EAI News & Insights
Latest
Latest
Featured Posts
Popular Stories
Tags
Join 250,000+ Subscribers
Announcements
Contribute to Our Blog
Conferences
Trusting AI with Our Cybersecurity
Areas such as intrusion detection, malware detection, and phishing detection can be conquered by well-implemented machine learning-based solutions. However, we …
Articles Submission Guideline
We would like to invite you to contribute with articles and to share your vision of the future alongside emerging technologies. …
Journals
Pervasive health and Technology: Trending research articles from our library
In this article we present you the digest of TOP 5 articles from EAI Endorsed Transactions on Pervasive Health and …
E-learning: Trending research articles from our library
Education is one domain that has accompanied civilization through the centuries, adapting its tools to fulfill the expectations of the …
Community
Prof. Song Guo: EAI Distinguished lecture on Neural-enhanced Edge Perception Systems
Song Guo believes that in order to run intelligent applications on ubiquitous edge devices, it is necessary to deploy the …
What 6G is going to be, what are the new use cases that 6G will enable, and what are the …
Archive
EAI is proud to announce EAI Distinguished Members Class of 2022. A recognition awarded to the top 0.5% of its members. This year the honor
EAI is proud to announce the names of 100 EAI Fellows from Class of 2022. The Class of 2022 comprises individuals with extraordinary accomplishments in
Song Guo believes that in order to run intelligent applications on ubiquitous edge devices, it is necessary to deploy the entire lifecycle (ecosystem) of data
EAI is proud to announce EAI Distinguished Members Class of 2022. A recognition awarded to the top 0.5% of its members. This year the honor
EAI is proud to announce the names of 100 EAI Fellows from Class of 2022. The Class of 2022 comprises individuals with extraordinary accomplishments in
Song Guo believes that in order to run intelligent applications on ubiquitous edge devices, it is necessary to deploy the entire lifecycle (ecosystem) of data