A major debate has erupted among economists regarding the impact of robots and automation on jobs and the possibility of technological unemployment.
Moshe Y. Vardi
DEPARTMENT: From the president
One wonders whether legislative bodies and perhaps insurance companies will reach conclusions that suggest software designers and implementers should have imposed upon themselves regulatory requirements, authorizations, and certifications …
Vinton G. Cerf
DEPARTMENT: Letters to the Editor
Exploring the malicious hacker problem, Zheng-chuan Xu et al.'s "Why Computer Talents Become Computer Hackers" (Apr. 2013) overlooked many motivations for computer talents becoming computer hackers.
Jason Hong considers how students working on their doctorates in computer science must adapt and evolve to succeed.
New techniques could cut the power required to avoid overheating.
3-D printing has come of age. It promises to revolutionize a wide range of industries and profoundly change the way people buy and consume.
Hacker spaces are spreading around the world, though some government funding is raising questions.
COLUMN: Legally speaking
Considering the negative influence of U.S. statutory damage rules on technology innovation.
COLUMN: Computing ethics
How to encourage ethical behavior among all links in a global supply chain.
Christopher S. Tang, Joshua Zimmerman
COLUMN: Technology strategy and management
Expertise and service ethics are just two of the many components comprising a modern professional.
COLUMN: Broadening participation
Improving academic success and social development by merging computational thinking with cultural practices.
Ron Eglash, Juan E. Gilbert, Ellen Foster
Advances in artificial intelligence and robotics will have significant implications for evolving economic systems.
We simply do not have a synchronization mechanism that can enforce mutual exclusion.
Paul E. McKenney
Exploring an alternative to lock-based synchronization.
Samy Al Bahra
Nonblocking synchronization can yield astonishing results in terms of scalability and real-time response, but at the expense of verification state space.
SECTION: Contributed articles
The RSVP voice-recognition search engine improves speech recognition and translation accuracy in question answering.
Yang Tang, Di Wang, Jing Bai, Xiaoyan Zhu, Ming Li
How to fairly allocate divisible resources, and why computer scientists should take notice.
Ariel D. Procaccia
SECTION: Review articles
The challenge of developing and using computer models to understand and control the diffusion of disease through populations.
Madhav Marathe, Anil Kumar S. Vullikanti
SECTION: Research highlights
The following paper makes a fundamental contribution to the world of vector graphics by introducing a new primitive called diffusion curve.
We describe a new vector-based primitive for creating smooth-shaded images, called the diffusion curve.
Alexandrina Orzan, Adrien Bousseau, Pascal Barla, Holger Winnemöller, Joëlle Thollot, David Salesin
COLUMN: Last byte
Visits home brought mixed feelings. Greta loved her parents, but she always came away tense and exhausted from the duplicity of self-censorship, guarding her parents from the aspects of her true self she knew they didn't, couldn't …