Whether you’re describing the sound of your faulty car engine or meowing like your neighbor’s cat, imitating sounds with your voice can be a helpful way to relay a concept when words don’t do the trick.Whether you’re describing the sound of your faulty car engine or meowing like your neighbor’s cat, imitating sounds with your voice can be a helpful way to relay a concept when words don’t do the trick.[#item_full_content]
AI tools are increasingly being used to track and monitor us both online and in-person, yet their effectiveness comes with big risks. Computer scientists at the Oxford Internet Institute, Imperial College London, and UCLouvain have developed a new mathematical model which could help people better understand the risks posed by AI and assist regulators in protecting peoples’ privacy.AI tools are increasingly being used to track and monitor us both online and in-person, yet their effectiveness comes with big risks. Computer scientists at the Oxford Internet Institute, Imperial College London, and UCLouvain have developed a new mathematical model which could help people better understand the risks posed by AI and assist regulators in protecting peoples’ privacy.[#item_full_content]
The rise of AI, graphic processing, combinatorial optimization and other data-intensive applications has resulted in data-processing bottlenecks, as ever greater amounts of data must be shuttled back and forth between the memory and compute elements in a computer. The physical distance is small, but the process can occur billions of times per second. Inevitably, the energy and time required to move so much data adds up. In response, computer engineers are designing specialized hardware accelerators with innovative architectures to improve the performance of such applications.The rise of AI, graphic processing, combinatorial optimization and other data-intensive applications has resulted in data-processing bottlenecks, as ever greater amounts of data must be shuttled back and forth between the memory and compute elements in a computer. The physical distance is small, but the process can occur billions of times per second. Inevitably, the energy and time required to move so much data adds up. In response, computer engineers are designing specialized hardware accelerators with innovative architectures to improve the performance of such applications.[#item_full_content]
Among the marvels of the human brain is its ability to generalize. We see an object, like a chair, and we know it’s a chair, even when it’s a slightly different shape, or it’s found in an unexpected place or in a dimly lit environment.Among the marvels of the human brain is its ability to generalize. We see an object, like a chair, and we know it’s a chair, even when it’s a slightly different shape, or it’s found in an unexpected place or in a dimly lit environment.[#item_full_content]
Researchers at the University of Electro-Communications have developed a framework for improving system security by analyzing business process logs. The research is published in the International Journal of Software Engineering and Knowledge Engineering.Researchers at the University of Electro-Communications have developed a framework for improving system security by analyzing business process logs. The research is published in the International Journal of Software Engineering and Knowledge Engineering.[#item_full_content]
Processor type, IP address, browser in use, installed fonts—by collecting these and other characteristics of browser settings and the underlying operating system, it is possible to create a highly detailed and, in some cases, even unique profile of users. This phenomenon is known as browser fingerprinting.Processor type, IP address, browser in use, installed fonts—by collecting these and other characteristics of browser settings and the underlying operating system, it is possible to create a highly detailed and, in some cases, even unique profile of users. This phenomenon is known as browser fingerprinting.[#item_full_content]
Researchers are aiming to bring the magic of playing music in person to the virtual world. The Joint Active Music Sessions (JAMS) platform, created at the University of Birmingham, uses avatars created by individual musicians and shared with fellow musicians to create virtual concerts, practice sessions, or enhance music teaching.Researchers are aiming to bring the magic of playing music in person to the virtual world. The Joint Active Music Sessions (JAMS) platform, created at the University of Birmingham, uses avatars created by individual musicians and shared with fellow musicians to create virtual concerts, practice sessions, or enhance music teaching.[#item_full_content]
A new artificial intelligence (AI) model has just achieved human-level results on a test designed to measure “general intelligence.”A new artificial intelligence (AI) model has just achieved human-level results on a test designed to measure “general intelligence.”[#item_full_content]
As we come to the end of a year in which half the world’s population went to the polls, EPFL researchers developed and field-tested a groundbreaking new technology to protect remote electronic voting or e-voting from voter coercion and vote buying.As we come to the end of a year in which half the world’s population went to the polls, EPFL researchers developed and field-tested a groundbreaking new technology to protect remote electronic voting or e-voting from voter coercion and vote buying.[#item_full_content]
A recent perspective published Nov. 13 in Intelligent Computing, asserts that today’s artificial intelligence systems have finally realized Alan Turing’s vision from over 70 years ago: machines that can genuinely learn from experience and engage in human-like conversation.A recent perspective published Nov. 13 in Intelligent Computing, asserts that today’s artificial intelligence systems have finally realized Alan Turing’s vision from over 70 years ago: machines that can genuinely learn from experience and engage in human-like conversation.[#item_full_content]