Security

Generating zero-knowledge proofs for defense capabilities

There are times when the highest levels of privacy and security are required to protect a piece of information, but there is still a need to prove the information's existence and accuracy. For the Department of Defense (DoD), ...

Internet

Video manipulation technology poses danger to future elections

A video on social media shows a high-ranking U.S. legislator declaring his support for an overwhelming tax increase. You react accordingly because the video looks like him and sounds like him, so certainly it has be him.

Computer Sciences

Making data-driven 3-D modeling easier

A new computational method, to be demonstrated at SIGGRAPH 2017, is addressing a well-known bottleneck in computer graphics: 3D content creation. The process of 3D content creation is complex and tedious. GRASS, a new generative ...

page 9 from 9