The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Researchers are developing surveillance camera systems capable of autonomously detecting illegal activities, such as when a cashier is giving friends free items or if someone is about to commit a violent act. For example, the…
Have you ever wished you could be in two places at once? Perhaps you've had the desire to create a copy of yourself that could stand in for you at a meeting, freeing you up to work on more pressing matters. Thanks to a research…
Three-dimensional (3D) television and film has been a niche application partly because of cost, but mobile devices equipped with simpler and less expensive 3D technology could help it break out. The core components of next-generation…
The "secret questions" that protect online accounts and passwords may be far less secure than commonly believed, largely because their answers are often far too simple, researchers say. Carnegie Mellon University and Microsoft…
Two private companies have recently withdrawn from a Japanese consortium established to build the world's fastest supercomputer. The Next-Generation Supercomputer is a seven-year, $1 billion national project funded by Japan's…
In an effort to strength the Middle East's technical work force, Intel will help establish a nanoelectronics research center at the King Abdul-Aziz City of Science and Technology (KACST) in Riyadh, Saudi Arabia. The Center of…
Ubiquitous wireless networks, sustainable data centers, the development of the smart energy grid, and the commonality of city-supplied social networks are bringing the dream of City 2.0 closer to fruition, with the next step…
University of Illinois at Chicago (UIC) researchers will present a new way of defending against cross-site scripting attacks at the upcoming IEEE Symposium on Security and Privacy. The new defense enables a Web site to control…
A recently published report from the National Research Council (NRC) contends that there has to be more public disclosure and informed debate about cyberarms and cyberwarfare. The report draws a comparison between the unchecked…
University of Granada researchers have developed EDLUT, an event-driven, lookup-table-based simulator that can reproduce any part of the human body's nervous system. EDLUT can simulate hundreds of thousands neurons at the same…
The U.S. House of Representatives passed H.R. 2020, the Networking and Information Technology Research and Development Act of 2009 by a voice vote on Tuesday (May 12).
Constantinos Daskalakis has won the 2008 Doctoral Dissertation Award from ACM (the Association for Computing Machinery) for his work on behavior in complex networks of interacting individuals, such as those enabled and created…
Forget the battlefield radios, the combat PDAs or even infantry hand signals. When the soldiers of the future want to communicate, they’ll read each other's minds. At least, that's the hope of researchers at the Pentagon's DARPA…
Google has revealed an array of new search tools--Search Options, Wonder Wheel, Rich Snippets, and Google Squared--that enable users to combine options for displaying and studying results that go beyond the traditional listing…
Researchers at the Georgia Institute of Technology have built a test facility to evaluate and enhance sensors designed to detect buried land mines. The unique automated system measures the response of individual electromagnetic…
Fewer items on the results page of a Web search might be more appropriate for certain situations and users, according to a new study from researchers at the Helsinki Institute for Information Technology (HIIT) in Finland. Working…
Nearly 40 years after Americans first set foot on the moon, a host of private rocketeers are hoping to follow to win a $30 million prize. Team Italia, one of 17 teams competing for the Google Lunar X Prize, is driven by the vision…
Office workers who make time to chat face to face with colleagues may be far more productive than those who rely on e-mail, the phone, or Facebook, suggests a study carried out by researchers at MIT and New York University. The…
Light switches, TV remote controls and even house keys could become a thing of the past thanks to brain-computer interface (BCI) technology being developed in Europe that lets users perform everyday tasks with thoughts alone.…
Researchers at the University of Science and Technology of China say they have developed the first optical quantum cryptography network. The quantum communication system enables three users to speak in real time with telephones…
The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths' arsenal is sniffer programs that can sort out and decode scores…
Intel and Germany's University of Saarland have launched Intel VCI, a new visual computing institute that will focus on software architectures and algorithms for visual computing, including new user interfaces and visualizing…
A new cryptography approach based on the mathematical theory of elliptic curves is considered a leading candidate to replace the widely used RSA public key security system. Elliptic curves could enable more efficient cryptography…
The EUREKA ITEA software Cluster ANSO project is working to integrate domestic networked multimedia, home control, and communications devices. The digital home project wants to create intelligent sensors, actuators, wireless…
As the expiration of ICANN's agreement with the U.S. Commerce Department approaches, stakeholders are weighing in on the fate of the organization. European Union officials have come out in support of a restructuring of the organization…
Pennsylvania State University (PSU) has launched the Aesthetic Quality Inference Engine (ACQUINE), an online system for determining the aesthetic quality of an image. The online photo-rating system helps establish the foundation…
A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security chip" for PCs a most intriguing proposition. It's sort of…
Researchers from around the world are meeting at a conference in Kobe, Japan, to discuss recent advancements in robotics. Among those on display will be RiSE, a four-legged robot developed by University of Pennsylvania researchers…
While Americans may worry about having to give up their beloved flat screen TVs, computers and other high-tech devices in the home and workplace in an energy-constrained future, that is the reverse of what is likely to happen…
A leading cyber security specialist said last week that China has developed its own ultra-secure operating system for a strategic edge in its cyber warfare with U.S. computer systems. Kevin G. Coleman, a specialist with the Technolytics…