Security

Microsoft alerts hospitals to fix potential security risk

Computer experts inside hospitals were working diligently on Wednesday to address a serious new security vulnerability in older versions of the Windows operating system, which is still used in many health care devices even ...

Robotics

New AI sees like a human, filling in the blanks

Computer scientists at The University of Texas at Austin have taught an artificial intelligence agent how to do something that usually only humans can do—take a few quick glimpses around and infer its whole environment, ...

Computer Sciences

Predator and prey in cyber stasis

In the world of cybersecurity, just as in nature, there are predators and there is prey. The predators are the hunters, the ones that seek out the weak and the vulnerable on which to prey, that applies whether we are talking ...

Engineering

Researchers reverse the flow of time on IBM's quantum computer

We all mark days with clocks and calendars, but perhaps no timepiece is more immediate than a mirror. The changes we notice over the years vividly illustrate science's "arrow of time"—the likely progression from order to ...

Engineering

Reinforcement learning expedites 'tuning' of robotic prosthetics

Researchers from North Carolina State University, the University of North Carolina and Arizona State University have developed an intelligent system for "tuning" powered prosthetic knees, allowing patients to walk comfortably ...

Computer Sciences

Artificial intelligence blends algorithms and applications

Artificial intelligence is already a part of everyday life. It helps us answer questions like "Is this email spam?" It identifies friends in online photographs, selects news stories based on our politics and helps us deposit ...

Computer Sciences

A new approximate computing approach using CNNs

Researchers at Fukuoka University, in Japan, have recently proposed a design methodology for configurable approximate arithmetic circuits. As part of their study, published on ResearchGate, they applied their method to a ...

page 21 from 23