Daniel A. Spielman and colleague Shang-hua Teng solved the mystery of the Simplex Method using a technique called smoothed analysis…
From ACM NewsAllyn Jackson Commissioned by CACM Staff| January 31, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Image recognition is a complicated business. For Google, that means an artificial neural network—software capable of learning.CNET From ACM News | June 19, 2015
Researchers have shown they can extract personal information from two smartwatches because none of the data is encrypted. CNet From ACM TechNews | June 17, 2015
I am not fond of depressing you. So I'm going to leave it to a new study performed by the University of Pennsylvania's Annenberg School For Communication.CNET From ACM News | June 11, 2015
Edward Snowden and an unlikely interviewer squared-off on HBO over the leaks that exposed the National Security Agency's extensive surveillance programs.CNET From ACM Opinion | April 6, 2015
Object recognition makes up one part of autonomous car technology, but then comes the question of what the car does in response to what it detects.CNET From ACM News | March 18, 2015
Startups as well as large tech firms now realize their products need to be both visually appealing and deliver great user experiences.CNet From ACM TechNews | March 16, 2015
When it comes to the new Net neutrality rules adopted last week by the Federal Communications Commission, people think either that US regulators have liberated...CNET From ACM News | March 2, 2015
Before you blast off to the moon in search of $30 million offered as part of the Google Lunar XPrize—or the juicy $20 million grand prize for being the first to...CNET From ACM Careers | January 23, 2015
Floor tiles that generate electricity when people walk on them. Streetlamps that transmit data to people passing beneath them.CNET From ACM News | January 20, 2015
Technology shown by Intel at the Consumer Electronics Show is largely oriented around a depth-sensing camera that could transform human-computer interaction.CNet From ACM TechNews | January 9, 2015
Physical access to a fingerprint may not be required to exploit fingerprint readers, according to a European hacker.CNet From ACM TechNews | January 6, 2015
Replacement limbs that completely replicate the functions and abilities of real limbs are the current white whale of prosthetics, and we're getting closer: mind...CNET From ACM News | December 18, 2014
Even famed hacker Kevin Mitnick—labeled a "computer terrorist" by the FBI in the '90s—worries about getting hacked.CNET From ACM Opinion | December 1, 2014
Sure, dealing with lane changes, firetrucks and construction projects is difficult for engineers building self-driving cars. But what about deciding which people...CNET From ACM News | November 5, 2014