The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Irina Khoroshko, from Zelenograd near Moscow, had learned her times tables by the age of five.
The tendency for people to be repelled by increasingly humanoid and human-like robots may extend to chatbots and digital assistants as well.
The European Union-funded NANOBIOTOUCH and NEBIAS projects examined how touch stimuli and neural processing interact cs more intuitive.
Researchers have developed a new technique they say could reduce the overall cost of wafer technology.
Researchers at Purdue University have produced a rechargeable "spin battery" from topological insulators.
A new model enables users to transform images in a "cycle consistent" way, so any changes to the original image are expected to remain fully reversible.
Getting driverless cars to make safe left turns at intersections is a key challenge for engineers, as they involve both psychology and technology.
Leonid Mirny swivels in his office chair and grabs the power cord for his laptop.
As we've explored the Solar System, some items we're familiar with from Earth's geology have kept appearing in new places.
Researchers at King's College London in the U.K. reviewed three-dimensional facial simulations of about 1,000 female twins, and found the shapes of specific facial features were highly shaped by genetics.
Researchers are developing a scaled-down robotic version of a cheetah that uses only about 15% more energy than the real animal.
A collaboration between researchers at the University of California, San Diego and Google has enabled the Internet company to reduce the number of fraudulent businesses in Google Maps by 70%.
People's ability to behave randomly reaches its zenith at age 25, and then gradually erodes before experiencing a swift decline at age 60.
Johns Hopkins University professor Elana Fertig details her research to enhance precision medicine in cancer, using the techniques developed for finding patterns in Netflix movie ratings.
NASA's senior Mars rover, Opportunity, is departing "Cape Tribulation," a crater-rim segment it has explored since late 2014, southbound for its next destination, "Perseverance Valley."
Huskey was a pioneering computer scientist who worked on early computing systems, and later helped universities around the world establish computer centers and computer science programs.
Fifty years ago, Peter Samson, one of the inventors of Spacewar, considered the world's first video game, began another craze underground.
Raul Polit Casillas grew up around fabrics. His mother is a fashion designer in Spain, and, at a young age, he was intrigued by how materials are used for design.
At a community college in upstate New York, 12 cafeteria workers recently learned that they will lose their jobs—and be replaced by self-serve machines.
Researchers are designing machine-learning systems to enable supercomputers to identify large-scale atmospheric structures in climate data.
Researchers have found that motor cortical neurons optimally adjust how they encode movements in a task-specific manner.
The next iteration of the Structured Threat Information eXchange machine-to-machine cyberthreat information-sharing language is nearing completion.
Researchers say they have developed a nano-thermal-mechanical device that could help computers use heat as an alternative energy source.
Coal miners find new lives as programmers.
A failed missile launch in North Korea Sunday has brought renewed attention to reports that the United States is trying to degrade North Korea's missile capabilities via hacking.
The Fourth Industrial Revolution has arrived.
A new supercomputing algorithm can determine whether state legislative districts have been unfairly drawn, with the potential of reshaping U.S. electoral politics.
Researchers used a database of 3.2 million photos to train a deep-learning system to distinguish between 48 animal species.
Researchers say they have developed the first-ever detailed worldwide map of the Internet.
Researchers have developed an algorithm designed to counter both physical and virtual threats to social networks.