Computer Sciences

Designing unmanned aerial vehicle trajectories for energy minimization

A team of researchers at the University of Luxembourg and the Ontario Tech University have recently proposed a new approach to design trajectories for energy-efficient unmanned aerial vehicle (UAV)-enabled wireless communications. ...

Computer Sciences

New exploitation techniques and defenses for DOP attacks

Data-oriented attacks allow hackers to manipulate non-control data and alter a program's behavior, often causing significant damage to the systems affected. Researchers at Virginia Tech, Clemson University, Pennsylvania State ...

Engineering

A new molecular programming language: CRN++

Synthetic biology is a relatively new area of research that could significantly impact a number of fields, including biology, nanofabrication and medicine. A primary challenge in this emerging field is that of embedding computation ...

Internet

Report: Most Chrome security bugs rooted in faulty memory code

Google researchers have revealed that nearly three-quarters of all Chrome web browser security bugs stem from memory coding problems. They say their means of combatting memory management vulnerabilities through isolating ...

Consumer & Gadgets

Sony eyeing robot friend for game players

Computer games are often more fun when friends are there to share the experience. A Sony PlayStation team wants to make sure that at times when players don't have their buddies around in person, they can turn to a robot friend ...

Computer Sciences

Foiling illicit cryptocurrency mining with artificial intelligence

Los Alamos National Laboratory computer scientists have developed a new artificial intelligence (AI) system that may be able to identify malicious codes that hijack supercomputers to mine for cryptocurrency such as Bitcoin ...

page 1 from 10