Topix.net
Advanced Search
Enter ZIP, City or News Search

Computer Science News

Web 2.0 Conference

Computer Science News continually updated from thousands of sources around the net.

Front Page > Science News > Computer Science
Jeff Hawkins' AI Obsession
Redherring.com | 16 hours ago
The Palm Pilot pioneer is concentrating on creating tools for developing artificial-intelligence applications.2.7
NSF announces program to create a new Internet
Federal Computer Week | Yesterday
Facing an innovation deficit BY Aliya Sternstein Published on Aug. 26, 2005 More Related Links National Science Foundation officials have announced a research program devoted to constructing a new Internet.2.7
Caltech Professor Peter Schroder Receives ACM SIGGRAPH Achievement Award
Uemedia.net | Thursday Aug 25
ACM SIGGRAPH awarded its 2003 Computer Graphics Achievement Award to Peter Schroder for his contributions to the newly emerging area of 3D geometry processing.2.7
Computer science graduates face struggle to find jobs
Business.scotsman.com | Wednesday Aug 24
STUDENTS of computer science find it almost twice as difficult to get a job as students of other subjects, according to a new report.2.7
Self-healing
Wired | Tuesday Aug 23
Microchips are like potato chips: More of them come out of the oven broken than whole.
A Techie, Absolutely, and More
Gadsden Times | Tuesday Aug 23
Jamika Burge is heading back to Virginia Tech this fall to pursue a Ph.D. in computer science, but her research is spiced with anthropology, sociology, psychology, psycholinguistics - as well as observing ...2.7
Certicom speeds digital signature verification
Federal Computer Week | Monday Aug 22
BY Michael Arnone Published on Aug. 22, 2005 More Related Links Certicom Corp. has developed a way to speed up the verification of digital signatures, company officials announced last week.2.7
The One-Eyed Man Is King
IEEE Software | Friday Aug 19
Just as the May/June 2005 issue of IEEE Security & Privacy was being mailed to readers, the US House of Representatives Committee on Science held a hearing concerning the status of US computer science research ...2.9
SHA-1 compromised further
NewsForge.com | Friday Aug 19
Crypto researchers have discovered a new, much faster, attack against the widely-used SHA-1 hashing algorithm.2.7
Topics: Cryptography
Research on Fundamental Issues of Information Science and Technology
Ccnmag.com | Friday Aug 19
The grants will fund theoretical research with potential real-world applications in digital communications, information storage and circuit design.2.7
Scientific Applications or Grid Computing
IEEE Software | Friday Aug 19
The use of parallel computation for scientific research is so widespread today that its easy to forget it began on a large scale as recently as the late 1980s.2.9
Girls get own class in computer science
News Observer | Thursday Aug 18
Girls get own class in computer science By NIKOLE HANNAH-JONES, Staff Writer DURHAM -- Even the high school for the state's science and math elite can't find enough girls willing to become computer geeks.2.7
Wanted in the tech world: More women
MSNBC | Thursday Aug 18
The number of women considering careers in information technology has dropped to its lowest level since the mid-1970s -- and one local nonprofit organization intends to do something about it.2.7
Topics: Colorado
Modern History of Cryptography Techniques
Slashdot | Wednesday Aug 17
Modern History of Cryptography Techniques . Not if you only intended for the protection to last a couple of years.2.7
Natural Selection Inc. Gets NSF Grant: Two-Year Effort to Research...
Bio.com (Registration Required) | Tuesday Aug 16
Natural Selection, Inc. has been awarded a two-year grant for approximately $406,000 from the National Science Foundation to research and develop software for microRNA detection and analysis.2.7
Topics: Health
Device Leverages Bluetooth to Care for Stroke Victims
Wireless.weblogsinc.com | Tuesday Aug 16
A scanner embedded with Bluetooth linked to a computer in an ambulance is being developed by a British scientist in hopes that it will save stroke victims from suffering permanent brain damage.2.7
WU is home to rare collection of coded books
St. Louis Post-Dispatch | Saturday Aug 13
This very early treatise on cryptography was probably first published in 1518. The work describes both substitution and transposition ciphers.2.9
MD5 flaw pops up in Australian traffic court
CNET News.com | Thursday Aug 11
Suspected flaws in a computer algorithm have invalidated a fine issued by a speed camera in Australia.2.7
UK e-blackmail suspect caught by Cretan police
Ekathimerini.com | Wednesday Aug 10
