Perjurers and Fake Reviews Train Software to Spot Lies
Lawyers and judges use skill and instinct to sense who …
Mathematical Proof Reveals How To Make The Internet More Earthquake-Proof
One of the common myths about the Internet is that …
Open Source Challenges a Proprietary Internet of Things
The Linux Foundation recently created the AllSeen Alliance, which combines …
Reflections on Using AppInventor to Teach First-year Programming
This post reflects on my experiences of using AppInventor to teach Android development to first-year university computer science...
Media Coverage of Analysis of AP CS 2013 Exam Results
Barbara Ericson does an annual analysis of AP CS exam results. Her 2013 analysis attracted significant media attention.
We May Be 100 Years Behind in Making Computing Education Accessible to All
So when should we be able to provide computing education to everyone in the US? Using physics and mathematics as examples, we...
There's No Real Difference Between Online Espionage and Online Attack
Back when we first started getting reports of the Chinese breaking into U.S. computer networks for espionage purposes, we described it in some very strong language.
The British scientist and polymath Stephen Wolfram has always had big ambitions.
Why Copyrighted Coffee May Cripple the Internet of Things
With its single-serving coffee pods, Green Mountain Coffee has transformed the business of brew.
Scaling Existing Lock-based Applications with Lock Elision
Enabling existing lock-based programs to achieve performance benefits of nonblocking synchronization.
The API Performance Contract
Robert F. Sproull, Jim Waldo
How can the expected interactions between caller and implementation be guaranteed?
Eventually Consistent: Not What You Were Expecting?
Wojciech Golab, Muntasir R. Rahman, Alvin AuYoung, Kimberly Keeton, Xiaozhou (Steve) Li
Methods of quantifying consistency (or lack thereof) in eventually consistent storage systems.
Technical Perspective: Smartphone Security 'Taint' What It Used to Be
The TaintDroid project takes a runtime taint tracking approach toward analyzing Android apps.
TaintDroid: An Information Flow Tracking System for Real-Time Privacy Monitoring on Smartphones
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, Anmol N. Sheth
Today's smartphone operating systems frequently fail to provide users with adequate control over and visibility into how third...
Big-Data Applications in the Government Sector
Gang-Hoon Kim, Silvana Trimi, Ji-Hyong Chung
In the same way businesses use big data to pursue profits, governments use it to promote the public good.
Using Targeted Conferences to Recruit Women into Computer Science
Christine Alvarado, Eugene Judson
To inspire women to major in CS, take them to the Grace Hopper Celebration of Women in Computing.
Making Parallel Programs Reliable with Stable Multithreading
Junfeng Yang, Heming Cui, Jingyue Wu, Yang Tang, Gang Hu
Stable multithreading dramatically simplifies the interleaving behaviors of parallel programs, offering new hope for making parallel...
Trends in Steganography
Elżbieta Zielińska, Wojciech Mazurczyk, Krzysztof Szczypiorski
Methods for embedding secret data are more sophisticated than their ancient predecessors, but the basic principles remain unchanged...
Computation Takes Time, But How Much?
Reinhard Wilhelm, Daniel Grund
Timing analysis for hard real-time systems.
A Historical Perspective of Speech Recognition
Xuedong Huang, James Baker, Raj Reddy
What do we know now that we did not know 40 years ago?