The next generation of cyberattacks will be more sophisticated, more difficult to detect and more capable of wreaking untold damage on the nation’s computer systems. So, the DoD has given a $3 million grant to a team of computer scientists to develop software that can hunt down a new kind of vulnerability nearly impossible to find with today’s technology. The team is tasked with creating an analyzer that can thwart algorithmic attacks.
GPU4EO Challenge 2015 is an international initiative which involves students, researchers and...
COMSOL 5.1 is a major upgrade that delivers new and enhanced functionality across all products,...
There are a number of excellent commercial performance analysis tools on the market. Their big...
Most recent advances in artificial intelligence are the result of machine learning, in which computers are turned loose on huge data sets to look for patterns. To make machine-learning applications easier to build, computer scientists have begun developing so-called probabilistic programming languages, which let researchers mix and match machine-learning techniques that have worked well in other contexts.
A young doctor leans over a patient who has been in a serious car accident and invariably must be experiencing pain. The doctor's trauma team examines the patient's pelvis and rolls her onto her side to check her spine. They scan the patient's abdomen with a rapid ultrasound machine, finding fluid. They insert a tube in her nose. Throughout the procedure, the patient's face remains rigid, showing no signs of pain.
Researchers at the University of Zurich have unveiled new technology enabling drones to recover stable flight from any position and land autonomously in failure situations. It will even be possible to launch drones by simply tossing them into the air like a baseball or recover stable flight after a system failure. Drones will be safer and smarter, with the ability to identify safe landing sites and land automatically when necessary.
Researchers are designing artificial limbs to be more sensational, with the emphasis on sensation. They have developed a language of touch that can be "felt" by computers and humans alike. The engineers and students are constructing a language quantified with mechanical touch sensors that interact with objects of various shapes, sizes and textures.
It can be disheartening to learn that something precious, such as a one-of-a-kind family photo, has disappeared from a scratched or broken CD or DVD. It also can become serious, dangerous and potentially costly if it happens to a disc containing criminal forensic evidence, corporate records or scientific data. But there may be a way in the future to bring the material back.
Researchers have created an algorithm that allowed a man to grasp a bottle with a prosthetic hand powered only by his thoughts. The technique, demonstrated with a man whose right hand had been amputated, uses non-invasive brain monitoring, capturing brain activity to determine what parts of the brain are involved in grasping an object. A computer program, or brain-machine interface (BMI), harnessed the subject’s intentions...
It’s almost a rite of passage in physics and astronomy. Scientists spend years scrounging up money to build a fantastic new instrument. Then, when the long-awaited device finally approaches completion, the panic begins: How will they handle the torrent of data? The Square Kilometer Array will have an unprecedented ability to deliver data on the location and properties of stars, galaxies and giant clouds of hydrogen gas.
IBM announced that it will invest $3 billion over the next four years to establish a new Internet of Things (IoT) unit, and that it is building a cloud-based open platform designed to help clients and ecosystem partners build IoT solutions.
Researchers from the University of Illinois at Urbana-Champaign are using supercomputing resources at the Argonne Leadership Computing Facility, a DOE Office of Science User Facility, to shed light on the mysterious nature of high-temperature superconductors. With critical temperatures ranging from 30 Kelvin to 130 Kelvin, this relatively new class of superconductors is high-temperature in name only.
Prof. Dr. Yutong Lu is the Director of the System Software Laboratory, School of Computer Science, National University of Defense Technology (NUDT), Changsha, China. She is also a professor in the State Key Laboratory of High Performance Computing, China. She got her B.S, M.S, and Ph.D. degrees from the NUDT
Mathematicians have designed an encryption code capable of fending off the phenomenal hacking power of a quantum computer. Using high-level number theory and cryptography, the researchers reworked an infamous old cipher called the knapsack code to create an online security system better prepared for future demands.
