Augmented Reality Gets to Work—and Gets Past the 'Glassholes'
Augmented reality (AR) is a technology that has been on …
Why Kevin Mitnick, the World's Most Notorious Hacker, Is Still Breaking Into Computers
Look no further than Kevin Mitnick's business card to see …
New Stanford Manufacturing Process Could Yield Better Solar Cells, Faster Chips
Stanford University researchers have developed a manufacturing process that could …
Agile Methods: A Follow-up ACM Webinar
A follow-up session to the ACM webinar Agile Methods: The Good, the Hype and the Ugly will take place on March 27.
The Three Faces of Cyberwar
The different aspects of cyberwar, and what can be done about them.
Lawrence M. Fisher
A regional Grace Hopper Celebration event this week focused on "advancing a gender diverse technology workforce in New York."
NSA Doesn't Need to Spy on Your Calls to Learn Your Secrets
Governments and corporations gather, store, and analyze the tremendous amount of data we chuff out as we move through our digitized lives.
Why the Tsarnaev Juror Questionnaire Screened for Computer Scientists
As we approach the second anniversary of the Boston Marathon bombing, many of us here in Massachusetts and beyond are riveted by the ongoing trial of Dzhokhar Tsarnaev.
What If Web Search Results Were Based on Accuracy?
Imagine, for a moment, that every Web search gave only accurate, verified information.
Hadoop Superlinear Scalability
Neil J. Gunther, Paul Puglia, Kristofer Tomasette
The perpetual motion of parallel performance.
HTTP/2.0: The IETF Is Phoning It In
Bad protocol, bad politics.
META II: Digital Vellum in the Digital Scriptorium
Revisiting Schorre's 1962 compiler-compiler.
Technical Perspective: The Specialization Trend in Computer Hardware
Specialization improves energy-efficiency in computing but only makes economic sense if there is significant demand. A balance...
Convolution Engine: Balancing Efficiency and Flexibility in Specialized Computing
Wajahat Qadeer, Rehan Hameed, Ofer Shacham, Preethi Venkatesan, Christos Kozyrakis, Mark Horowitz
We present the Convolution Engine (CE) — a programmable processor specialized for the convolution-like data-flow prevalent in...
Technical Perspective: Image Processing Goes Back to Basics
In "Local Laplacian Filters," Paris et al. made a surprising move. They chose to build a system on the Laplacian pyramid, which...
Sketch-Thru-Plan: A Multimodal Interface for Command and Control
Philip R. Cohen, Edward C. Kaiser, M. Cecelia Buchanan, Scott Lind, Michael J. Corrigan, R. Matthews Wesson
Speaking military jargon, users can create labels and draw symbols to position objects on digitized maps.
How Amazon Web Services Uses Formal Methods
Chris Newcombe, Tim Rath, Fan Zhang, Bogdan Munteanu, Marc Brooker, Michael Deardeuff
Engineers use TLA+ to prevent serious but subtle bugs from reaching production.
Designing Statistical Privacy for Your Data
Ashwin Machanavajjhala, Daniel Kifer
Preparing data for public release requires significant attention to fundamental principles of privacy.
Security Challenges for Medical Devices
Johannes Sametinger, Jerzy Rozenblit, Roman Lysecky, Peter Ott
Implantable devices, often dependent on software, save countless lives. But how secure are they?
Privacy Implications of Health Information Seeking on the Web
A revealing picture of how personal health information searches become the property of private corporations.
Verifying Computations without Reexecuting Them
Michael Walfish, Andrew J. Blumberg
From theoretical possibility to near practicality.