Colorization Using Optimization
A very cool SIGGRAPH ’04 paper on automatic colorization using marked images. A fairly simple algorithm with very impressive results. The paper as PDF, and the code in MATLAB. One of the authors of...
View ArticleA Homemade GPS Reciever
A homemade GPS receiver including FPGA code and a pretty clear explanation of how it works. Excellent work and a good read. Check it out here.
View ArticleHow Google’s Self Driving Car Works
IEEE Spectrum have an article describing some details of the Google autonomous vehicle project, much of the information is public for the first time. The article is here, but by far the best bit is the...
View ArticleSide Channel Attacks
An interesting read on side channel attacks: “The second story was about USB devices. Basically, they plugged a very precise voltmeter into an USB port and started recording the very small variations...
View ArticleMicrosoft Research shows Augmented Projectors
Some really great work out of MSR. Combination Depth Camera/Projector/IMU allows for some really novel interactions. Worth a look.
View ArticlePatenting the impossible
Jean-loup Gailly (author of gzip!) dissects US Patent 5,533,051 on ‘compression of random data’. The title immediately raises suspicion as it’s impossible to compress truly random data. Anyone with a...
View ArticleAI Challenge Post Mortem Article
The winner of the AI Challenge 2011 has posted a detailed description of their code. It’s worth a quick read and spells out the algorithms clearly, with example code in Java. Link.
View ArticleAlgorithm Measures Human Pecking Order
The MIT Technology Review has covered a fascinating paper that concludes : “The way people copy each other’s linguistic style reveals their pecking order.” Worth a read. Link. The original paper is...
View ArticleThe Value of Immediate Feedback
You may have heard of Bret Victor from his “Kill Math” project and the beautiful differential equation playground that he has created with his Interactive Exploration of a Dynamical System. It caused...
View ArticleBreaking Full-Disk Encryption Using FireWire
There have been a number of proof-of-concept hacks using IEEE1394 devices’ DMA to elevate privileges on a host machine. The most useful application of this technique is breaking into machines that use...
View ArticleThe GRAIL Project
In 1964 the RAND corporation unveiled the GRAIL Project. GRAIL was an early example of a GUI, and (the first?) example of a tablet. The system used a programming language called GrailLanguage, which...
View Article
More Pages to Explore .....