DEPARTMENT: Cerf's up
The Internet Protocol layer does not know or care what it carries in its payloads except that they are made up of binary bits. Above the application layer, however, the meaning of the content becomes important.
The explosive growth of social-media platforms has led to the proliferation of "bad" speech on social-media platforms, which has become politically untenable.
DEPARTMENT: [email protected]
Carl Hewitt suggests computer science needs a reference resource, while Vijay Kumar decries intellectual dishonesty in technology forecasting.
It is increasingly important to understand how artificial intelligence comes to a decision.
Unused telecom fiber might be used to detect earthquakes, uncover other secrets in the soil.
The EU data regulation will affect computer, Internet, and technology usage within and outside the EU; how it will play out remains to be seen.
COLUMN: Legally speaking
Should copyright enforcement have precedence over the interests of users in information privacy and fundamental freedoms?
COLUMN: Inside risks
A systems-oriented view of trustworthiness.
The growing importance of machine learning creates challenging questions for computing education.
Programmable wireless environments use unique customizable software processes rather than traditional rigid channel models.
Old ways in the new oil business.
SECTION: China region
I am pleased to introduce the first regional special section of Communications, which we hope will become a feature that you anticipate and enjoy, and of course value for the insights and perspectives it presents!
SECTION: China Region Special Section: Hot Topics
We are pleased to present the China Region special section.
China plans to become the world's high-tech leader, and quickly.
There are two major challenges to achieving secure quantum cryptography over long distances.
In addition to government-supported academic research, China's technical giants, such as Baidu, Alibaba, Tencent, and Huawei, are actively investing in AI research and related development.
Unique historical, socioeconomic, and political conditions have created a distinctive path for China's rapid integration of computing and technology into its economy and society.
Despite China's massive market and bountiful opportunities for computing careers, Chinese corporations face great obstacles in attracting high-tech talent.
A survey of China's data trading and sharing markets.
Interactive video games, which support various forms of collaboration and confrontation among gamers, create an obsessive stickiness.
SECTION: China Region Special Section: Big Trends
Governments have been searching for new technologies to make cities in China more efficient, and smart mobility has been the top priority in all solutions.
The development and popularization of cloud computing, especially in emerging domains, brings great convenience and also poses new challenges.
Financial technology, or fintech, is a fast-evolving field that has reshaped the financial industry.
There are two dimensions of challenge to an efficient autonomous delivery vehicle solution.
China's online video industry has as many similarities as differences with the U.S.
New challenges in architecture, system software, and application technologies must be addressed to help develop next-generation exascale supercomputing systems.
How Google moved its virtual desktops to the cloud.
Three critical design points: Joint learning, weak supervision, and new representations.
Dependency management is a crucial part of system and software design.
SECTION: Contributed articles
Skill recommendations must be provided when users need them most, without being obtrusive or distracting.
Simplicity, small size, portability, and embeddability set Lua apart from other scripting languages.
Systematic use of proven debugging approaches and tools lets programmers address even apparently intractable bugs.
SECTION: Review articles
Conventional storage software stacks are unable to meet the needs of high-performance Storage-Class Memory technology. It is time to rethink 50-year-old architectures.
SECTION: Research highlights
"Where Did I Leave My Keys?" by Checkoway et al. reports on the amazing independent reconstruction of a backdoor, discovered in the firmware of a VPN router commonly used to secure access to corporate intranets.
In this paper, we describe the results of a full independent analysis of the ScreenOS randomness and VPN key establishment protocol subsystems, which we carried out in response to the Juniper Dual Elliptic Curve incident.
"LIBS: A Bioelectrical Sensing System from Human Ears for Staging Whole-Night Sleep Study" provides a nice balance in terms of minimizing the burden on users and the granularity at which we can automatically track various measures …
We explore a new form of wearable systems, called LIBS, that can continuously record biosignals such as brain wave, eye movements, and facial muscle contractions, with high sensitivity and reliability.
COLUMN: Last byte
A photo marks my place, then and now