acm-header
Sign In

Communications of the ACM

News


Latest News News Archive Refine your search:
subjectPerformance And Reliability
authorChris Edwards
bg-corner

An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.


Soft Robots Look to New Environments
From Communications of the ACM

Soft Robots Look to New Environments

These non-standard automatons appear best suited for applications under water and in space.

Hidden Messages Fool AI
From Communications of the ACM

Hidden Messages Fool AI

Forced errors focus attention on neural network quirks.

Animals Teach Robots to Find Their Way
From Communications of the ACM

Animals Teach Robots to Find Their Way

Navigation research demonstrates bio-machine symbiosis.

Quantum Technology Forgoes Unconditional Security to Extend its Reach
From Communications of the ACM

Quantum Technology Forgoes Unconditional Security to Extend its Reach

Two projects in China demonstrate the possibility of global quantum key distribution networks.

Optimization Search Finds a Heart of Glass
From Communications of the ACM

Optimization Search Finds a Heart of Glass

Analog computing could provide greater efficiency, improved digital algorithms.

Software Synthesis Learns By Example
From ACM News

Software Synthesis Learns By Example

Neural networks will assist, rather than replace, human programmers.

Digitizing the World
From Communications of the ACM

Digitizing the World

Digital maps trawl for real-time updates.

Secure Quantum Communications
From Communications of the ACM

Secure Quantum Communications

Data locking experiments provide stepping stones to a possible future in quantum cryptography.

Containers Push Toward the Mayfly Server
From Communications of the ACM

Containers Push Toward the Mayfly Server

The container revolution represents a large-scale shift in thinking about multitasking systems.

Reconciling Quantum Physics with Math
From Communications of the ACM

Reconciling Quantum Physics with Math

Mathematicians explore the root of many problems in developing a proof for the Kadison-Singer problem.

Automating Proofs
From Communications of the ACM

Automating Proofs

Math struggles with the usability of formal proofs.

Self-Repair Techniques Point to Robots That Design Themselves
From Communications of the ACM

Self-Repair Techniques Point to Robots That Design Themselves

Robots are being taught to brainstorm alternatives when damaged.

Brain Science Helps Computers Separate Speakers in a Crowded Room
From Communications of the ACM

Brain Science Helps Computers Separate Speakers in a Crowded Room

People can listen to a single voice amid the hubbub of a cocktail party; algorithms can help computers do it, too.

Growing Pains For Deep Learning
From Communications of the ACM

Growing Pains For Deep Learning

Neural networks, which support online image search and speech recognition, eventually will drive more advanced services.

Secure-System Designers Strive to STEM Data Leaks
From Communications of the ACM

Secure-System Designers Strive to STEM Data Leaks

Attackers using side-channel analysis require little knowledge of how an implementation operates.

Decoding the Language of Human Movement
From Communications of the ACM

Decoding the Language of Human Movement

Computers that recognize what is happening in moving images can help defend against crime, and revolutionize rehabilitation.

Shellshock Awakens Bourne-Again Zombies
From ACM News

Shellshock Awakens Bourne-Again Zombies

A bug appears in places people didn’t think to look, or patch.

Existing Delivery Techniques Could Hinder Internet Protocol Revolution
From ACM News

Existing Delivery Techniques Could Hinder Internet Protocol Revolution

Named Data Networking Consortium supports an emerging Internet architecture designed for an increasingly mobile world.

Internet Routing Failures Bring Architecture Changes Back to the Table
From ACM News

Internet Routing Failures Bring Architecture Changes Back to the Table

Significant reductions in the space needed for IPv4 routes could be made if service providers aggregated more of their routes.

Researchers Probe Security Through Obscurity
From Communications of the ACM

Researchers Probe Security Through Obscurity

Obfuscation protects code by making it so impenetrable that access to it won't help a hacker understand how it works.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account