The Turing Centenary is now behind us and we can afford some reflection on what has transpired. There is a risk, however, that in our focus on highlighting Turing's seminal contributions we may have gone from celebration to …
DEPARTMENT: From the president
In most formulations, robots have the ability to manipulate and affect the real world. I would like to posit, however, that the notion of robot could usefully be expanded to include programs that perform functions, ingest …
DEPARTMENT: Letters to the Editor
To the question Vinton G. Cerf addressed in his President's Letter "Where Is the Science in Computer Science?" (Oct. 2012), my first answer would be that there isn't any. A true science like physics or chemistry studies some …
FY12 was an outstanding year for ACM. Membership reached an all-time high for the 10th consecutive year. We witnessed our global hubs in Europe, India, and China take root and flourish.
DEPARTMENT: [email protected]
Daniel Reed on straddling the intellectual divide between technology experts and policymakers.
Side channels give out information that can be used to crack secrets, but researchers are identifying the holes and trying to close them.
The leading open source system for processing big data continues to evolve, but new approaches with added features are on the rise.
In repackaging other companies' news, some news aggregators are diverting readers and ad dollars, and, critics argue, undercutting the incentive to spend money on original reporting. It is an economic and ethical problem without …
COLUMN: Technology strategy and management
In search of a middle ground in the intellectual property wars.
COLUMN: The business of software
It seems to be a law of software development that things always take longer than we expect. When a project manager talks to a designer, programmer, or tester and tries to get a sense of how "complete" the assigned task is …
COLUMN: Law and technology
Viewing evolving data security issues as engineering problems to be solved.
COLUMN: Historical reflections
Lessons learned from four award-winning books on the history of information technology.
Imagining an optimized education model.
Considering how to combine the best elements of conferences and journals.
Constraints in an environment empower the services.
A discussion with Jeremiah Grossman, Ben Livshits, Rebecca Bace, and George Neville-Neil
Unless you have taken very particular precautions, assume every website you visit knows exactly who you are.
SECTION: Contributed articles
Anonymous location data from cellular phone networks sheds light on how people move around on a large scale.
Large genomic databases with interactive access require new, layered abstractions, including separating "evidence" from "inference."
SECTION: Review articles
A framework for evaluating security risks associated with technologies used at home.
SECTION: Research highlights
Photographs capture the moment; paintings convey perception, impression, and feeling; illustrations tell stories. Computer graphics aims to enrich all these artistic practices through technology. The following paper is a watershed …
How-things-work visualizations use a variety of visual techniques to depict the operation of complex mechanical assemblies. We present an automated approach for generating such visualizations.
The following article by Shotton et al. describes a landmark computer vision system that takes a single depth image containing a person and automatically estimates the pose of the person's body in 3D.
We propose a new method to quickly and accurately predict human pose — the 3-D positions of body joints — from a single depth image, without depending on information from preceding frames.
COLUMN: Last byte
From the intersection of computational science and technological speculation, with boundaries limited only by our ability to imagine what could be. I self-publish, and you get to sail my aether wave for free.