Twitter bots have earned a bad reputation -- but not all bots are bad, suggests a new study co-authored by Emilio Ferrara, a USC Information Sciences Institute computer scientist and a research assistant professor at the USC Viterbi School of Engineering's Department of Computer Science with a team from the Technical University of Denmark.
Mathematicians have opened a new chapter in the theory of moonshine, one which begins to harness the power of the pariahs -- sporadic simple groups that previously had no known application.
From self-folding robots, to robotic endoscopes, to better methods for computer vision and object detection, researchers at the University of California San Diego have a wide range of papers and workshop presentations at the International Conference on Intelligent Robots and Systems (or IROS) which takes place from Sept. 24 to 28 in Vancouver, Canada. UC San Diego researchers also are organizing workshops on a range of themes during the event.
Nature Communications today published research by a team comprising Scottish and South African researchers, demonstrating entanglement swapping and teleportation of orbital angular momentum 'patterns' of light. This is a crucial step towards realizing a quantum repeater for high-dimensional entangled states.
A new imaging technique makes it possible to precisely digitize clear objects and their surroundings, an achievement that has eluded current state-of-the-art 3-D rendering methods.
Where do cosmic rays come from? Solving a 50-year-old mystery, a collaboration of researchers has discovered it's much farther than the Milky Way.
The scientists from the Center for Applied Probabilistic Analysis of the Institute of Applied Mathematics and Telecommunications of the RUDN University have used a new mathematical model to find out why telecommunication systems and electronic equipment that handles numerous client requests break down. The results of the study were published in the Applied Mathematics and Computation journal.
Researchers at MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) have developed a new system that allows programmers to transplant code from one program into another. The programmer can select the code from one program and an insertion point in a second program, and the system will automatically make modifications necessary -- such as changing variable names -- to integrate the code into its new context.
MSU biometric expert Anil Jain and doctoral student Joshua Engelsma have for the first time designed and created a fake finger containing multiple key properties of human skin. Commonly called a spoof, this fake finger has been used to test two of the predominant types of fingerprint readers to help determine their resilience to spoof attacks.
A new study from the US Army Research Laboratory presents evidence that the number of cyber intrusions can be predicted, particularly when analysts are already observing activities on a company or government organization's computer network.