Majority voting method provides a smarter way to catch software bugs

Researchers from The University of Osaka, Kyushu University, and the University of Victoria have developed a new method called Majority Voting SZZ (MV-SZZ) that accurately identifies defect-inducing software commits. By combining detailed code tracking with a majority voting system, the approach reduces false positives and outperforms existing techniques. This improvement could help developers debug software more efficiently and build more reliable systems. The work is published in the journal IEEE Transactions on Software Engineering.

Phys.org > Computer Sciences Majority voting method provides a smarter way to catch software bugs

A human-inspired pipeline could enhance the training of computer vision models

Over the past few decades, computer scientists have developed increasingly advanced artificial intelligence (AI) systems that can tackle some tasks exceedingly well. These include computer vision models, systems that can rapidly analyze images and categorize them, recognize objects and faces, or make other accurate predictions.

Phys.org > Computer Sciences A human-inspired pipeline could enhance the training of computer vision models

효과적인 국제 연구 협력을 위해서는 ‘우수한 파트너 찾기’보다 ‘우수한 파트너 되기’가 중요

효과적인 국제 연구 협력을 위해서는 ‘우수한 파트너 찾기’보다 ‘우수한 파트너 되기’가 중요 - 국제 공동연구, 협력만으로 시너지 보장되지 않아 - 국가 간 역량 차이와 역할에 따른 협력 전략 필요 □ 한국과학기술정보연구원(원장 이식, 이하 KISTI)은 국제 연구 협업의 성과를 심층 분석한 「데이터로 바라본 국제 연구 협력에서 나타난 시너지 효과의 조건」 보고서를 발간했다고 밝혔다. 국제 연구 협업은 연구 역량 강화와 네트워크 확대를 위한 핵심 수단으로 활용되어 왔다. ○ 이번 보고서는 국제 협력 연..

한국과학기술정보연구원(KISTI) 소식 효과적인 국제 연구 협력을 위해서는 ‘우수한 파트너 찾기’보다 ‘우수한 파트너 되기’가 중요

Learn What It Takes to Become a Cybersecurity Consultant

Cybersecurity consultants have never been more in demand. Information security analyst roles are projected to grow nearly 30 percent between now and 2034, according to the U.S. Bureau of Labor Statistics. More than 15 million cybercrime incidents occurred worldwide in 2024, Statista reported.Data breaches are costly and pose direct safety risks. Statista reported that more than US $10 trillion is spent annually repairing the damage caused by cybercrime, most commonly phishing, spoofing, extortion, and data breaches. In one example in the United States, breathalyzer devices installed in vehicles became disabled, leaving hundreds of drivers stranded, as detailed in an IEEE Spectrum article.To ..

IEEE Spectrum > Computing

Ten Technology Enablers Shaping the Future of 6G Wireless

A guide to ten technological components — from THz communications and AI/ML to reconfigurable intelligent surfaces — poised to define 6G wireless networks.What Attendees will LearnWhich frequencies 6G will use — Understand why THz bands (above 100 GHz) and the7–24 GHz range are under consideration, what challenges CMOS technology faces at sub-THz frequencies, and how new semiconductor approaches aim to close the output-power gap for future link budgets.How AI/ML and joint communications and sensing reshape the air interface — how auto encoder-based end-to-end learning can replace traditional signal-processing blocks, and how a single waveform may serve both data transmission and ra..

IEEE Spectrum > Artificial Intelligence

Chatbots Need Guardrails to Prevent Delusions and Psychosis

Millions of people worldwide are turning to chatbots like ChatGPT or Claude, and a proliferating class of specialized AI companionship apps for friendship, therapy, or even romance.While some users report psychological benefits from these simulated relationships, research has also shown the relationships can reinforce or amplify delusions, particularly among users already vulnerable to psychosis. AIs have been linked to multiple suicides, including the death of a Florida teenager who had a months-long relationship with a chatbot made by a company called Character.AI. Mental-health experts and computer scientists have warned that chatbot mental health counselors violate accepted mental health..

IEEE Spectrum > Artificial Intelligence