Cyberthreats under the Bed

Internet-connected toys provide an often-overlooked avenue for breaching personal data, especially of those most vulnerable. Government and private measures can minimize the risks, but responsibility for monitoring smart toy usage ultimately lies with parents. Source: New feed

Breathing-Based Authentication on Resource-Constrained IoT Devices using Recurrent Neural Networks

Recurrent neural networks (RNNs) have shown promising results in audio and speech-processing applications. The increasing popularity of Internet of Things (IoT) devices makes a strong case for implementing RNN-based inferences for applications such as acoustics-based authentication and voice commands for smart homes. However, the feasibility and performance of these inferences…

The Birth of Digital Poetry

An English professor rediscovered how some of the best poets in the world were coding poetry algorithms in the 1960s Photo: Micheline Pelletier Decaux/Getty Images Photo: Micheline Pelletier Decaux/Getty Images Programmer Poet: Acclaimed author J.M. Coetzee developed software for composing verse on an early British supercomputer. When we think of people…

International Neuroscience Initiatives through the Lens of High-Performance Computing

Neuroscience initiatives aim to develop new technologies and tools to measure and manipulate neuronal circuits. To deal with the massive amounts of data generated by these tools, the authors envision the co-location of open data repositories in standardized formats together with high-performance computing hardware utilizing open source optimized analysis codes.…

It's Never Too Early To Think About 6G

Companies have barely begun deploying 5G networks, but that just means researchers are thinking about what comes next Photo-illustration of 6G. The first thought that popped into your head as soon as you read this article’s headline was likely something along the lines of “Wait, I thought we were still…