounts of information about themselves to share with online friends and colleagues. A new study...

Published on 24 August 2009, 18:07


Leeds tackles terrorists with new technology

Engineers at Leeds are playing a leading role in designing an intelligent CCTV system that will track people who have left bags in public buildings – and even determine whether their actions might be suspicious.Building on existing surveillance technology, the SUBITO (Surveillance of...

Published on 18 August 2009, 07:48


Carnegie Mellon Releases Innovative Alice 3 Software Featuring Animation from EA's The Sims2™

PITTSBURGH—Carnegie Mellon University today announced the beta release of Alice 3, the latest version of an innovative software environment designed to take something challenging — learning about computer programming — and make it as fun as creating an animated movie or a video...

Published on 13 August 2009, 09:05


Computer Scientists Take Over Electronic Voting Machine with New Programming Technique

Computer scientists demonstrated that criminals could hack an electronic voting machine and steal votes using a malicious programming approach that had not been invented when the voting machine was designed. The team of scientists from University of California, San Diego, the University of...

Published on 10 August 2009, 14:37


Game utilizes human intuition to help computers solve complex problems

ANN ARBOR, Mich.—A new computer game prototype combines work and play to help solve a fundamental problem underlying many computer hardware design tasks.The online logic puzzle is called FunSAT, and it could help integrated circuit designers select and arrange transistors and their...

Published on 27 July 2009, 17:35


Touch typists could help stop spammers in their tracks

Computer scientists at Newcastle University are about to give office workers a perfect excuse to play games: it’s all in the name of research.Dr Jeff Yan, together with his PhD student Su-Yang Yu, has created ‘Magic Bullet’ as an effective solution to a problem which no known...

Published on 15 July 2009, 04:38


RKBExplorer.com – A Linked Data system for more effective research

A new infrastructure that enables more effective scientific research by linking data in an accessible way has been developed in ECS.According to Hugh Glaser of the School of Electronics and Computer Science (ECS), who developed the system – RKBExplorer, it is an important step towards...

Published on 1 July 2009, 13:31


Spotting stolen cars passing in traffic

A computer program that may enable moving police cars to automatically detect stolen or unregistered cars in surrounding traffic has been developed by researchers at the University of Technology, Sydney (UTS).Developed with support from the ARC Discovery Projects scheme, the program uses new...

Published on 25 June 2009, 09:08


Carnegie Mellon Algorithm Charts Evolution Of Genetic Networks During Fruit Fly Life Cycle

PITTSBURGH—A new algorithm developed by Carnegie Mellon University computer scientists has revealed for the first time how genetic networks in the fruit fly, Drosophila melanogaster, evolve during the insect's life cycle.   Scientists have known that the relationships...

Published on 22 June 2009, 16:59


image