Global manhunt pushes limits of social mobilization
(Phys.org) -- An international team of researchers, including computer scientist Manuel Cebrian from the University of California, San Diego, has won a seemingly impossible challenge: tracking down a group ...
Computer scientists form mathematical formulation of the brain's neural networks
As computer scientists this year celebrate the 100th anniversary of the birth of the mathematical genius Alan Turing, who set out the basis for digital computing in the 1930s to anticipate the electronic age, they still quest ...
From beaker to bits: Collaboration creates computational model of human tissue
Computer scientists and biologists in the Data Science Research Center at Rensselaer Polytechnic Institute have developed a rare collaboration between the two very different fields to pick apart a fundamental roadblock to ...
Can a machine tell when you're lying? Research suggests the answer is 'yes'
Inspired by the work of psychologists who study the human face for clues that someone is telling a high-stakes lie, UB computer scientists are exploring whether machines can also read the visual cues that give away deceit.
Amateurs battle malware, hackers in UK cybergames
Amateur cybersleuths have been hunting malware, raising firewalls and fending off mock hack attacks in a series of simulations supported in part by Britain's eavesdropping agency.
Citizen scientists reveal a bubbly Milky Way
(PhysOrg.com) -- A team of volunteers has pored over observations from NASA's Spitzer Space Telescope and discovered more than 5,000 "bubbles" in the disk of our Milky Way galaxy. Young, hot stars blow these ...
Researchers discover cell phone hackers can track your location without your knowledge
Cellular networks leak the locations of cell phone users, allowing a third party to easily track the location of the cell phone user without the user's knowledge, according to new research by computer scientists in the University ...
Sandia cyber project looks to help IT professionals with complex DNS vulnerabilities
Sandia National Laboratories computer scientist Casey Deccio has developed a visualization tool known as DNSViz to help network administrators within the federal government and global IT community better understand ...
Printing in the hobby room: Paper- thin and touch-sensitive displays on various materials
Until now, if you want to print a greeting card for a loved one, you can use colorful graphics, fancy typefaces or special paper to enhance it. But what if you could integrate paper-thin displays into the ...
New computing model could lead to quicker advancements in medical research
With the promise of personalized and customized medicine, one extremely important tool for its success is the knowledge of a person's unique genetic profile.
Researchers use machine learning to boil down the stories that wearable cameras are telling
Computers will someday soon automatically provide short video digests of a day in your life, your family vacation or an eight-hour police patrol, say computer scientists at The University of Texas at Austin.
Amending the Tree of Life: Article advocates for shift in evolutionary and genomic research
Charles Darwin famously included only one illustration in his book "On the Origin of Species" published in 1859. It was a diagram of how species originate through time in a manner that, on paper, resembles ...
Social scientists study what gadget users want and need
Matt Wallaert is not a software engineer. Nor is he a programmer or developer. Still, it's not unusual for him to get calls regularly from tech companies looking to recruit him.
Blogging Birds: The lives of Red Kites, told by computers
New ground-breaking technology is helping to tell the real-time story of Scotland's satellite-tagged red kites without any human input.