jueves, 8 de diciembre de 2016

Noticias y opinión


Diseña un sistema 3D para ordenadores personales

(hace 5 años, 10 meses) | Seguir leyendo

New Device May Revolutionize Computer Memory

(hace 5 años, 10 meses) | Seguir leyendo

How Computer Games Could Help Us All Make Better Decisions in Life

(hace 5 años, 10 meses) | Seguir leyendo

Reading emotions, computer style

Having a computer that can read our emotions could lead to all sorts of new applications, including computer games where the player has to control their emotions while playing. Thomas Christy, a Computer Science PhD student at Bangor University is hoping to bring this reality a little nearer by developing a system that will enable computers to read and interpret our emotions and moods in real time.

(hace 5 años, 10 meses) | Seguir leyendo

A Reference Model for Master of Science Program in Services Computing

(hace 5 años, 10 meses) | Seguir leyendo

A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks

(hace 5 años, 10 meses) | Seguir leyendo

Benchmarking Vulnerability Detection Tools for Web Services

(hace 5 años, 10 meses) | Seguir leyendo

Secure Virtual Machine Execution under an Untrusted OS

(hace 5 años, 10 meses) | Seguir leyendo

Interacting with the SOA-Based Internet of Things: Discovery, Query, Selection, and On-Demand Provisioning of Web Services

(hace 5 años, 10 meses) | Seguir leyendo

Advanced Architectures and Execution Models to Support Green Computing

(hace 5 años, 10 meses) | Seguir leyendo

Crowdsourcing What Is Where: Community-Contributed Photos as Volunteered Geographic Information

(hace 5 años, 10 meses) | Seguir leyendo

An Integrated Framework for Avatar Data Collection from the Virtual World

(hace 5 años, 10 meses) | Seguir leyendo

Converting 2-D photo into 3-D face for security applications and forensics

It is possible to construct a three-dimensional, 3D, face from flat 2D images, according to research published in the International Journal of Biometrics this month. The discovery could be used for biometrics in security applications or in forensic investigations.

(hace 5 años, 10 meses) | Seguir leyendo

Keeping Your Digital Secrets Safe

TAU develops security application to keep private data private

(hace 5 años, 10 meses) | Seguir leyendo

Mobile telephony without base stations

The new generation of mobile phone technology makes it possible to communicate directly from one telephone to another without having to rely on base stations. A dissertation at Linköping University presents a program that runs on telephones and can deliver messages even when the infrastructure for telecommunication has been knocked out.

(hace 5 años, 10 meses) | Seguir leyendo

La hora de la innovación

La Ley de Economía Sostenible, que propone medidas en diversas áreas de la actividad y la economía española, tras su largo plazo de tramitación parlamentaria y una votación envuelta en polémicas debido a la Disposición Final Segunda de la Ley, conocida como "Ley Sinde", prosiguió su camino hacia la aprobación.

(hace 5 años, 10 meses) | Seguir leyendo

Amazon offers Beanstalk for easy Web Services deployment

Amazon automatically provisions cloud resources for Java apps

(hace 5 años, 10 meses) | Seguir leyendo

Google's Video Play

By dropping support for a common video format in Chrome, Google means to drive the Web toward one it owns.

(hace 5 años, 10 meses) | Seguir leyendo

Internet-Based Rehab Is a Viable Treatment Option Following Knee Surgery

(hace 5 años, 10 meses) | Seguir leyendo

Smarter Buildings Is New Tech Goal

(hace 5 años, 10 meses) | Seguir leyendo