Leslie Valiant, a versatile computer scientist at Harvard University whose work has impacted everything from artificial intelligence to distributed computing, has been named the winner of the 2010 A.M. Turing Award. Leslie Valiant, a versatile computer scientist at Harvard University whose work has impacted everything from artificial intelligence to distributed computing, has been named the winner of the 2010 A.M. Turing Award.The annual Association for Computing Machinery (ACM) award, sometimes called the “Nobel Prize in Computing,” recognizes Valiant for his broad contributions to computational learning theory and computer science. The award comes with a $250,000 prize funded by Google and Intel.“Leslie Valiant’s accomplishments over the last 30 years have provided the theoretical basis for progress in artificial intelligence and led to extraordinary achievements in machine learning. His work has produced modeling that offers computationally inspired answers on fundamental questions like how the brain ‘computes,'” ACM President Alain Chesnais said in a statement. “His profound vision in computer science, mathematics, and cognitive theory have been combined with other techniques to build modern forms of machine learning and communication, like IBM’s Jeopardy! champion ‘Watson’ computing system, that have enabled computing systems to rival a human’s ability to answer questions.”MORE AWARDS: Ig Nobel honors world’s wackiest researchers Valiant’s influential works include a paper titled “Theory of the Learnable” that is considered a seminal source on machine learning and has led to the development of algorithms that adapt in response to environmental feedback from devices such as networked sensors and databases. More practically, it has led to development of technologies such as spam filters.His 1982 paper “A Scheme for Fast Parallel Communication” outlines a solution for addressing network congestion problems. Of late, Valiant has focused on computational neuroscience and has published a book called “Circuits of the Mind” that takes a computational approach to studying how the human brain works.Valiant’s work has led to advances in areas such as natural language processing, handwriting recognition and computer vision, according to the ACM.Before joining Harvard in 1982, Valiant taught at Carnegie Mellon University, Leeds University and the University of Edinburgh.Other recent Turing Award winners have been MIT Professor Barbara Liskov, recognized for object-oriented programming techniques crucial to programming languages such as Java and C++, and Microsoft researcher Charles Thacker, who won last year for his work in pioneering the networked personal computer.The full list of winners for the Turing Award, which goes back to 1966, can be found here.The ACM dishes out its awards at a banquet on June 4 in San Jose. For more on network research, follow our Alpha Doggs blog.Follow Bob Brown on his non-award winning Twitter account at www.twitter.com/alphadoggs.Read more about data center in Network World’s Data Center section. Related content feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Mergers and Acquisitions Mergers and Acquisitions brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe