Quantcast
Channel: Technology – Mobile Logs Technology
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Computational imaging method identifies

MIT researchers and their colleagues are designing an imaging system that can read closed books. In the latest issue of Nature Communications, the researchers describe a prototype of the system, which...

View Article



Language for programming efficient simulations

Computer simulations of physical systems are common in science, engineering, and entertainment, but they use several different types of tools. If, say, you want to explore how a crack forms in an...

View Article

Analysis of ant colony behavior

Ants, it turns out, are extremely good at estimating the concentration of other ants in their vicinity. This ability appears to play a role in several communal activities, particularly in the voting...

View Article

Prototype display enables viewers to watch

Fortunately, there may be hope. In a new paper, a team from MIT’s Computer Science and Artificial Intelligence Lab (CSAIL) and Israel’s Weizmann Institute of Science have demonstrated a display that...

View Article

Image may be NSFW.
Clik here to view.

Programming language is helping to solve problems

“Julia is a great tool.” That’s what New York University professor of economics and Nobel laureate Thomas J. Sargent told 250 engineers, computer scientists, programmers, and data scientists at the...

View Article


Enable chips that use trapped ions as quantum bits

Quantum computers are largely hypothetical devices that could perform some calculations much more rapidly than conventional computers can. Instead of the bits of classical computation, which can...

View Article

Ensure databases used in medical research

Genome-wide association studies, which try to find correlations between particular genetic variations and disease diagnoses, are a staple of modern medical research. But because they depend on...

View Article

Anonymity if all but one of its servers are compromised

Anonymity networks protect people living under repressive regimes from surveillance of their Internet use. But the recent discovery of vulnerabilities in the most popular of these networks — Tor — has...

View Article


Any competent spreadsheet user can construct custom database

When an organization needs a new database, it typically hires a contractor to build it or buys a heavily supported product customized to its industry sector. Usually, the organization already owns all...

View Article


Image may be NSFW.
Clik here to view.

High precision under adverse weather conditions

During a mid-March snowstorm, researchers from MIT Lincoln Laboratory achieved real-time, nighttime, centimeter-level vehicle localization while driving a test vehicle at highway speeds over roads...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images