By knitting together multiple components and data streams, multimodal AI offers the promise of smarter, more human-like systems…
From ACM NewsSamuel Greengard| December 7, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
The peculiar list of search options that Google suggests as you type in a query could be hijacked to let people communicate secretly.New Scientist From ACM News | June 22, 2011
A gender analysis program developed by Stevens Institute of Technology researcher Na Cheng could have determined the sex of a 40-year-old U.S. man writing online...New Scientist From ACM TechNews | June 20, 2011
In a quiet, windowless auditorium in Bristol, in the west of England, Lucy Robson and her team hunch over their laptops as the seconds on a giant clock above...New Scientist From ACM News | June 8, 2011
Good news for spies. There is now a way to hide data on a hard drive without using encryption. Instead of using a cipher to scramble text, the method involves...New Scientist From ACM News | April 21, 2011
Stealthy radar systems and the ability to transmit large amounts of data over long distances are a step closer thanks to a technique that could improve the efficiency...New Scientist From ACM News | April 5, 2011
In A bar in Maastricht University in the Netherlands, 12 students are each given an envelope marked "Top Secret." Inside are plans for a terror attack somewhere...New Scientist From ACM News | March 15, 2011
Signals from GPS satellites now help you to call your mother, power your home, and even land your plane – but a cheap plastic box can jam it all.New Scientist From ACM News | March 10, 2011
Picture the scene: armed police officers are warned on their radios that a suspected male terrorist has been tracked to a crowded football stadium.New Scientist From ACM News | February 24, 2011
University of Minnesota researchers have developed a cyberweapon that turns the structure of the Internet against itself, but ultimately could be used to make the...New Scientist From ACM TechNews | February 14, 2011
The U.S. National Institute of Standards and Technology has selected five Secure Hash Algorithm (SHA-3) entrants as finalists for its competition to find a replacement...New Scientist From ACM TechNews | December 15, 2010
A competition to find a replacement for one of the gold-standard computer security algorithms used in almost all secure, online transactions just heated up.New Scientist From ACM News | December 15, 2010
Stuxnet is the first worm of its type capable of attacking critical infrastructure like power stations and electricity grids: those in the know have been expecting...New Scientist From ACM News | September 28, 2010
His prospects of answering one of the biggest questions in mathematics may be fading, but Vinay Deolalikar of Hewlett-Packard Labs in Palo Alto, California, may...New Scientist From ACM News | August 20, 2010
Life is about to become more difficult for countries trying to censor access to foreign Websites. A system dubbed Collage will allow users in these countries...New Scientist From ACM News | August 13, 2010
Has the biggest question in computer science been solved? On 6 August, Vinay Deolalikar, a mathematician at Hewlett-Packard Labs in Palo Alto, California, sentdraft...New Scientist From ACM News | August 11, 2010
Every move you make, every twitter feed you update, somebody is watching you. You may not think twice about it, but if you use a social networking site, a cellphone...New Scientist From ACM News | July 26, 2010
From James Bond to Johnny English, the movies give us the impression that spies are top of the tree when it comes to money-no-object espionage technology. But that...New Scientist From ACM News | July 6, 2010
Pure randomness is surprisingly difficult to create, even if you draw on the inherent randomness of quantum mechanics. Now, though, a "true" random number generator...New Scientist From ACM News | April 15, 2010