News

Georgia Tech School of Computer Science professor Paul Royal spoke to CBS 46 about the computer virus Spy Eye. Source: CBS 46

Visit Website

As Lance Fortnow describes in his new book, “The Golden Ticket: P, NP and the Search for the Impossible,” P versus NP is “one of the great open problems in all of mathematics” not only because it is extremely difficult to solve but because it has such obvious practical applications. Source: The New Yorker

 

 

Visit Website

Georgia Tech researchers have developed a computational model that can predict video game players’ in-game performance and provide a corresponding challenge they can beat, leading to quicker mastery of new skills. The researchers used a method called collaborative filtering, a popular technique employed by Netflix and Amazon in product ratings and recommendations. While Netflix recommends movies, the gaming model recommends the next challenge for players, adjusting game difficulty by computationally forecasting in-game performance.

"Some of those 'phone books' are open for anybody to use," says Paul Royal. "Unfortunately that means that attackers can abuse those 'phone books' by asking a question in a way that generates a very large response and targets a victim of their choice." Source: Marketplace

 

Visit Website

It's important to be aware of the threats to enterprise security that are coming over the horizon and heading this way. It's a question the Georgia Institute of Technology addresses in its Emerging Cyber Threat Report 2013, in which researchers identify at least six threats that all security professionals should know about. Source: E-Security Planet

Visit Website

Most of those on track to graduate from the Georgia Institute of Technology in Atlanta have job offers two months before May, when they leave, said Jasmine Lawrence, 21, a computer science major who has been hired by Microsoft Corp., where she had an internship last summer. Source: Bloomberg

Visit Website

On Monday, March 4, Nobel Laureate Ken Arrow delivered the College of Computing’s Distinguished Lecture titled “Health and Wealth.” Addressing a standing-room-only crowd, Arrow discussed longevity and other aspects of health as commodities, as well as their trade-off with more usual goods as important measures of the well being of nations.

Researchers Wei Meng and Ruian Duan, working under the supervision of Wenke Lee, studied the botnet's remediation efforts, which began early last year, and found that phone contact, billing notices, and redirecting infected users to special Web pages are the best ways to alert them to their infections. Source: Dark Reading

Visit Website

Cedric Stallworth, along with other computer science professionals, discusses why it is imperative for the field to embrace a diversity of perspectives to address today's global challenges. Source: National Science Foundation

 

Visit Website

Nick Feamster (Comp Sci) discusses data caps and tiered broadband pricing. Source: BroadbandBreakfast 

Visit Website