DEPARTMENT: Editor's letter
China and the West's fundamental systemic differences and growing geopolitical competition are increasingly open. The new reality is pulling the computing community apart, and spilling over into the academic and research communities …
The virtualization of conferences due to COVID-19 has sharpened my conviction that the computing-research publication system is badly broken and in need of a serious reboot.
DEPARTMENT: Career paths in computing
In a world of nuance and interpretation, the objectivity of math spoke to me (and still does). To be able to use applied math to do science through the use of very large-scale computers was magic.
SECTION: Research highlights
"SkyCore," by Mehrdad Moradi, et al
., addresses an exciting use case for Unmanned Aerial Vehicles in which UAVs can act as mobile base stations for the cellular network, flying to areas in the network in order to improve wireless …
Mark Guzdial suggests computer science education needs to change, to better serve the needs of students and society.
Researchers are pushing beyond the limitations of convolutional neural networks using geometric deep learning techniques.
Data science can only do so much in the face of a pandemic.
Japan tops the Top500 supercomputer rankings, for the moment.
COLUMN: Technology strategy and management
Tracing the trajectory of management and engineering decisions resulting in systemic catastrophe.
Considering the wide range of technological and societal trade-offs associated with cybersecurity.
COLUMN: Law and technology
Deliberating on how to regulate—or not regulate—online speech in the era of evolving social media.
How the cognitive sciences can inform the quest to build systems with the flexibility of the human mind.
Seeking to assess the possible responsibility of tech providers for excessive use patterns.
Hardware security is not assured.
Keeping users secure through their smartphones.
SECTION: Contributed articles
A field study examines technological advances that have created versatile software ecosystems to develop and deploy microservices.
Facebook labels 67% of its users with potential sensitive interests, sometimes at great risk to the user.
An analysis of patenting history from 1850 to 2010 to detect long-term patterns of knowledge spillovers via prior-art citations of patented inventions.
SECTION: Review articles
MPC has moved from theoretical study to real-world usage. How is it doing?
Are U.S. government employees behaving ethically when they stockpile software vulnerabilities?
SECTION: Research highlights
We argue for and propose an alternate, radical edge evolved packet core design, called SkyCore, that pushes the EPC functionality to the extreme edge of the core network.
In this paper, we study the asymptotic scaling of the space overhead needed for fault-tolerant quantum computation.
In "Constant Overhead Quantum Fault Tolerance with Quantum Expander Codes," by Omar Fawzi, et al
., the authors produce an algorithm that can rapidly deduce the error in a quantum expander code, even when the syndrome is partially …
COLUMN: Last byte
COLUMN: Historical reflections
Taking apart a book to figure out how it works.