The news archive provides access to past news stories from Communications of the ACM and other sources by date.
Researchers hope to make a fragile ancient Coptic codex readable by scanning it with computerized tomography and then using software to extract legible text.
The Deception Analysis and Reasoning Engine uses artificial intelligence to autonomously detect deception in courtroom trial videos.
The College Board's Advanced Placement computer science classes are being expanded to attract more girls and underrepresented minorities in the U.S. to participate.
Navigating the complexity of unspoken rules and social and linguistic cues to communicate with drivers, pedestrians, and others sharing the road is a challenge for developers of driverless vehicles.
Researchers say they have used deep neural networks to decode thoughts.
In November of 2012, the semiannual Top500 rankings of the world's supercomputers gave top billing to a machine constructed at the Oak Ridge National Laboratory, in Tennessee.
Chinese companies have increased the number of U.S. patents they've received by tenfold in less than 10 years, another sign that the world's second-largest economy is succeeding in its strategy to transform from Silicon Valley's…
The inability of law enforcement authorities to access data from electronic devices due to powerful encryption is an "urgent public safety issue," FBI Director Christopher Wray said on Tuesday as he sought to renew a contentious…
The 2017 Northern Illinois University Huskie Hack featured 269 student hackers who were tasked with developing solutions to health- and wellness-related challenges.
Teams of students demonstrated a broad range of original video games at the University of Southern California GamePipe Laboratory Fall 2017 Showcase.
Researchers are developing next-generation robots from soft materials that react to applied voltage with a wide range of motions.
Self-operated construction vehicles will gain traction long before self-driving cars.
The Wi-Fi Alliance has announced a major change to Wi-Fi security.
Researchers uncover security holes too big to believe.
In 2013, Diana Borland and 129 of her colleagues filed into an auditorium at the University of Pittsburgh Medical Center.
For the first time, scientists have shown through direct observations of the ozone hole by a satellite instrument, built by NASA's Jet Propulsion Laboratory in Pasadena, California, that levels of ozone-destroying chlorine are…
Four groups of researchers independently found the vulnerabilities behind the devastating Meltdown and Spectre attacks within months of each other.
Researchers in Germany are teaching intelligent algorithms to detect cars, pedestrians, and potentially dangerous objects in x-ray images from transportation security.
Tennessee electrical engineer Jonathan Pace has discovered the largest-ever prime number.
The Mcity Threat Identification Model is a new tool to help scientists analyze the likelihood of cybersecurity threats that must be overcome for autonomous and connected vehicles to be widely adopted.
Researchers are using deep-learning convolutional neural networks to analyze retinal photos to predict a person's blood pressure, age, and smoking status.
New graphene-based sensors-on-tape can be attached to plants to collect data for scientists and farmers.
Experts predict cognitive computing will eventually become normalized as a routine behavioral component in newer systems.
The Navier-Stokes equations capture in a few succinct terms one of the most ubiquitous features of the physical world: the flow of fluids.
The annual Draper Prize was established in 1988 to honor the memory of the "father of inertial navigation," and to increase public understanding of the contributions of engineering and technology.
Maths fans can't get enough of numbers that are millions of digits long and can only be divided by themselves and one. Now, through a collaborative effort, utilising computers distributed around the world, they've discovered…
Joseph Coughlin has been director of the MIT AgeLab ever since he founded it in 1999. In his new book, The Longevity Economy, he contends that old age—much like childhood, adolescence, and gender—is a social construct, and a …
The flaw, now named Meltdown, was revealed on Wednesday and affects most processors manufactured by Intel since 1995.
Researchers have demonstrated it is possible to match individuals across government databases with nearly 100% accuracy by using a few basic identifiers.
Researchers say they have created psychedelic stickers that can fool image-recognition software into seeing objects that do not exist.