This sound-suppressing silk can create quiet spaces
Researchers engineered a hair-thin fabric to create a lightweight, compact, and efficient mechanism to reduce noise transmission in a large room.
Researchers engineered a hair-thin fabric to create a lightweight, compact, and efficient mechanism to reduce noise transmission in a large room.
The conversation in Kresge Auditorium touched on the promise and perils of the rapidly evolving technology.
Associate Professor Jonathan Ragan-Kelley optimizes how computer graphics and images are processed for the hardware of today and tomorrow.
Undergraduates Ben Lou, Srinath Mahankali, and Kenta Suzuki, whose research explores math and physics, are honored for their academic excellence.
The former EECS professor and RLE affiliate helped to develop a machine that read text out loud and won an Emmy for work on subtly speeding up film and audio without a noticeable loss of pitch.
Three neurosymbolic methods help language models find better abstractions within natural language, then use those representations to execute complex tasks.
Senior James Simon wants to effect change in two ways: by quantifying societal issues and working directly with disadvantaged communities.
An expert in robotics and AI, Shah succeeds Steven Barrett at AeroAstro.
MIT professors Roger Levy, Tracy Slatyer, and Martin Wainwright appointed to the 2024 class of “trail-blazing fellows.”
The MIT-led projects will investigate novel high-performance designs, materials, processes, and assessment methods for an environmentally sustainable microchip industry.
Programming course for incarcerated people boosts digital literacy and self-efficacy, highlighting potential for reduced recidivism.
The advance offers a way to characterize a fundamental resource needed for quantum computing.
For the first time, researchers use a combination of MEG and fMRI to map the spatio-temporal human brain dynamics of a visual image being recognized.
Researchers have developed a security solution for power-hungry AI models that offers protection against two common attacks.
A new technique can be used to predict the actions of human or AI agents who behave suboptimally while working toward unknown goals.