In what is perceived as a major victory against electronic crime, police have located a British man living in Crete who had allegedly attempted to blackmail a UK insurance company by threatening to target its ...2.7
Next-Gen Technology Programmer
Gamesindustry.biz | Tuesday Aug 9
Formed in 2000 this company have already produced two AAA games and are now working on a Major Next Generation title and to help them accomplish this they are looking for a senior technology programmer to join ...2.7
Ramirez & Company Signs Joint Venture with TradeTrek Securities, LLC...
Hispanic Business | Tuesday Aug 9
Investment bank Samuel A. Ramirez & Company has signed a joint venture agreement with Algorithm Trading Solutions, a division of TradeTrek Securities LLC, specializing in cutting- edge technology and ...2.7
Topics: New York
Computers take traders' places
The Dallas Morning News (Registration Required) | Tuesday Aug 9
Traders at the Investment Technology Group monitor electronic orders from about 500 institutional clients.2.9
Development of New Cryptography Communications Technology to Block Wiretapping
English Dong-A | Monday Aug 8
Korean researchers have developed new cryptography communications technology which makes wiretapping impossible in the first place.2.7
Embedded Linux Offers New Opportunities in Comm Access Arena
Electronic Design | Monday Aug 8
The communications access arena is rapidly changing. This highly dynamic market, with its many emerging standards and protocols, has become increasingly cost-sensitive. Developers must not only bring to market ...2.7
Page meets Brin: A Brief History of Google
Gizmosforgeeks.com | Sunday Aug 7
When he first met Larry Page in the summer of 1995, Sergey Brin was a second-year grad student in the computer science department at Stanford University.3.1
Worms Could Slip Through Detection Nets
CRN | Saturday Aug 6
By Gregg Keizer , TechWeb News 3:43 PM EDT Fri. Aug. 05, 2005 Future worms may be able to slip through the early warning networks deployed by the likes of SANS Internet Storm Center and Symantec, researchers ...3.1
Search Engine Guide Case Study: Yahoo Search Submit Pro Brings Happy Returns to Birthday Express
DM News | Friday Aug 5
BirthdayExpress.com is a destination Web site for children's party supplies and services.2.7
Google, MSN legal battle spins search results
CNET News.com | Friday Aug 5
Raising a question of bias, Google and MSN search results for keywords related to the legal battle between the two companies appear to be weighted differently, according to a news report on Thursday.2.7
Solve the complexity crisis in network system design
Communication Systems Design | Thursday Aug 4
By Kevin Graves, IP Fabrics Inc. CommsDesign.com Aug 04, 2005 While the telecom bubble of 1999 seems light years away, those of us in the business of designing networking equipment have seen the complexity and ...2.7
AccelChip Enhances Model-Based Design Tool Suite
Us.design-reuse.com | Wednesday Aug 3
MILPITAS, CA, Aug. 3, 2005 AccelChip Inc., the industrys only provider of automated flows from MATLAB algorithms to silicon, today announced the immediate availability of its 2005.3 version of AccelChip DSP ...2.7
The TOP500 and Computational Science
Scamag.com | Wednesday Aug 3
A not-so-simple matter of software Jack Dongarra, Ph.D. The TOP500 project was started in 1993 to provide a reliable basis for tracking and detecting trends in high-performance computing.2.7
C Synthesis Methodology for Implementing DSP Algorithms
Techonline.com | Wednesday Aug 3
While functional specifications and verification of DSP algorithms in C are common, standard design flows from C still require manual coding of the algorithm and the desired architecture in RTL.2.7
Computer Science - Page 2 4
Get news alerts for this page 4
 Subscription Site30-day free trial 
MultiTrade Securities, LLC. Selects FutureTrade's LiquidityPATH Program
PR Newswire via KeepMedia.com | Jun 21, 2005
FutureTrade, a leading provider of electronic equity, option, and algorithmic trading execution services, today announced an agreement whereby ...
More KeepMedia Articles 4

 
 
Ask questions, get answers www.wondir.com
 
Farming scheme turns back clock
BBC News
One more reason for a trip to the coffee shop
Independent Online
 
Following Montana's Dinosaur Trail
Salt Lake Tribune
Proper management key to conserving Guam's coral reefs
KUAM
Doctors Visit La Crosse to Learn Allergy Procedure
WXOW La Crosse
Grad students build career skills at summer microbiology institute
UConn Advance
Myriad Genetics shares rise on upgrade
BusinessWeek
 
 
elapsed time: 0.223 seconds