The work of University of Tartu intersectoral doctoral researcher Eduardo Brito could reshape how we verify truth in the digital world. His research on a decentralized Proof-of-Location system, recently published in Scientific Reports, offers a new way to cryptographically prove where and when something happened, without compromising privacy or relying on centralized authorities.The work of University of Tartu intersectoral doctoral researcher Eduardo Brito could reshape how we verify truth in the digital world. His research on a decentralized Proof-of-Location system, recently published in Scientific Reports, offers a new way to cryptographically prove where and when something happened, without compromising privacy or relying on centralized authorities.[#item_full_content]
Researchers from the Faculty of Data and Decision Sciences at the Technion have developed a technology capable of identifying various aspects of a reader’s interaction with a text that is based solely on their eye movements.Researchers from the Faculty of Data and Decision Sciences at the Technion have developed a technology capable of identifying various aspects of a reader’s interaction with a text that is based solely on their eye movements.[#item_full_content]
When we look at the world, our brain doesn’t just recognize objects such as “a dog” or “a car,” it also understands the broader meaning, like what’s happening, where it’s happening, and how everything fits together. But for years, scientists didn’t have a good way to measure that rich, complex understanding.When we look at the world, our brain doesn’t just recognize objects such as “a dog” or “a car,” it also understands the broader meaning, like what’s happening, where it’s happening, and how everything fits together. But for years, scientists didn’t have a good way to measure that rich, complex understanding.[#item_full_content]
AI is a relatively new tool, and despite its rapid deployment in nearly every aspect of our lives, researchers are still trying to figure out how its “personality traits” arise and how to control them. Large learning models (LLMs) use chatbots or “assistants” to interface with users, and some of these assistants have exhibited troubling behaviors recently, like praising evil dictators, using blackmail or displaying sycophantic behaviors with users. Considering how much these LLMs have already been integrated into our society, it is no surprise that researchers are trying to find ways to weed out undesirable behaviors.AI is a relatively new tool, and despite its rapid deployment in nearly every aspect of our lives, researchers are still trying to figure out how its “personality traits” arise and how to control them. Large learning models (LLMs) use chatbots or “assistants” to interface with users, and some of these assistants have exhibited troubling behaviors recently, like praising evil dictators, using blackmail or displaying sycophantic behaviors with users. Considering how much these LLMs have already been integrated into our society, it is no surprise that researchers are trying to find ways to weed out undesirable behaviors.[#item_full_content]
M.C. Escher’s artwork is a gateway into a world of depth-defying optical illusions, featuring “impossible objects” that break the laws of physics with convoluted geometries. What you perceive his illustrations to be depends on your point of view—for example, a person seemingly walking upstairs may be heading down the steps if you tilt your head sideways.M.C. Escher’s artwork is a gateway into a world of depth-defying optical illusions, featuring “impossible objects” that break the laws of physics with convoluted geometries. What you perceive his illustrations to be depends on your point of view—for example, a person seemingly walking upstairs may be heading down the steps if you tilt your head sideways.[#item_full_content]
When it comes to cybersecurity, humans are often seen as the weakest link, but new research suggests that with a little help, people can do a surprisingly effective job at identifying malware.When it comes to cybersecurity, humans are often seen as the weakest link, but new research suggests that with a little help, people can do a surprisingly effective job at identifying malware.[#item_full_content]
A code-reuse attack named coroutine frame-oriented programming (CFOP) is capable of exploiting C++ coroutines across three major compilers, namely Clang/LLVM, GCC and MSVC. CFOP even succeeds in environments that are protected by control flow integrity (CFI), exposing relevant gaps in 15 of these defense schemes.A code-reuse attack named coroutine frame-oriented programming (CFOP) is capable of exploiting C++ coroutines across three major compilers, namely Clang/LLVM, GCC and MSVC. CFOP even succeeds in environments that are protected by control flow integrity (CFI), exposing relevant gaps in 15 of these defense schemes.[#item_full_content]
LLMs that emulate human speech are being used to cost-effectively test assumptions and run pilot studies, producing promising early results. But researchers note that human data remains essential.LLMs that emulate human speech are being used to cost-effectively test assumptions and run pilot studies, producing promising early results. But researchers note that human data remains essential.[#item_full_content]
Lighting plays a crucial role when it comes to visual storytelling. Whether it’s film or photography, creators spend countless hours, and often significant budgets, crafting the perfect illumination for their shot. But once a photograph or video is captured, the illumination is essentially fixed. Adjusting it afterward, a task called “relighting,” typically demands time-consuming manual work by skilled artists.Lighting plays a crucial role when it comes to visual storytelling. Whether it’s film or photography, creators spend countless hours, and often significant budgets, crafting the perfect illumination for their shot. But once a photograph or video is captured, the illumination is essentially fixed. Adjusting it afterward, a task called “relighting,” typically demands time-consuming manual work by skilled artists.[#item_full_content]
A new artificial intelligence (AI) tool could make it much easier—and cheaper—for doctors and researchers to train medical imaging software, even when only a small number of patient scans are available.A new artificial intelligence (AI) tool could make it much easier—and cheaper—for doctors and researchers to train medical imaging software, even when only a small number of patient scans are available.[#item_full_content]