Many of us have lived with Moore's Law for all of our professional lives. We knew that it cannot continue forever, but the end always seemed to be beyond the horizon. No more. We are witnessing the denouement of an extraordinary …
DEPARTMENT: From the president
Too often one gets the impression of tacit expectation that scientific research has to produce results
within some predictable time. But many examples illustrate that it may take some time to validate the results of theoretical …
DEPARTMENT: Letters to the Editor
"Trends in Steganography" (Mar. 2014) included a good survey of the history of data hiding and a comprehensive list of methods for inserting bits into cover objects but omitted an important actor from the scene — the enemy …
Meet the candidates who introduce their plans — and stands — for the Association.
Judy Robertson reviews what happened when she decided to introduce Android development into the curriculum for first-year computer science students.
Sophisticated computer models and simulations are replacing test tubes and beakers. This revolution in biology research is redefining medicine, agriculture, and more.
Can our digital data represent us a million years from now?
Despite the need to make decisions relevant to technologies, the U.S. Supreme Court is not the most techno-savvy group.
COLUMN: Economic and business dimensions
Evaluating the evolving controversial digital currency.
COLUMN: Law and technology
How video games thrive in a world of piracy.
COLUMN: Historical reflections
Reflections on a British computer engineer who influenced several important machines, including the first stored-program computer.
Bringing educators together and focusing their interests toward improving computer science education in high schools.
Considering the societal implications of the robotics revolution.
How good security at the NSA could have stopped him.
Better understanding data requires tracking its history and context.
Stronger properties for low-latency geo-replicated storage.
SECTION: Contributed articles
Users' trust in cloud systems is undermined by the lack of transparency in existing security policies.
How to cope with the growing demand for software solutions at no extra cost.
Participating educational institutions get a much more cost-effective result compared to the commercial off-the-shelf alternative.
SECTION: Review articles
Using machine learning to predict algorithm runtime.
SECTION: Research highlights
An ideal scheme for password storage would enable a password with more than 20 bits of randomness to be input and output from the brain of a human being who is unconscious of the process and thus unable to give away or reveal …
We present a defense against coercion attacks using the concept of implicit learning from cognitive psychology. We use a carefully crafted computer game to allow a user to implicitly learn a secret password without them having …
COLUMN: Last byte
Sorting is one of the most fundamental, and most studied, computational tasks. The problem is typically to put n
items in order. The objective is to minimize time, space, number of comparisons, or number of rounds of comparisons …