Open Collaboration in an Age of Distrust
We are manifestly in a new era of international relations—"An Age of Distrust"—where the trend toward increased trade and integration has stalled, if not reversed.
A People-Centered Economy
Innovation for Jobs (i4j.info) recently published a book describing a new, people-centered view of work. Rather than organizing work around tasks, the idea is to organize work around people and their skills.
Are We Having An Ethical Crisis in Computing?
The computing field seems to be going through another image crisis these days. Many view this as an ethical crisis. I am dubious of the diagnosis.
Answering Children's Questions About Computers
Judy Robertson addresses the disconnect between what children are taught about computers and what they actually wish to know.
A new proof supports a 25-year-old claim of the unique power of quantum computing.
Hidden Messages Fool AI
Forced errors focus attention on neural network quirks.
Who Owns 3D Scans of Historic Sites?
Three-dimensional scanning can be used to protect or rebuild historic structures, but who owns that digital data?
Law and technology
Illegal Pricing Algorithms
Examining the potential legal consequences of using pricing algorithms.
Technology strategy and management
CRISPR: An Emerging Platform for Gene Editing
Considering a potential platform candidate in the evolving realm of gene-editing technologies research.
Hey Google, What's a Moonshot?: How Silicon Valley Mocks Apollo
Fifty years on, NASA's expensive triumph is a widely misunderstood model for spectacular innovation.
UCF's 30-Year REU Site in Computer Vision
A unique perspective on experiences encouraging students to focus on further education.
Modeling in Engineering and Science
Understanding behavior by building models.
Using Remote Cache Service for Bazel
Save time by sharing and reusing build and test output.
Research for Practice: Security for the Modern Age
Securely running processes that require the entire syscall interface.
SQL Is No Excuse to Avoid DevOps
Automation and a little discipline allow better testing, shorter release cycles, and reduced business risk.
Autonomous Tools and Design: A Triple-Loop Approach to Human-Machine Learning
In addition to having a detailed understanding of the artifacts they intend to create, designers need to guide the software tools they use.
Framework for Implementing a Big Data Ecosystem in Organizations
Featuring the various dimensions of data management, it guides organizations through implementation fundamentals.
The Church-Turing Thesis: Logical Limit or Breachable Barrier?
In its original form, the Church-Turing thesis concerned computation as Alan Turing and Alonzo Church used the term in 1936—human computation.
Intelligent Systems for Geosciences: An Essential Research Agenda
A research agenda for intelligent systems that will result in fundamental new capabilities for understanding the Earth system.
Deception, Identity, and Security: The Game Theory of Sybil Attacks
Classical mathematical game theory helps to evolve the emerging logic of identity in the cyber world.
Technical Perspective: Photorealistic Facial Digitization and Manipulation
If facial performance capture is possible for conventional RGB videos in real time, then believable facial expressions can be transferred effortlessly from one person to another in a live-action scenario. This capability is demonstrated …
Face2Face: Real-Time Face Capture and Reenactment of RGB Videos
Face2Face is an approach for real-time facial reenactment of a monocular target video sequence. Our goal is to animate the facial expressions of the target video by a source actor and re-render the manipulated output video in …
Technical Perspective: Attacking Cryptographic Key Exchange with Precomputation
"Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice," by David Adrian et al., illustrates the importance of taking preprocessing attacks into account when choosing cryptographic parameters.
Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice
We investigate the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed.
Consumers and pharmaceutical companies have at least one interest in common: Neither wants the consumer to consume counterfeit drugs.