From Schneier on Security
Artificial intelligence (AI) has been billed as the next frontier of humanity: the newly available expanse whose exploration
…
B. Schneier| February 29, 2024
In the latest CACM, Jilin Chen and Joseph Konstan analyze data from the ACM DL and conclude that low-acceptance rate conference have papers with higher impact (more...Lance From Computational Complexity | June 3, 2010 at 02:46 PM
P&G is involved in a widespread rollout of understanding non-conscious consumer behavior: " ... Procter & Gamble has partnered with Swedish eye tracking technology...Franz Dill From The Eponymous Pickle | June 3, 2010 at 01:43 PM
The publishing house Elsevier invited me to fill out a survey regarding their journals. As a reward, they gave me a glimpse at their statistics. The three most...Daniel Lemire From Daniel Lemire's Blog | June 3, 2010 at 10:43 AM
“There is a variety of mechanisms through which the research community can participate in agenda-setting. One model I have found to be very valuable is exemplified...Ed Lazowska From The Computing Community Consortium Blog | June 3, 2010 at 05:10 AM
Yesterday afternoon, I gave my first academic conference paper presentation. I have given talks at conferences before (including Grace Hopper), but they weren't...Gail Carmichael From The Female Perspective of Computer Science | June 3, 2010 at 02:47 AM
From ACM-W supporting, celebrating and advocating for Women in Computing
Our own Elaine Weyuker has been named as a Presidential Award winner by ACM President Dame Wendy Hall. She is cited "For her tireless efforts in the development...Ellen Walker From ACM-W supporting, celebrating and advocating for Women in Computing | June 2, 2010 at 07:50 PM
I just reviewed two emails I received about some technology areas I cover. Neither contained a link to the press release content I could send on. I had to ask...Franz Dill From The Eponymous Pickle | June 2, 2010 at 06:35 PM
A topic of continual interest to me. We saw some of this in the enterprise when quantitative analytical methods were linked to sets of 'expert systems' business...Franz Dill From The Eponymous Pickle | June 2, 2010 at 05:31 PM
During a period when many enterprises were thinking about how to build expert systems that might augment human beings, we learned about the concept of tacit knowledge...Franz Dill From The Eponymous Pickle | June 2, 2010 at 02:24 PM
A reader from Mexico asks I am a near-to-be graduate student from Computational Engineering. However, it wasn't what I expected from my career. I want to be a mathematician...Lance From Computational Complexity | June 2, 2010 at 12:53 PM
Patent cloud looms over Google Web video plan "The VP8 patent situation is no different from the patent challenges that face any computing innovation, from search...Simon Phipps From Wild WebMink | June 2, 2010 at 12:09 PM
Go read this article -- "Setting impossible standards on intelligence" -- on laying blame for the intelligence "failure" that allowed the Underwear Bomber to board...schneier From Schneier on Security | June 2, 2010 at 11:39 AM
From Computer Science Teacher - Thoughts and Information From Alfred Thompson
Let me think out loud hear a little and get some opinions. On what? On how far to go when naming things in programs. let me start at the beginning. The other day...Alfred Thompson From Computer Science Teacher - Thoughts and Information From Alfred Thompson | June 2, 2010 at 09:12 AM