Similar Articles |
|
Technology Research News September 19, 2005 |
Two Schools of Cryptography Hard numbers vs. uncertainty: Computationally secure methods use cryptographic keys that are answers to difficult-to-solve mathematical problems. Probabilistically secure methods use cryptographic keys chosen at random from a fast source of random signals. |
Technology Research News December 3, 2003 Eric Smalley |
Chaotic lasers lock messages Researchers from Advanced Telecommunications Research Institute International in Japan have found a way for two people in different locations to work out a cryptographic key using the signal from the rapidly and randomly fluctuating light signal of a chaotic laser. |
Technology Research News September 22, 2004 Eric Smalley |
Bank Transfer Demos Quantum Crypto As quantum cryptography nears practical application, researchers are working on the next generation of the technology, which includes the weird quantum phenomenon of entanglement. |
Technology Research News October 8, 2003 |
Design enables large neural nets Researchers have devised a neural network architecture that uses a different mix of optics and electronics than previous schemes in order to accommodate large numbers of neurons. |
Technology Research News June 30, 2004 Eric Smalley |
Memory cards make connections Researchers from Sony Computer Science Laboratories, Inc. have devised a type of removable media named TranSticks that acts as a virtual wire and as a shared memory card. |
Technology Research News December 31, 2003 |
Colors expand neural net Researchers from the University of Tokyo have worked out a way to form an especially fast optical neural network by tapping the wave nature of lightwaves rather than just the amplitude, or strength of a signal. |
RootPrompt.org April 17, 2000 Lance Spitzner |
Digital Certificates & Encryption Digital Certificates & Encryption - how they work and apply to Internet Commerce. |
Technology Research News March 24, 2004 Eric Smalley |
System susses out silent speech Scientists from the NASA Ames Research Center are taking advantage of the nerve activity that happens near the throat when humans speak in order to gain information about what a person is saying. |
IEEE Spectrum September 2011 Taylor & Cox |
Behind Intel's New Random-Number Generator This random-number generator uses digital circuits to stump the smartest hackers. |
RootPrompt.org May 15, 2000 |
Snake Oil Warning Signs If you ever have been asked by a PHB, or other type of manager to review a crypto package or find your self making decisions about what sorts of crypto (if any) to use then take a look at this FAQ.... |
IEEE Spectrum August 2012 Steve Furber |
Low-Power Chips to Model a Billion Neurons A miniature, massively parallel computer, powered by a million ARM processors, could produce the best brain simulations yet |
Chemistry World February 24, 2011 Carl Saxton |
Mapping brain networks US scientists have created a model of the ring-shaped networks of neurons in the brain, which could help researchers to understand small changes within diseased brain cells. |
Wired August 2003 Tom McNichol |
Totally Random How two math geeks with a lava lamp and a webcam are about to unleash chaos on the Internet. |
IEEE Spectrum May 2008 Morgen E. Peck |
Scheme to Let Robot Take Over Brain-Computer Interface MEMS-based system could position electrodes in brain tissue to improve neural prosthetics. |
Popular Mechanics September 4, 2009 Erik Sofge |
Hollywood Reality Check: The Real Science of Brain Puppetry Daryl Kipke, director of the Center for Neural Communication Technology at the University of Michigan, sees neural interface technology keeping pace with robotics, with each field bootstrapping the other |