Integer overflows are one of the most common bugs in computer programs — not only causing programs to crash but, even worse, potentially offering points of attack for malicious hackers. A new algorithm for identifying integer-overflow bugs was tested on five common open-source programs, in which previous analyses had found three bugs. The new algorithm found all three known bugs — and 11 new ones.
Solving the Trust Equation: Socially Intelligent Computers can turn Difficult Negotiations into Win-win SituationsMarch 25, 2015 12:19 pm | by A*STAR Institute of High Performance Computing | News | Comments
Programming fundamental social intelligence skills into software agents can make humans substantially more trusting of online negotiations, which can lead to superior outcomes in e-commerce transactions, finds a team of technology researchers, business experts and cognitive scientists. People are naturally skeptical of negotiations lacking face-to-face contact...
The OpenPOWER Foundation has announced more than 10 hardware solutions — spanning systems, boards and cards, and a new microprocessor customized for China. Built collaboratively by OpenPOWER members, the new solutions exploit the POWER architecture to provide more choice, customization and performance to customers, including hyperscale data centers.
Simulink is a block diagram environment for multidomain simulation and model-based design. It supports simulation, automatic code generation, and continuous test and verification of embedded systems. The MATLAB add-on provides a graphical editor, customizable block libraries and solvers for modeling and simulating dynamic systems.
MATLAB 8.5 is a high-level language and interactive environment used by engineers and scientists to explore and visualize ideas and to collaborate across disciplines, including signal and image processing, communications, control systems and computational finance.
The international robotics community has turned out in force for the DARPA Robotics Challenge Finals, a competition of robots and their human supervisors to be held June 5 to 6 outside of Los Angeles. In the competition, human-robot teams will be tested on capabilities that could enable them to provide assistance in future natural and man-made disasters.
Micro-drones are being put to use in a large number of areas, where these small aircraft face extensive requirements while performing aerial observation tasks or when deployed in the field of disaster management. A newly developed concept summarizes some of these challenges.
Children don’t have to be told that “cat” and “cats” are variants of the same word — they pick it up just by listening. To a computer, though, they’re as different as, well, cats and dogs. Yet it’s computers that are assumed to be superior in detecting patterns and rules, not four-year-olds. Researchers are trying to, if not to solve that puzzle definitively, at least provide the tools to do so.
Researchers gave a computer program the outline of how a magic jigsaw puzzle and a mind-reading card trick work, as well the results of experiments into how humans understand magic tricks. With this information, the system created completely new variants on those tricks which can be delivered by a magician.
Klocwork 10.2 static code analysis software is designed to help developers write higher-quality, more secure code, faster. It integrates into desktop IDEs and into a team's natural workflow. Mirroring how code is developed, the software runs as code is being written, checking line-by-line.
We computational chemists are an impatient lot. Despite the fact that we routinely deal with highly complicated chemical processes running on our laboratory’s equally complex HPC clusters, we want answers in minutes or hours, not days, months or even years. In many instances, that’s just not feasible; in fact, there are times when the magnitude of the problem simply exceeds the capabilities of the HPC resources available to us.
The OpenPOWER Foundation has announced a solid lineup of speakers headlining its inaugural OpenPOWER Summit at NVIDIA’s GPU Technology Conference at the San Jose Convention Center, March 17-19, 2015. Drawing from the open development organization’s more than 100 members worldwide, the Summit’s organizers have lined up over 35 member presentations tied to the event’s “Rethink the Data Center” theme.
Computer chips’ clocks have stopped getting faster. To keep delivering performance improvements, chipmakers are instead giving chips more processing units, or cores, which can execute computations in parallel. But the ways in which a chip carves up computations can make a big difference to performance.
The team responsible for the Oscar-nominated visual effects at the center of Christopher Nolan’s epic, Interstellar, have turned science fiction into science fact by providing new insights into the powerful effects of black holes. The team describes innovative computer code used to generate the film’s iconic images of the wormhole, black hole and various celestial objects, and explains how the code has led them to new science discoveries.
- Page 1