Disputed Google research is receiving further scrutiny, despite the company's inaction in open-sourcing its data or source code…
From ACM NewsGregory Goth Commissioned by CACM Staff| March 29, 2023
An edited collection of advanced computing news from Communications of the ACM, ACM TechNews, other ACM resources, and news sites around the Web.
A recently published report from the National Research Council (NRC) contends that there has to be more public disclosure and informed debate about cyberarms and...Network World From ACM TechNews | May 15, 2009
University of Granada researchers have developed EDLUT, an event-driven, lookup-table-based simulator that can reproduce any part of the human body's nervous system...Universidad de Granada From ACM TechNews | May 15, 2009
The U.S. House of Representatives passed H.R. 2020, the Networking and Information Technology Research and Development Act of 2009 by a voice vote on Tuesday (May...House Committee on Science and Technology From ACM News | May 15, 2009
Constantinos Daskalakis has won the 2008 Doctoral Dissertation Award from ACM (the Association for Computing Machinery) for his work on behavior in complex networks...ACM From ACM News | May 15, 2009
Forget the battlefield radios, the combat PDAs or even infantry hand signals. When the soldiers of the future want to communicate, they’ll read each other's minds...Wired From ACM News | May 15, 2009
Google has revealed an array of new search tools--Search Options, Wonder Wheel, Rich Snippets, and Google Squared--that enable users to combine options for displaying...TechNewsWorld From ACM TechNews | May 14, 2009
Researchers at the Georgia Institute of Technology have built a test facility to evaluate and enhance sensors designed to detect buried land mines. The unique automated...Newswise From ACM News | May 14, 2009
Intel and Germany's University of Saarland have launched Intel VCI, a new visual computing institute that will focus on software architectures and algorithms for...EE Times From ACM TechNews | May 13, 2009
Fewer items on the results page of a Web search might be more appropriate for certain situations and users, according to a new study from researchers at the Helsinki...Helsinki Institute for Information Technology From ACM TechNews | May 14, 2009
Nearly 40 years after Americans first set foot on the moon, a host of private rocketeers are hoping to follow to win a $30 million prize. Team Italia, one of 17...FoxNews.com From ACM News | May 14, 2009
The EUREKA ITEA software Cluster ANSO project is working to integrate domestic networked multimedia, home control, and communications devices. The digital home...EUREKA From ACM TechNews | May 13, 2009
As the expiration of ICANN's agreement with the U.S. Commerce Department approaches, stakeholders are weighing in on the fate of the organization. European Union...InternetNews.com From ACM TechNews | May 13, 2009
Pennsylvania State University (PSU) has launched the Aesthetic Quality Inference Engine (ACQUINE), an online system for determining the aesthetic quality of an...Penn State Live From ACM TechNews | May 13, 2009
Researchers from around the world are meeting at a conference in Kobe, Japan, to discuss recent advancements in robotics. Among those on display will be RiSE, a...Technology Review From ACM TechNews | May 13, 2009
Office workers who make time to chat face to face with colleagues may be far more productive than those who rely on e-mail, the phone, or Facebook, suggests a study...Technology Review From ACM News | May 14, 2009
Light switches, TV remote controls and even house keys could become a thing of the past thanks to brain-computer interface (BCI) technology being developed in Europe...ICT Results From ACM News | May 13, 2009
Researchers at the University of Science and Technology of China say they have developed the first optical quantum cryptography network. The quantum communication...Chinese Academy of Sciences From ACM TechNews | May 13, 2009
The Internet is rife with cybercriminals and online eavesdroppers, and countering this threat is the job of cybersleuths. One of the key tools in cybersleuths'...The New York Times From ACM TechNews | May 13, 2009
A new cryptography approach based on the mathematical theory of elliptic curves is considered a leading candidate to replace the widely used RSA public key security...European Science Foundation From ACM TechNews | May 13, 2009
A lost or stolen laptop or notebook computer is replaceable; the stolen data inside it may produce real owner's anxiety. Which makes Fujitsu's newly announced "security...The New York Times From ACM News | May 13, 2009