Image
moral cognition
MIT news article

Imagine that one day you’re riding the train and decide to hop the turnstile to avoid paying the fare. It probably won’t have a big impact on the financial well-being of your local transportation system. But now ask yourself, “What if everyone did that?” The outcome is much different — the system would likely go bankrupt and no one would be able to ride the train anymore.

Image
MIT contact tracing
MIT news article

Contact tracing is an essential tool for fighting the Covid-19 pandemic: If someone tests positive for the virus, health care workers move quickly to determine who else the infected individual had close contact with, and to set up measures to keep the virus from potentially spreading further. Yet while contact tracing has been a much-repeated phrase during the pandemic, people in the MIT community and beyond may wonder: How does the system actually work on the Institute’s campus?

Image
ML heart failure
MIT news article

A group led by researchers at MIT’s Computer Science and Artificial Intelligence Lab (CSAIL) has developed a machine learning model that can look at an X-ray to quantify how severe the edema is, on a four-level scale ranging from 0 (healthy) to 3 (very, very bad). The system determined the right level more than half of the time, and correctly diagnosed level 3 cases 90 percent of the time.

Image
virtual reality computational model
MIT news article

The national dialogue on race has progressed powerfully and painfully in the past year, and issues of racial bias in the news have become ubiquitous. However, for over a decade, researchers from MIT’s Imagination, Computation, and Expression Laboratory (ICE Lab) have been developing systems to model, simulate, and analyze such issues of identity. 

Image
cybersecurity
MIT news article

One reason that cyberattacks have continued to grow in recent years is that we never actually learn all that much about how they happen. Companies fear that reporting attacks will tarnish their public image, and even those who do report them don’t share many details because they worry that their competitors will gain insight into their security practices.