DEPARTMENT: Editor's letter
We are manifestly in a new era of international relations—"An Age of Distrust"—where the trend toward increased trade and integration has stalled, if not reversed.
DEPARTMENT: Cerf's up
Innovation for Jobs (i4j.info) recently published a book describing a new, people-centered view of work. Rather than organizing work around tasks, the idea is to organize work around people and their skills.
The computing field seems to be going through another image crisis these days. Many view this as an ethical crisis. I am dubious of the diagnosis.
DEPARTMENT: [email protected]
Judy Robertson addresses the disconnect between what children are taught about computers and what they actually wish to know.
A new proof supports a 25-year-old claim of the unique power of quantum computing.
Forced errors focus attention on neural network quirks.
Three-dimensional scanning can be used to protect or rebuild historic structures, but who owns that digital data?
COLUMN: Law and technology
Examining the potential legal consequences of using pricing algorithms.
COLUMN: Technology strategy and management
Considering a potential platform candidate in the evolving realm of gene-editing technologies research.
COLUMN: Historical reflections
Fifty years on, NASA's expensive triumph is a widely misunderstood model for spectacular innovation.
A unique perspective on experiences encouraging students to focus on further education.
Understanding behavior by building models.
Save time by sharing and reusing build and test output.
Securely running processes that require the entire syscall interface.
Automation and a little discipline allow better testing, shorter release cycles, and reduced business risk.
SECTION: Contributed articles
In addition to having a detailed understanding of the artifacts they intend to create, designers need to guide the software tools they use.
Featuring the various dimensions of data management, it guides organizations through implementation fundamentals.
In its original form, the Church-Turing thesis concerned computation as Alan Turing and Alonzo Church used the term in 1936—human computation.
SECTION: Review articles
A research agenda for intelligent systems that will result in fundamental new capabilities for understanding the Earth system.
Classical mathematical game theory helps to evolve the emerging logic of identity in the cyber world.
SECTION: Research highlights
If facial performance capture is possible for conventional RGB videos in real time, then believable facial expressions can be transferred effortlessly from one person to another in a live-action scenario. This capability is demonstrated …
Face2Face is an approach for real-time facial reenactment of a monocular target video sequence. Our goal is to animate the facial expressions of the target video by a source actor and re-render the manipulated output video in …
"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice," by David Adrian et al., illustrates the importance of taking preprocessing attacks into account when choosing cryptographic parameters.
We investigate the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed.
COLUMN: Last byte
Consumers and pharmaceutical companies have at least one interest in common: Neither wants the consumer to consume counterfeit drugs.