Supercomputing performance is getting a new measurement with the Graph500 executive committee's announcement of specifications for a more representative way to rate the large-scale data analytics at the heart of high-performance computing. An international team announced the single-source shortest-path specification to assess computing performance at the International Supercomputing Conference in Hamburg, Germany.
Nobel winner Roger Myerson's work on single-item auctions was groundbreaking research, but his question regarding the best way to organize an auction in which bidders are competing for multiple items has remained unanswered for decades. Massachusetts Institute of Technology researchers have developed an algorithm to generalize this problem.
A new computational model developed by a team of Virginia Tech researchers provides a framework to better understand responses of macrophage cells of the human immune system. The Virginia Tech team used the Metropolis algorithm, a computer simulation technique widely used in physics and chemistry, to enumerate possible molecular mechanisms giving rise to priming and tolerance.
Researchers in the Biometric Technologies Laboratory at the University of Calgary have developed a way for security systems to combine different biometric measurements—such as eye color, face shape, or fingerprints—and create a learning system that simulates the brain in making decisions about information from different sources.
Memory devices for computers require a large collection of components that can switch between two states, which represent the 1s and 0s of binary language. Engineers hope to make next-generation chips with materials that distinguish between these states by physically rearranging their atoms into different phases. Researchers at the University of Pennsylvania have now provided new insight into how this phase change happens.
The U.S. Department of Energy Office of Science and the National Science Foundation have committed up to $27 million to Open Science Grid, a nine-member partnership extending the reach of distributed high-throughput computing networks.
The National Nuclear Security Administration (NNSA) announced that a supercomputer called Sequoia at Lawrence Livermore National Laboratory was ranked the world's most powerful computing system. Clocking in at 16.32 sustained petaflops, Sequoia earned the No. 1 ranking on the industry standard Top500 list of the world's fastest supercomputers.
Two years ago, a fledgling social-networking site called Blippy accidentally posted the credit card numbers of its users online. While that was a particularly egregious example, such inadvertent information leaks happen all the time. Massachusetts Institute of Technology researchers have developed a new programming system that could help prevent such inadvertent information leaks.
Fujitsu Laboratories, National Institute of Information and Communications Technology, and Kyushu University jointly broke a world cryptography record with the successful cryptanalysis of a 278-digit (923-bit)-long pairing-based cryptography, which is now becoming the next generation cryptography standard.
A trio of theorists, including one from the NIST, have described how a future quantum computer could be used to simulate complex, high-energy collisions of subatomic particles. Given a working quantum computer—still under development—the algorithm could solve important physics problems well beyond the reach of even the most powerful conventional supercomputers.
A new set of computer models has successfully predicted negative side effects in hundreds of current drugs, based on the similarity between their chemical structures and those molecules known to cause side effects, according to a paper.
Computer scientists at the University of Glasgow are participating in a new project to develop a search engine which will draw its results from sensors located in the physical world.
The quantum computer is a futuristic machine that could operate at speeds even more mind boggling than the world's fastest supercomputers. Research involving physicist Mike Thewalt of Simon Fraser University offers a new step towards making quantum computing a reality, through the unique properties of highly enriched and highly purified silicon.
Researchers from Rice University and the University of California, Los Angeles unveiled a new data-encoding scheme that slashes more than 30% of the energy needed to write data onto new memory cards that use phase-change memory—a competitor to flash memory that has big backing from industry heavyweights.
Oracle has announced that it has entered into an agreement to acquire Collective Intellect, a company that specializes in cloud-based social intelligence solutions that enable organizations to monitor, understand, and respond to consumers' conversations on social media platforms such as Facebook and Twitter.
Lawrence Livermore National Laboratory researchers have for the first time identified a precise measurement of the amount of radiation damage that will occur in any given material. With a full understanding of the early stages of the radiation damage process, researchers are provided with better knowledge and tools to manipulate materials to our advantage.
U.S. researchers are perfecting simulations that show a nuclear weapon's performance in precise molecular detail. Because international treaties forbid the detonation of nuclear test weapons, tools that can accurately depict an explosion are becoming critical for national defense.
Scientists at Rice University and the University of Texas MD Anderson Cancer Center have successfully profiled protein pathways found to be distinctive to leukemia patients with particular variants of the disease. Their research involved the creation of a new computational approach to identifying complex networks in protein signaling.
Police and security teams guarding airports, docks, and border crossings from terrorist attack or illegal entry need to know immediately when someone enter a prohibited area. A network of surveillance cameras is typically used to monitor these at-risk locations. Now, a system being developed by Massachusetts Institute of Technology can perform security analysis more accurately and in a fraction of the time it would take a human camera operator.
Research at Carlos III University in Madrid is developing an algorithm, based on ants' behavior when they are searching for food, which accelerates the search for relationships among elements that are present in social networks.
Northwestern University researchers are the first to discover that very different complex networks—ranging from global air traffic to neural networks—share very similar backbones. By stripping each network down to its essential nodes and links, they found each network possesses a skeleton and these skeletons share common features, much like vertebrates do.
Quantum computers are still years away, but a trio of theorists has already figured out at least one talent they may have. According to the theorists, physicists might one day use quantum computers to study the inner workings of the universe in ways that are far beyond the reach of even the most powerful conventional supercomputers.
In a new paper, Stanford University researchers describe a mathematical model they created that helps predict pragmatic reasoning and may eventually lead to the manufacture of machines that can better understand inference, context, and social rules.
As malware threats expand into new domains and increasingly focus on industrial espionage, Georgia Institute of Technology researchers are launching a new weapon to help battle the threats: A malware intelligence system that will help corporate and government security officials share information about the attacks they are fighting.
Through advanced computer modeling of house fires, mechanical engineers at the University of New South Wales are giving fire fighters a new suite of tools to investigate and battle dangerous blazes in time for the traditionally high-risk winter months. Beginning with an ignition point, the models can map how fires behave as they grow, accurately predicting their overall temperature and pinpointing dangerous hotspots that responding personnel should avoid.