Computer Sciences

Designing unmanned aerial vehicle trajectories for energy minimization

A team of researchers at the University of Luxembourg and the Ontario Tech University have recently proposed a new approach to design trajectories for energy-efficient unmanned aerial vehicle (UAV)-enabled wireless communications. ...

Computer Sciences

New exploitation techniques and defenses for DOP attacks

Data-oriented attacks allow hackers to manipulate non-control data and alter a program's behavior, often causing significant damage to the systems affected. Researchers at Virginia Tech, Clemson University, Pennsylvania State ...

Engineering

A new molecular programming language: CRN++

Synthetic biology is a relatively new area of research that could significantly impact a number of fields, including biology, nanofabrication and medicine. A primary challenge in this emerging field is that of embedding computation ...

Internet

Best of Last Year: The top Tech Xplore articles of 2020

It was a good year for technology research of all kinds; a team at Japan's SkyDrive Inc., demonstrated their "flying car"—it took off with a person aboard, hovered approximately 1 to 2 meters above the ground for approximately ...

Internet

Zoom hack reveals text contents by viewing shoulder movement

Countless companies around the world see the wildly popular video-conferencing tool Zoom as a savior during this era of quarantine and work-at-home routines. Zoom estimates it has more than 300 million meeting participants ...

Internet

Report: Most Chrome security bugs rooted in faulty memory code

Google researchers have revealed that nearly three-quarters of all Chrome web browser security bugs stem from memory coding problems. They say their means of combatting memory management vulnerabilities through isolating ...

page 1 from 17