The U.S. National Security Agency's pervasive phone and Internet eavesdropping and surveillance operations is making the surveillance technology in George Orwell's classic novel, 1984, seem rather primitive in comparison.
Moshe Y. Vardi
DEPARTMENT: From the president
The inaugural Heidelberg Laureate Forum affected my thinking about computability and computation.
Vinton G. Cerf
DEPARTMENT: Letters to the Editor
"The Value of Microprocessor Designs" (Feb. 2013) aimed to analyze the value of microarchitectures in isolation, as though they could be mixed-and-matched with various silicon implementation technologies over the years. This …
Jason Hong ponders why there has been so much negative press coverage of Google Glass with regard to privacy, considering the issue from two different perspectives.
Researchers are relying on quantum mechanics to generate unhackable methods of communication.
Gesture and gaze are among the newest additions to a growing family of computer interfaces.
Who is responsible when property is damaged or someone is injured by an automated system? Existing product liability laws have not yet been tested in the context of robots.
COLUMN: Privacy and security
Seeking to address the challenges of privacy by design through regulatory process and formal law.
Deirdre K. Mulligan, Kenneth A. Bamberger
COLUMN: Legally speaking
Assessing the shifting perspectives on patentability standards for software.
COLUMN: Computing ethics
Considering the ethical questions raised by technologies that are moving from knowing what we are doing (and where) to knowing who we are.
Katina Michael, MG Michael
COLUMN: Economic and business dimensions
A question of biology, technology, and society.
Marshall Van Alstyne
Combining efforts and expertise, ACM and Code.org are partnering to address a rapidly changing education landscape.
How lessons learned from the evolution of the Web and Web browsers can influence the development of AR browsers.
Tobias Langlotz, Jens Grubert, Raphael Grasset
Merging the art and science of software development.
Eliminating memory hogs.
Combining agile and SEMAT yields more advantages than either one alone.
Ivar Jacobson, Ian Spence, Pan-Wei Ng
SECTION: Contributed articles
Mobile apps manage data on individual residents to help carers deliver more person-centered care.
Neil Maiden, Sonali D'Souza, Sara Jones, Lars MÜller, Lucia Pannese, Kristine Pitts, Michael Prilla, Kevin Pudney, Malcolm Rose, Ian Turner, Konstantinos Zachos
Tablets offer hope for improving learning and collaboration but only if truly integrated into learning settings.
Evgeny Kaganer, Gabriel A. Giordano, Sebastien Brion, Marco Tortoriello
SECTION: Review articles
The competitive nature of AT, the scarcity of expertise, and the vast profits potential, makes for a secretive community where implementation details are difficult to find.
Philip Treleaven, Michal Galas, Vidhi Lalchand
Coupling content adaptation with context awareness is a promising approach for improving the user's experience.
Mamadou Tourad Diallo, Hassnaa Moustafa, Hossam Afifi, Nicolas Marechal
SECTION: Research highlights
Exponentially increasing transistor integration also demands more interconnections, which have started hitting fundamental limits. The Centip3De design demonstrates two concepts to address this challenge: near-threshold computing …
This paper evaluates the use of three-dimensional integration to reduce global interconnect by adding multiple layers of silicon with vertical connections between them using through-silicon vias.
Ronald G. Dreslinski, David Fick, Bharan Giridhar, Gyouho Kim, Sangwon Seo, Matthew Fojtik, Sudhir Satpathy, Yoonmyung Lee, Daeyeon Kim, Nurrachman Liu, Michael Wieckowski, Gregory Chen, Dennis Sylvester, David Blaauw, Trevor Mudge
COLUMN: Last byte
Each of these puzzles involves coin flipping. Simple stuff, right? Not necessarily . . . though solutions will indeed be provided in next month's column.