Monday, June 24, 2019

Meet the lawyer disrupting her profession

photo of digital gavel representing use of AI in law

Maura Grossman, a Cheriton School of Computer Science Research Professor, is using AI to make legal document review more effective and efficient

She has been called the most dangerous lawyer in America for her research and advocacy on technology-assisted review (TAR).

Tuesday, June 11, 2019

New tool shows that goodwill may trump profit as a work motivator

photo of Keiko Katsuragawa and Ed Lank

Researchers at the Cheriton School of Computer Science have found that individuals may be more motivated to do work for their favourite charity than for money. 

In a study reviewing the efficacy of a new online work-sharing platform designed to put money into the hands of charities, the researchers discovered that people providing their skills and labour toward a specific task tended to do a better job if they knew their favourite charity rather than themselves would be paid for it.

Tuesday, May 21, 2019

Moojan Ghafurian, Neil Budnarain and Jesse Hoey make AI more human

photo of  Moojan Ghafurian

The key to people trusting and co-operating with artificially intelligent agents lies in their ability to display human-like emotions, according to a new study by Postdoctoral Fellow Moojan Ghafurian, Master’s candidate Neil Budnarain and Professor Jesse Hoey at the Cheriton School of Computer Science.

Monday, May 13, 2019

Chang Ge, Ihab Ilyas, Xi He and Ashwin Machanavajjhala develop new system that offers protection against data breaches

photo of PhD student Chang Ge

Cheriton School of Computer Science PhD candidate Chang Ge, Professors Ihab Ilyas and Xi He, and their colleague Professor Ashwin Machanavajjhala at Duke University 

Thursday, May 2, 2019

Speeding up a blockchain to meet real-world speeds and needs

photo of Professor Srinivasan Keshav, PhD candidate Christian Gorenflo, Professor Lukasz Golab

Blockchain technology creates digital ledgers that record sequential exchanges of information, commonly called transactions. To improve performance, transactions are batched into blocks before they are added to the ledger. Each new block contains a hash value which, like a mugshot, acts as an identifier and proof of the previous state of the ledger.

  1. 2019 (46)
    1. June (7)
    2. May (5)
    3. April (11)
    4. March (6)
    5. February (10)
    6. January (7)
  2. 2018 (82)
    1. December (6)
    2. November (8)
    3. October (8)
    4. September (12)
    5. August (4)
    6. July (8)
    7. June (8)
    8. May (5)
    9. April (10)
    10. March (6)
    11. February (2)
    12. January (5)
  3. 2017 (50)
    1. December (3)
    2. November (6)
    3. October (7)
    4. September (4)
    5. August (3)
    6. July (2)
    7. June (7)
    8. May (8)
    9. April (2)
    10. March (6)
    11. February (2)
  4. 2016 (27)
  5. 2015 (41)
  6. 2014 (32)
  7. 2013 (46)
  8. 2012 (17)
  9. 2011 (20)