Quantum Internet Could Keep Us Safe from Spying Eyes
Quantum networks are quietly spreading across the world.
Microsoft Shuts Down Silicon Valley Research Lab, Amid Broader Layoffs
Microsoft laid off another 2,100 employees on Thursday.
Visualizing 4-Dimensional Asteroids
One of the largest treasure troves of astronomical data comes …
Recursion and Language at ICER 2014: A Conference Report
Recursion and the unique challenges of programming languages were highlighted at ICER 2014
What is Reality?
Lawrence M. Fisher
And, what flavor of reality do you prefer: standard, augmented, virtual...
Contributing to Humanity
Lawrence M. Fisher
Even as computer graphics professionals meet to learn from each other and celebrate their own, they acknowledge their shared...
The Few, The Proud: The Millennials Who Still Use Flip Phones
Is Apple Watch's Pressure-Sensitive Screen a Bigger Deal Than the Gadget Itself?
Forget about the iPhone 6 Plus, Apple Pay and even the company's bold step into wearables.
The Internet Is Losing Interest in Computers
You may know Google Trends.
Securing the Tangled Web
Preventing script injection vulnerabilities through software design.
The Network is Reliable
Peter Bailis, Kyle Kingsbury
An informal survey of real-world communications failures.
Privacy, Anonymity, and Big Data in the Social Sciences
Jon P. Daries, Justin Reich, Jim Waldo, Elise M. Young, Jonathan Whittinghill, Andrew Dean Ho, Daniel Thomas Seaton, Isaac Chuang
Quality social science research and the privacy of human subjects require trust.
Technical Perspective: Portraiture in the Age of Big Data
Alexei A. Efros
There already exist thousands of photographs of any given individual, so there is no need to capture more. Rather, the challenge...
Ira Kemelmacher-Shlizerman, Eli Shechtman, Rahul Garg, Steven M. Seitz
An approach for generating face animations from large image collections of the same person. The approach is completely automatic...
Online Deception in Social Media
Michail Tsikerdekis, Sherali Zeadally
The unknown and the invisible exploit the unwary and the uninformed for illicit financial gain and reputation damage.
Security, Cybercrime, and Scale
Defense begins by identifying the targets likely to yield the greatest reward for an attacker's investment.
Reshaping Terrorist Networks
Francesca Spezzano, V. S. Subrahmanian, Aaron Mannes
To destabilize terrorist organizations, the <code>STONE</code> algorithms identify a set of operatives whose removal would maximally...
Optimality in Robot Motion: Optimal Versus Optimized Motion
Jean-Paul Laumond, Nicolas Mansard, Jean-Bernard Lasserre
Exploring the distinction between an optimal robot motion and a robot motion resulting from the application of optimization techniques...
Efficient Maximum Flow Algorithms
Andrew V. Goldberg, Robert E. Tarjan
Though maximum flow algorithms have a long history, revolutionary progress is still being made.
Big Data and Its Technical Challenges
H. V. Jagadish, Johannes Gehrke, Alexandros Labrinidis, Yannis Papakonstantinou, Jignesh M. Patel, Raghu Ramakrishnan, Cyrus Shahabi
Exploring the inherent technical challenges in realizing the potential of Big Data.