Quantum 'Spookiness' Passes Toughest Test Yet
It's a bad day both for Albert Einstein and for …
STEM Fields Dominate Ranking of College Majors
Science, technology, engineering, and mathematics degree holders were among the …
Tool Makes It Easier to Evade Online Censors
A new tool could offer a way around censorship technologies …
If Something Seems Odd, Check the Data, and Check It Again!
Finding the hole in the data.
Be It Resolved: Teaching Statements Must Embrace Active Learning and Eschew Lecture
Let's encourage active learning by requiring it in teaching statements.
SIGGRAPH Presents 2015 Awards
Five are honored for exceptional achievements in computer graphics and interactive techniques.
The Government Needs to Work with Silicon Valley to Create Our Military Future
In 1931, the city fathers of Sunnyvale, California, came up with a unique plan to rescue their town from the doldrums of the Great Depression.
Nine Real NASA Technologies in 'The Martian'
Mars has held a central place in human imagination and culture for millennia.
In Search of the Keys to the Virtual City
The New Yorker
I'm not the first man to believe that he might fix London.
Testing a Distributed System
Testing a distributed system can be trying even under the best of circumstances.
Natural Language Translation at the Intersection of AI and HCI
Spence Green, Jeffrey Heer, Christopher D. Manning
Old questions being answered with both AI and HCI.
Testing Web Applications with State Objects
Arie van Deursen
Use states to drive your tests.
Technical Perspective: A Woodworker's Easy Fix
The authors of "Guided Exploration of Physically Valid Shapes for Furniture Design" have found a way to provide the user with...
Guided Exploration of Physically Valid Shapes for Furniture Design
Nobuyuki Umentani, Takeo Igarashi, Niloy J. Mitra
The authors propose an interactive design framework for the efficient and intuitive exploration of geometrically and physically...
Technical Perspective: Corralling Crowd Power
Aniket (Niki) Kittur
"Soylent: A Word Processor with a Crowd Inside," introduces an exciting vision of using crowd workers to power an interactive...
Trustworthy Hardware from Untrusted Components
Simha Sethumadhavan, Adam Waksman, Matthew Suozzo, Yipeng Huang, Julianna Eum
This defense-in-depth approach uses static analysis and runtime mechanisms to detect and silence hardware backdoors.
Debugging High-Performance Computing Applications at Massive Scales
Ignacio Laguna, Dong H. Ahn, Bronis R. de Supinski, Todd Gamblin, Gregory L. Lee, Martin Schulz, Saurabh Bagchi, Milind Kulkarni, Bowen Zhou, Zhezhe Chen, Feng Qin
Dynamic analysis techniques help programmers find the root cause of bugs in large-scale parallel applications.
On the Categorization of Scientific Citation Profiles in Computer Science
Tanmoy Chakraborty, Suhansanu Kumar, Pawan Goyal, Niloy Ganguly, Animesh Mukherjee
A new dynamic growth model reveals how citation networks evolve over time, pointing the way toward reformulated scientometrics...
Bitcoin: Under the Hood
The myths, the hype, and the true worth of bitcoins.
Commonsense Reasoning and Commonsense Knowledge in Artificial Intelligence
Ernest Davis, Gary Marcus
AI has seen great advances of many kinds recently, but there is one critical area where progress has been extremely slow: ordinary...
Network Science, Web Science, and Internet Science
Thanassis Tiropanis, Wendy Hall, Jon Crowcroft, Noshir Contractor, Leandros Tassiulas
Exploring three interdisciplinary areas and the extent to which they overlap. Are they all part of the same larger domain?