The Remarkable Story of the Underwater Internet
In October of 1971, in the midst of the Cold …
Meet the Online Tracking Device That Is Virtually Impossible to Block
A new, extremely persistent type of online tracking is shadowing …
Changes Afoot as DARPA Challenge Robots Prep for Upgrade
Researchers are preparing developing autonomous humanoid robots for the finals …
Human Subjects Research for the Twenty-First Century, or, What Can We Learn from the Facebook Mood Study?
There is tremendous value to society in doing large-scale A/B studies, and the current framework we have for human subjects research...
The Perfect Candidate
What makes a good candidate for a research position?
If You Want to Teach Kids CS, First Teach the Adults
The pathway to CS in schools starts with teaching the adults.
Google Bets a Billion Dollars on Twitch
The New Yorker
Video gaming differentiates itself from the older forms of escapism—literature, theatre, film, television—with interactivity.
How to Invent a Person Online
On April 8, 2013, I received an envelope in the mail from a nonexistent return address in Toledo, Ohio.
When Robots Come for Our Jobs, Will We Be Ready to Outsmart Them?
Non-human employees are filling positions in all sorts of workplaces, and they are proving themselves to be fast, accurate, and reliable—more so than their human counterparts.
Bringing Arbitrary Compute to Authoritative Data
Mark Cavage, David Pacheco
Many disparate use cases can be satisfied with a single storage system.
Quality Software Costs Money – Heartbleed Was Free
How to generate funding for free and open source software.
Undergraduate Software Engineering
Michael J. Lutz, J. Fernando Naveda, James R. Vallino
Addressing the needs of professional software development.
Technical Perspective: Getting Consensus for Data Replication
Philip A. Bernstein
The following paper is a breakthrough in which the authors offer a formula to calculate the probability of reading data that...
Quantifying Eventual Consistency with PBS
Peter Bailis, Shivaram Venkataraman, Michael J. Franklin, Joseph M. Hellerstein, Ion Stoica
Eventual consistency is often "good enough" for practitioners given its latency and availability benefits. In this work, we explain...
Technical Perspective: The Power of Joint Multiuser Beamforming
Konstantina (Dina) Papagiannaki
Having multiple Wi-Fi Access Points with an overlapping coverage area operating on the same frequency may not be a problem anymore...
Reshaping Terrorist Networks
Francesca Spezzano, V. S. Subrahmanian, Aaron Mannes
To destabilize terrorist organizations, the <code>STONE</code> algorithms identify a set of operatives whose removal would maximally...
Example-Based Learning in Computer-Aided STEM Education
Example-based reasoning techniques developed for programming languages also help automate repetitive tasks in education.
Community Sense and Response Systems: Your Phone as Quake Detector
Matthew Faulkner, Robert Clayton, Thomas Heaton, K. Mani Chandy, Monica Kohler, Julian Bunn, Richard Guy, Annie Liu, Michael Olson, MingHei Cheng, Andreas Krause
The Caltech CSN project collects sensor data from thousands of personal devices for real-time response to dangerous earthquakes...
Efficient Maximum Flow Algorithms
Andrew V. Goldberg, Robert E. Tarjan
Though maximum flow algorithms have a long history, revolutionary progress is still being made.
Big Data and Its Technical Challenges
H. V. Jagadish, Johannes Gehrke, Alexandros Labrinidis, Yannis Papakonstantinou, Jignesh M. Patel, Raghu Ramakrishnan, Cyrus Shahabi
Exploring the inherent technical challenges in realizing the potential of Big Data.
Implementing Distributed Shared Memory for Dynamic Networks
Peter Musial, Nicolas Nicolaou, Alexander A. Shvartsman
Atomically consistent memory services provide resiliency in dynamic settings.