About Us
Founded in 1944, the American Committee for the Weizmann Institute of Science develops philanthropic support for the Weizmann Institute in Israel, and advances its mission of science for the benefit of humanity.
Jan 17, 2012...
Before (l) and after (r) images showing summarization with the bidirectional similarity measure. All of the relevant visual information is preserved.
REHOVOT, ISRAEL—January 17, 2012—Yeda Research and Development Company, Ltd., the commercial arm of the Weizmann Institute of Science, announced that it has entered into a license agreement with Adobe Systems Incorporated related to a bidirectional similarity measure to summarize visual data.
https://weizmann-usa.org/news-media/in-the-news/adding-math-to-list-of-security-threats/
Nov 17, 2007...
SAN FRANCISCO, Nov. 16 — One of the world’s most prominent cryptographers issued a warning on Friday about a hypothetical incident in which a math error in a widely used computing chip places the security of the global electronic commerce system at risk.
Adi Shamir, a cryptographer and professor in Israel. Gabriel Bouys/Agence France-Presse — Getty Images
Adi Shamir, a professor at the Weizmann Institute of Science in Israel, circulated a research note about the problem to a small group of colleagues. He wrote that the increasing complexity of modern microprocessor chips is almost certain to lead to undetected errors. Historically, the risk has been demonstrated in incidents like the discovery of an obscure division bug in Intel’s Pentium microprocessor in 1994 and, more recently, in a multiplication bug in Microsoft’s Excel spreadsheet program, he wrote.
Jun 24, 2018...
Kevin Hong for Quanta Magazine
Early on in the study of quantum computers, computer scientists posed a question whose answer, they knew, would reveal something deep about the power of these futuristic machines. Twenty-five years later, it’s been all but solved. In a paper posted online at the end of May, computer scientists Ran Raz and Avishay Tal provide strong evidence that quantum computers possess a computing capacity beyond anything classical computers could ever achieve.
https://weizmann-usa.org/news-media/in-the-news/unsafe-and-sound/
Jan 18, 2014...
Photo: Shutterstock.com
EAVESDROPPING, be it simply sticking an ear against a door or listening to and analysing the noises made by tapping different keys on a keyboard, is a stock-in-trade of spying. Listening to a computer itself, though, as it hums away doing its calculations, is a new idea. But it is one whose time has come, according to Adi Shamir, of the Weizmann Institute, in Israel, and his colleagues. And Dr Shamir should know. He donated the initial letter of his surname to the acronym “RSA”, one of the most commonly used forms of encryption. Acoustic cryptanalysis, as the new method is known, threatens RSA’s security.
Apr 18, 2017...
Ahead of World Malaria Day on April 25, ISRAEL21c reports on a new approach that could lead to a non-refrigerated vaccine against parasitic diseases.
A malaria vaccine based on stabilized proteins could be used in tropical places where there is no refrigeration.
Despite decades of malaria research, the disease still afflicts hundreds of millions and kills around half a million people each year – most of them children in tropical regions.
https://weizmann-usa.org/news-media/in-the-news/the-human-brain-project/
May 01, 2012... Reductionist biology—examining individual brain parts, neural circuits and molecules—has brought us a long way, but it alone cannot explain the workings of the human brain, an information processor within our skull that is perhaps unparalleled anywhere in the universe. We must construct as well as reduce and build as well as dissect. To do that, we need a new paradigm that combines both analysis and synthesis. The father of reductionism, French philosopher René Descartes, wrote about the need to investigate the parts and then reassemble them to re-create the whole.
Aug 04, 2009... REHOVOT, ISRAEL—August 3, 2009—Biomolecular computers, made of DNA and other biological molecules, only exist today in a few specialized labs, remote from the regular computer user. Nonetheless, Tom Ran and Shai Kaplan, research students in the lab of Prof. Ehud Shapiro of the Weizmann Institute's Biological Chemistry, and Computer Science and Applied Mathematics Departments have found a way to make these microscopic computing devices "user friendly," even while performing complex computations and answering complicated queries.
https://weizmann-usa.org/news-media/feature-stories/navigating-the-new-normal/
May 06, 2020... To roll back this calamitous cascade of events, we need exit strategies— integrated sets of policies that will enable a responsible re-boot of productivity while minimizing the risk of COVID-19 resurgence. One component within such a broad strategy, recently proposed by the Weizmann Institute’s Prof. Uri Alon and Prof. Ron Milo, rests on a novel mathematical model for public health involving a cyclic schedule of lockdown and free movement.
May 08, 2020...
It started with a tweet. Alpha Lee, co-founder and chief scientific officer of machine-learning company PostEra, read on Twitter that Diamond Light Source, the UK’s national synchrotron facility, had identified a set of chemical fragments that attach to an important coronavirus protein.
Lee wondered if his company, formed just six months earlier, could help connect the dots from fragments to viable drugs to fight COVID-19. PostEra uses AI algorithms to map routes for drug synthesis to speed the drug discovery process. But to do so, they would need some design ideas. So Lee asked the Internet.
May 09, 2020...
Collecting data and maintaining privacy do not have to rule each other out, according to computer scientist Shafi Goldwasser.
Goldwasser, 61, a professor at MIT, UC Berkeley, and Israel’s Weizmann Institute of Science, is a Turing Award and Gödel Prize laureate. She is also the co-founder and chief scientist at Duality Technologies Inc., a Tel Aviv and Maplewood, New Jersey-based startup that develops technologies for sharing and analyzing encrypted and anonymized data.