06/24/2020 - Note: the original article was written for and published on the Texas Advanced Computing Center website. Authorship credit goes to Faith Singer-Villalobos. Read more
06/11/2020 - The datasets used by many software applications can be represented as graphs, defined by sets of vertices and edges. These graphs are rich with useful information, and can be used to determine patterns and relationships among the stored data. This process of discovering relevant patterns from graphs is called Graph Pattern Mining (GPM). A team of Texas Computer Science (TXCS) researchers advised by Dr. Keshav Pingali has done groundbreaking work to make GPM programs more efficient and accessible. Read more
05/28/2020 - Artificial Intelligence (AI) is a rapidly evolving field, with advancements occurring every day. While the idea of an artificial intelligence system may conjure images of an autonomous machine that rattles out facts like a hi-tech encyclopedia, complex AI exists only because a countless number of talented individuals dedicate their time toward refining these systems. Read more
03/25/2020 - The promise of artificial intelligence to solve problems in drug design, discover how babies learn language, and make progress in many other areas has been stymied by the inability of humans to understand what's going on inside AI systems. Researchers at six universities, including The University of Texas at Austin, are launching a partnership aimed at turning these AI "black boxes" into human-interpretable computer code, allowing them to solve hitherto unsolvable problems. Read more
03/04/2020 - The paper titled “The BLIS Framework: Experiments in Portability” recently received the 2020 SIAM Activity Group on Supercomputing Best Paper Prize. Among the authors of this paper are TXCS professor Dr. Read more
02/25/2020 - A powerful new approach to securing web browsers, using a tool called WebAssembly, is getting its first real-world application in the Firefox browser. Read more
02/04/2020 - Most websites that we use every day are database applications, which means that they involve software that interacts with an underlying database. As these websites evolve to meet the demands of their users, so must the software and the database schema, i.e., the model that determines the layout of the data. This process is extremely time-consuming and error-prone, because developers not only need to transform the data, but also re-implement all the affected parts of the application. Read more
01/09/2020 - There are few pet peeves worse than being unable to find the right song. It’s this endless cycle of shuffling through a music library that inspired UT alumni and faculty to create DJ Monte-Carlo (DJ-MC)—a program tailored to preemptively pick music that suits your mood.  Read more
11/20/2019 - The 26th ACM Conference on Computer and Communications Security (CCS) took place in London last week. Over the years, CCS has established itself as a high standard research conference in the field of information security, and is one of the "big four" security conferences in the world. Each year since 2012, CCS has recognized one or two papers from the conference a decade earlier with a test-of-time award. Read more
11/01/2019 - Advances in machine learning are announced every day, but efforts to fundamentally rethink the core algorithms of AI are rare. Read more


Subscribe to Topic: Research