The news archive provides access to past news stories from Communications of the ACM and other sources by date.
MIT researchers have developed a system that can analyze several surveillance cameras more accurately and in less time than it would take a human operator.
Deep-zooming software, known as zoomable user interfaces, enable information such as text, images, and video to sit on a single, limitless surface that can be viewed at whatever size works best.
In the last week or so, cyberwarfare has made front-page news: the United States may have been behind the Stuxnet cyberattack on Iran; Iran may have suffered another digital attack with theFlame virus; and our military and industrial…
Eugene Kaspersky, whose lab discovered the Flame virus that has attacked computers in Iran and elsewhere in the Middle East, said on Wednesday only a global effort could stop a new era of "cyber terrorism."
As Congress boosts spending on cybersecurity and mulls over new data safety requirements on private industry, some companies stand to get rich.
Two Cambridge experts have discovered a "back door" in a computer chip used in military systems and aircraft, such as the Boeing 787, that could allow the chip to be taken over via the Internet.
At St Mary's Hospital in London, surgeon Aimee Di Marco is about to cut up a body.
People who avoid social networking sites to maintain their privacy may not be as secure as they think, German computer scientists say.
Johns Hopkins University researchers have engineered cells that behave like AND and OR Boolean logic gates, producing an output based on one or more unique inputs, a development that could lead to computers that use cells as…
University of Houston researchers have developed the concept and prototype for MyVoice, a device that reads sign language and translates its motions into audible words.
Three Rivers Optical Exchange has established a high-bandwidth link from a Penn State bioinformatics program to the network backbone of the U.S. National Science Foundation's Extreme Science and Engineering Discovery Environment…
The IDF uses cyber space to gather intelligence, attack enemies, and conduct various military operations, the military revealed on Sunday in a posting on its official Website.
When the Kinect was introduced in November 2010 as a $150 motion-control add-on to Microsoft's Xbox consoles, it drew attention from more than just video-gamers.
Ear identification could provide as distinctive a form of identification as fingerprints, says University of Southampton's Mark Nixon.
Oregon State University researchers have developed a multi-instance, multi-label machine-learning system to simultaneously listen to multiple bird sounds.
Columbia University researchers began an online social-media marketing experiment in 2004, creating nine versions of a music download site that presented the same group of unknown songs in different ways.
Computer technicians battling to contain a complex virus last month resorted to the ultimate firewall measures—cutting off Internet links to Iran’s Oil Ministry, rigs, and the hub for nearly all the country's crude exports.
NASA astronomers say they can now predict with certainty the next major cosmic event to affect our galaxy, sun, and solar system: the titanic collision of our Milky Way galaxy with the neighboring Andromeda galaxy.
Global Internet Protocol traffic will reach an annual rate of 1.3 zettabytes in 2016, predicts Cisco Systems.
Google recently launched its "knowledge graph," which displays facts and services in response to search queries.
A microchip developed in Singapore can transmit data 1,000 times faster than Bluetooth.
Saturday's high-profile match between England and Belgium is the biggest test yet for a system that may finally put an end to flubbed goal-line calls, a technological step forward that soccer sorely needs and will formally…
Sanjeev Arora, winner of the 2011 ACM-Infosys Award, discusses his pivotal role in theoretical computer science.
Electronic patient records contain a treasure trove of data, and researchers are using natural language processing technology to mine the structured data and free text.
Judea Pearl's passionate advocacy of the importance of probability and causality helped revolutionize artificial intelligence.
Improvements in camera hardware, image processing, camera-photographer interfaces, and image viewing are advancing the state of the art in digital photography.
Local and national governments are turning to open data to cut their costs, increase transparency and efficiency, and respond to the needs of citizens.