15 genius algorithms that aren't boring

A look at the world of algorithms designed to prevent Denial of Service attacks, jam electronic signals, monitor your behavior and tell you how bad your gout is.

By Michael Cooney, Network World |  Science, mathematics, slideshow

Big Brother lives:

Researchers are looking to develop an intelligent image system that can monitor large areas, perhaps miles wide, identify potential threats based on the correlation of events and anomalies it detects, and issue timely alerts with few false alarms. DARPA's PerSEAS program is developing algorithms to associate these fragments of information in order to identify localized events. Within these localized events, algorithms that discover relationships and anomalies that are
indicative of suspicious behavior, match previously learned threat activity, or match user defined threat activity should also be incorporated.

See also:
Top 10 cool satellite projects
How 10 Famous Technology Products Got Their Names

Republished with permission from Network World (view original version)

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question