Displaying 113-128 of 412 results for inside risks.
News

News Track

RFID tags, often debated over their surveillance capabilities, may be as vulnerable to destructive software viruses as other computing devices. The New York Times reports a group of computer researchers affiliated with Vrije Universiteit in Amsterdam recently demonstrated how it is possible to infect a very small portion of the memory in an RFID chip […]
Research and Advances

Virtual Colonoscopy

A computer-graphics-based alternative to conventional optical colonoscopy, known as virtual colonoscopy (VC) or computed tomography colonography (CTC), is rapidly gaining popularity. During this procedure, which was concurrently developed by our group at Stony Brook University [5] and by other researchers [10], the distended colon is imaged by a helical or multislice CT scanner. The acquired abdominal CT scan commonly consists of 350--750 axial images of 512x512 sub-millimeter resolution, providing excellent contrast between the colon wall and the lumen. A 3D model of the colon is then reconstructed from the CT scan by automatically segmenting the colon out of the rest of the abdomen and employing an electronic cleansing algorithm for computer-based removal of the residual material. The PC-based visualization software employs volume rendering and allows the user, typically a physician, to interactively navigate through the virtual 3D model of the colon. An intuitive user interface with customized tools supports measurements and virtual biopsy to inspect suspicious regions. Unlike optical colonoscopy (see the sidebar "Conventional Colorectal Cancer Screening"), VC is patient friendly since the patient undergoes less rigorous preparation prior to the procedure. VC is also a fast, noninvasive, highly accurate, cost-effective method for mass screening of colon polyps.
Research and Advances

Why File Sharing Networks Are Dangerous?

Peer-to-peer (P2P) software clients have become part of the standard suite of PC applications for many users. With millions of users worldwide sharing music, video, software, and pictures,15 file movement on these networks represent a significant percentage of internet traffic. Beyond the much discussed copyright infringement issues, P2P networks threaten both corporate and individual security. […]
Opinion

Editorial Pointers

Unlike many of the sciences, where experimentation and theory go hand-in-hand, computer science generally has taken a different approach, viewing theory as the driving force and experimentation too often as a postscript. But there is a growing faction of CS researchers working to change that modus operandi, calling for higher visibility for experimental computer science […]

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More