Related topics: cyberattack · hackers

Deep learning for electron microscopy

Finding defects in electron microscopy images takes months. Now, there's a faster way. It's called MENNDL, the Multinode Evolutionary Neural Networks for Deep Learning. It creates artificial neural networks—computational ...

A novel solver for approximate marginal map inference

There is a deep connection between planning and inference, and over the last decade, multiple researchers have introduced explicit reductions showing how stochastic planning can be solved using probabilistic inference with ...

Smart speakers make passive listeners

People explore less when they get recommendations from voice-based platforms such as Amazon's Alexa or Apple's Siri, making it more likely that they'll hear options chosen by an algorithm than those they might actually prefer.

The argument from cyberspace for eliminating nuclear weapons

At the height of the Cold War in 1982, American psychiatrist Robert Jay Lifton argued that the "central existential fact of the nuclear age is vulnerability." That warning predated the proliferation of computers into almost ...

One step closer to complex quantum teleportation

The experimental mastery of complex quantum systems is required for future technologies like quantum computers and quantum encryption. Scientists from the University of Vienna and the Austrian Academy of Sciences have broken ...

page 26 from 40