A recent Turing-Test competition was won by a chatterbot pretending to be a teenage boy. The media was abuzz, claiming a machine has finally been able to pass the Turing Test. The real question, however, is whether the Turing …
Moshe Y. Vardi
As our computational tools become more and more powerful, we can anticipate that our growing knowledge of the mechanics of our world will allow us to use simulation to visualize, understand, and even design processes that …
Vinton G. Cerf
DEPARTMENT: Letters to the Editor
David Anderson's "Tom Kilburn: A Tale of Five Computers" (May 2014) was fascinating and informative, but no article on the history of British computing can avoid the precedence controversy between the Universities of Manchester …
Philip Guo sees code reviews providing students "lots of pragmatic learning."
Increased computing power combined with new and more advanced models are changing weather forecasting.
In-memory databases promise speedier processing.
Affordable, connected, personal medical devices are slowly changing the nature of health care.
COLUMN: Law and technology
Can technical and legal aspects be happily intertwined?
Stefan Bechtold, Adrian Perrig
COLUMN: Historical reflections
Reflections on the intersection of computing and the humanities.
COLUMN: The profession of IT
Digital machines are automating knowledge work at an accelerating pace. How shall we learn and stay relevant?
Peter J. Denning
Using theoretical models to plan for AI safety.
Luke Muehlhauser, Bill Hibbard
Seeking to overcome nontechnical challenges to the scientific enterprise.
John Leslie King, Paul F. Uhlir
Preventing script injection vulnerabilities through software design.
An informal survey of real-world communications failures.
Peter Bailis, Kyle Kingsbury
Quality social science research and the privacy of human subjects require trust.
Jon P. Daries, Justin Reich, Jim Waldo, Elise M. Young, Jonathan Whittinghill, Andrew Dean Ho, Daniel Thomas Seaton, Isaac Chuang
SECTION: Contributed articles
Defense begins by identifying the targets likely to yield the greatest reward for an attacker's investment.
The unknown and the invisible exploit the unwary and the uninformed for illicit financial gain and reputation damage.
Michail Tsikerdekis, Sherali Zeadally
SECTION: Review articles
Exploring the distinction between an optimal robot motion and a robot motion resulting from the application of optimization techniques.
Jean-Paul Laumond, Nicolas Mansard, Jean-Bernard Lasserre
SECTION: Research highlights
"Moving Portraits" is, in some sense, part of the perpetual quest to capture the perfect portrait. Its principal contribution is in adapting this age-old problem to our post-modern, big data world.
Alexei A. Efros
We present an approach for generating face animations from large image collections of the same person. By optimizing the quantity and order in which photos are displayed, we can create moving portraits from collections of still …
Ira Kemelmacher-Shlizerman, Eli Shechtman, Rahul Garg, Steven M. Seitz
COLUMN: Last byte
Last month (August 2014), we presented three puzzles concerning the Path Game and the Match Game, each of which can be played on any finite graph.
ACM-Infosys Foundation Award recipient David Blei recalls the origins of his famous topic model, its extensions, and its uses in areas that continue to amaze him.