A savvy hacker can obtain secret information, such as a password, by observing a computer program’s behavior, like how much time that program spends accessing the computer’s memory.A savvy hacker can obtain secret information, such as a password, by observing a computer program’s behavior, like how much time that program spends accessing the computer’s memory.[#item_full_content]
Researchers at NYU Tandon School of Engineering’s C2SMART Center have developed an algorithm to plan the most efficient routes for modular vehicle (MV) fleets—specially-designed vehicles that attach and detach from one another as they move people around cities—removing a significant obstacle to making this type of transportation system a reality.Researchers at NYU Tandon School of Engineering’s C2SMART Center have developed an algorithm to plan the most efficient routes for modular vehicle (MV) fleets—specially-designed vehicles that attach and detach from one another as they move people around cities—removing a significant obstacle to making this type of transportation system a reality.[#item_full_content]
Visualization and artificial intelligence (AI) are well-applied approaches to data analysis. In complex data analysis scenarios, like epidemic traceability and city planning, humans need to understand large-scale data and make decisions, which requires complementing the strengths of both visualization and AI. However, integrating these into data analysis processes has yet to be accomplished.Visualization and artificial intelligence (AI) are well-applied approaches to data analysis. In complex data analysis scenarios, like epidemic traceability and city planning, humans need to understand large-scale data and make decisions, which requires complementing the strengths of both visualization and AI. However, integrating these into data analysis processes has yet to be accomplished.[#item_full_content]
Computer scientists at the University of Waterloo have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries.Computer scientists at the University of Waterloo have discovered a method of attack that can successfully bypass voice authentication security systems with up to a 99% success rate after only six tries.[#item_full_content]
A theoretical proof shows that a technique called overparametrization enhances performance in quantum machine learning for applications that stymie classical computers.A theoretical proof shows that a technique called overparametrization enhances performance in quantum machine learning for applications that stymie classical computers.[#item_full_content]
Cambridge scientists have set out principles for how computational science—which powers discoveries from unveiling the mysteries of the universe to developing treatments to fight cancer to improving our understanding of the human genome, but can have a substantial carbon footprint—can be made more environmentally sustainable.Cambridge scientists have set out principles for how computational science—which powers discoveries from unveiling the mysteries of the universe to developing treatments to fight cancer to improving our understanding of the human genome, but can have a substantial carbon footprint—can be made more environmentally sustainable.[#item_full_content]
Making art using artificial intelligence isn’t new. It’s as old as AI itself.Making art using artificial intelligence isn’t new. It’s as old as AI itself.[#item_full_content]
All it takes is a simple text command: in no time at all, artificial intelligence can generate an image that looks like a real photo and is indistinguishable from it to human eyes. Fascinating though it is, it essentially casts doubt on the authenticity of every image.All it takes is a simple text command: in no time at all, artificial intelligence can generate an image that looks like a real photo and is indistinguishable from it to human eyes. Fascinating though it is, it essentially casts doubt on the authenticity of every image.[#item_full_content]
Researchers have developed a new design for computer memory that could both greatly improve performance and reduce the energy demands of internet and communications technologies, which are predicted to consume nearly a third of global electricity within the next ten years.Researchers have developed a new design for computer memory that could both greatly improve performance and reduce the energy demands of internet and communications technologies, which are predicted to consume nearly a third of global electricity within the next ten years.[#item_full_content]
Today, the latest animated film “Elemental” from Walt Disney Studios and Pixar Animation Studio is released in Swiss cinemas. The film revolves around the fiery Ember, who lives in Element City—a place where fire, water, earth and air beings live. The film is not only made in Hollywood, but also enabled by ETH technology.Today, the latest animated film “Elemental” from Walt Disney Studios and Pixar Animation Studio is released in Swiss cinemas. The film revolves around the fiery Ember, who lives in Element City—a place where fire, water, earth and air beings live. The film is not only made in Hollywood, but also enabled by ETH technology.[#item_full_content]