The computational expense of creating three-dimensional images that can be viewed by all is just one factor holding them back…
From ACM NewsSandrine Ceurstemont Commissioned by CACM Staff| June 1, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
Pill-sized robotic capsules are under development for screening, diagnostic, and therapeutic procedures. Scientific American From ACM TechNews | July 30, 2010
Pretty well, once the technology to automatically respond to peak demand and store renewable energy matures. Scientific American From ACM News | July 27, 2010
Robots are already in use by U.S. forces in Iraq and Afghanistan, and their variety and use is only growing.Scientific American From ACM News | June 22, 2010
A new generation of medical devices using wireless communications, sophisticated software and data center-driven "cloud" computing promises to deliver health care...Scientific American From ACM News | May 26, 2010
Intellectual Ventures builds computer simulations to better understand how malaria spreads and how it responds to eradication efforts.Scientific American From ACM News | May 25, 2010
By highlighting the limits of traditional military technology, the drawn-out conflicts in Iraq and Afghanistan have spurred the U.S. defense department to shake...Scientific American From ACM News | April 14, 2010
More than a year after being launched by hackers on a campaign to infect computers running Microsoft Windows, the Conficker worm's effects are still being felt....Scientific American From ACM News | February 4, 2010
Swarm intelligence is a branch of artificial intelligence that attempts to get computers and robots to mimic the highly efficient behavior of colony insects such...Scientific American From ACM News | January 13, 2010
When Nintendo's Wii game console debuted in November 2006, its motion-sensing handheld "Wiimotes" got players off the couch and onto their feet.
Now Microsoft...Scientific American From ACM News | January 8, 2010
Even the best electronic security may not be enough to protect sensitive data from dogged hackers, and researchers have been able to extract information from the...Scientific American From ACM TechNews | May 6, 2009