Automotive

Laying the groundwork for autonomous transport networks

With the increased use of connected devices and endpoints where Internet of things devices, satellites and sensors produce constant streams of information, the amount of data collected presents significant challenges. In ...

Hardware

LVI: Intel processors still vulnerable to attack, study finds

Computer scientists at KU Leuven have once again exposed a security flaw in Intel processors. Jo Van Bulck, Frank Piessens, and their colleagues in Austria, the United States, and Australia gave the manufacturer one year's ...

Security

How vulnerable is your car to cyberattacks?

The emergence of smart cars has opened the door to limitless possibilities for technology and innovation—but also to threats beyond the car itself. New research from Michigan State University is the first to apply criminal ...

Software

Tapis computing platform weaves together science computing tools

Scientists looking to reduce their complexity to research and add a new computational tool to their tool belt can explore the Tapis Project. The Tapis software platform aims to help researchers more easily leverage powerful ...

Robotics

Deep-learning method to design fly-like robots

"Just think about what a fly can do," says Professor Pavan Ramdya, whose lab at EPFL's Brain Mind Institute, with the lab of Professor Pascal Fua in EPFL's Institute for Computer Science, led the study. "A fly can climb across ...

page 1 from 3