New Era in Safety When Cars Talk to One Another
The U.S. Department of Transportation this week announced a plan …
Rethinking CAD: New Design Paradigms in the Age of 3-D Printing
The future of computer-aided design tools, in light of recent …
Voyager Map Details Neptune's Strange Moon Triton
NASA's Voyager 2 spacecraft gave humanity its first close-up look …
Recursion and Language at ICER 2014: A Conference Report
Recursion and the unique challenges of programming languages were highlighted at ICER 2014
What is Reality?
Lawrence M. Fisher
And, what flavor of reality do you prefer: standard, augmented, virtual...
Contributing to Humanity
Lawrence M. Fisher
Even as computer graphics professionals meet to learn from each other and celebrate their own, they acknowledge their shared...
Soft Infrastructure Challenges to Scientific Knowledge Discovery
John Leslie King, Paul F. Uhlir
Seeking to overcome nontechnical challenges to the scientific enterprise.
Exploratory Engineering in Artificial Intelligence
Luke Muehlhauser, Bill Hibbard
Using theoretical models to plan for AI safety.
Learning for the New Digital Age
Peter J. Denning
Digital machines are automating knowledge work at an accelerating pace. How shall we learn and stay relevant?
Securing the Tangled Web
Preventing script injection vulnerabilities through software design.
The Network is Reliable
Peter Bailis, Kyle Kingsbury
An informal survey of real-world communications failures.
Privacy, Anonymity, and Big Data in the Social Sciences
Jon P. Daries, Justin Reich, Jim Waldo, Elise M. Young, Jonathan Whittinghill, Andrew Dean Ho, Daniel Thomas Seaton, Isaac Chuang
Quality social science research and the privacy of human subjects require trust.
Technical Perspective: Portraiture in the Age of Big Data
Alexei A. Efros
There already exist thousands of photographs of any given individual, so there is no need to capture more. Rather, the challenge...
Ira Kemelmacher-Shlizerman, Eli Shechtman, Rahul Garg, Steven M. Seitz
An approach for generating face animations from large image collections of the same person. The approach is completely automatic...
Technical Perspective: Getting Consensus for Data Replication
Philip A. Bernstein
The following paper is a breakthrough in which the authors offer a formula to calculate the probability of reading data that...
Online Deception in Social Media
Michail Tsikerdekis, Sherali Zeadally
The unknown and the invisible exploit the unwary and the uninformed for illicit financial gain and reputation damage.
Security, Cybercrime, and Scale
Defense begins by identifying the targets likely to yield the greatest reward for an attacker's investment.
Reshaping Terrorist Networks
Francesca Spezzano, V. S. Subrahmanian, Aaron Mannes
To destabilize terrorist organizations, the <code>STONE</code> algorithms identify a set of operatives whose removal would maximally...
Optimality in Robot Motion: Optimal Versus Optimized Motion
Jean-Paul Laumond, Nicolas Mansard, Jean-Bernard Lasserre
Exploring the distinction between an optimal robot motion and a robot motion resulting from the application of optimization techniques...
Efficient Maximum Flow Algorithms
Andrew V. Goldberg, Robert E. Tarjan
Though maximum flow algorithms have a long history, revolutionary progress is still being made.
Big Data and Its Technical Challenges
H. V. Jagadish, Johannes Gehrke, Alexandros Labrinidis, Yannis Papakonstantinou, Jignesh M. Patel, Raghu Ramakrishnan, Cyrus Shahabi
Exploring the inherent technical challenges in realizing the potential of Big Data.