-
Bees' swarm intelligence should be applied to Internet servers
Honeybees manage efficiently and effectively to collect a lot of nectar with limited resources and no central command; Yellow Jacket researchers study how bees do it, and show that the way bees go about allocating resource for nectar collection is suitable for allocation of server resources to serve Web sites
-
-
SecureRF announces new breakthrough in RFID cryptography
Algebraic Eraser algorithms rely on a large quantity of small numbers to stop digital pick-pocketing; technique increases processing speed without compromising security
-
More headlines
The long view
Risk Assessment with Machine Learning
Researchers utilize geological survey data and machine learning algorithms for accurately predicting liquefaction risk in earthquake-prone areas.
Bookshelf: Smartphones Shape War in Hyperconnected World
The smartphone is helping to shape the conduct and representation of contemporary war. A new book argues that as an operative device, the smartphone is now “being used as a central weapon of war.”
New Approach Detects Adversarial Attacks in Multimodal AI Systems
New vulnerabilities have emerged with the rapid advancement and adoption of multimodal foundational AI models, significantly expanding the potential for cybersecurity attacks. Topological signatures key to revealing attacks, identifying origins of threats.