A new Journal of Economics & Management Strategy study investigates whether social media may be used as a source of information for recruiters to discriminate against job applicants.
Study identifies reasons for unsettled editing disagreements and offers predictive tools that could improve deliberation.
Web browsers use GPUs to render graphics on desktops, laptops, and smart phones. GPUs are also used to accelerate applications on the cloud and data centers. GPUs are usually programmed using application programming interfaces, or APIs, such as OpenGL. OpenGL is accessible by any application on a desktop with user-level privileges. Since desktop or laptop machines by default come with the graphics libraries and drivers installed, the attack can be implemented easily using graphics APIs.
In a paper being presented at the International Symposium on Experimental Robotics conference next week, MIT researchers describe an autonomous system for a fleet of drones to collaboratively search under dense forest canopies. The drones use only onboard computation and wireless communication -- no GPS required.
A team of researchers is helping law enforcement crack down on email scammers, thanks to a new visual analytics tool that dramatically speeds up forensic email investigations and highlights critical links within email data. Email scams are among the most prevalent, insidious forms of cybercrime. The research team has already begun sharing Beagle with law enforcement agencies at no cost to assist in their investigations, and will continue to refine its capabilities based on real-world feedback.
MIT researchers have developed a novel 'unsupervised' language translation model -- meaning it runs without the need for human annotations and guidance -- that could lead to faster, more efficient computer-based translations of far more languages.
In a paper being presented at this week's Empirical Methods in Natural Language Processing conference, MIT researchers describe a parser that learns through observation to more closely mimic a child's language-acquisition process, which could greatly extend the parser's capabilities.
Researchers Lingjia Liu and Yang (Cindy) Yi are using brain-inspired machine learning techniques to increase the energy efficiency of wireless receivers.
A new technique protects power grids from attacks against utility control systems that can shut down facility operations, trigger longer-term blackouts and even cause permanent physical damage.
The criticality of certain sectors, as well as the requirement of users, involve Cloud providers to guarantee a high level of performance. This article embraces two parts, including a first section that assesses the factors which influence performance by using an analysis methodology inspired by the concept of the Taguchi experience plan. The second part builds on the conclusions of the first section by proposing a three-level architecture that optimizes load balancing via an ACO algorithm.