default search action
Communications of the ACM, Volume 56
Volume 56, Number 1, January 2013 (EE)
- Moshe Y. Vardi:
Who begat computing? 5
- Vinton G. Cerf:
What's a robot? 7
- Computer science is not a science. 8-9
- Alain Chesnais:
ACM's annual report. 11-15
- Daniel Reed:
Lost in translation. 16-17
- Neil Savage:
Stopping the leaks. 19-21 - Gregory Mone:
Beyond Hadoop. 22-24 - Marina Krakovsky:
Just the facts. 25-27
- Michael A. Cusumano:
The Apple-Samsung lawsuits. 28-31
- Phillip G. Armour:
How we build things: ...and why things are 90% complete.. 32-33
- Deven R. Desai:
Beyond location: data security in the 21st century. 34-36
- Thomas Haigh:
Five lessons from really good history. 37-40
- Salman Khan:
What college could be like. 41-43 - Jonathan Grudin, Gloria Mark, John Riedl:
Conference-journal hybrids. 44-49
- Pat Helland:
Condos and clouds. 50-59 - Browser security: appearances can be deceiving. 60-67
- Jeremiah Grossman:
The web won't be safe or secure until we break it. 68-72
- Richard A. Becker, Ramón Cáceres, Karrie J. Hanson, Sibren Isaacman, Ji Meng Loh, Margaret Martonosi, James Rowland, Simon Urbanek, Alexander Varshavsky, Chris Volinsky:
Human mobility characterization from cellular network data. 74-82 - Vineet Bafna, Alin Deutsch, Andrew Heiberg, Christos Kozanitis, Lucila Ohno-Machado, George Varghese:
Abstractions for genomics. 83-93
- Tamara Denning, Tadayoshi Kohno, Henry M. Levy:
Computer security and the modern home. 94-103
- Doug DeCarlo, Matthew Stone:
Visualization, understanding, and design: technical perspective. 105 - Niloy J. Mitra, Yong-Liang Yang, Dong-Ming Yan, Wilmot Li, Maneesh Agrawala:
Illustrating how mechanical assemblies work. 106-114 - James M. Rehg:
Finding people in depth: technical perspective. 115 - Jamie Shotton, Toby Sharp, Alex Kipman, Andrew W. Fitzgibbon, Mark Finocchio, Andrew Blake, Mat Cook, Richard Moore:
Real-time human pose recognition in parts from single depth images. 116-124
- Rudy Rucker:
Future tense. 136-
Volume 56, Number 2, February 2013
- Ronald F. Boisvert, Jack W. Davidson:
Positioning ACM for an open access future. 5
- Vinton G. Cerf:
Growing the ACM family. 7
- Bertrand Meyer:
When reviews do more than sting. 8-9
- Neil Savage:
Life in simulation. 11-13 - Alex Wright:
Revving the rover. 14-16 - Samuel Greengard:
A new model for healthcare. 17-19
- Eben Moglen:
The tangled web we have woven. 20-22
- Peter G. Neumann:
More sight on foresight. 23-25
- George V. Neville-Neil:
Divided by division. 26-27
- Steve Cooper, Mehran Sahami:
Reflections on Stanford's MOOCs. 28-30
- Ana Aizcorbe, Samuel Kortum, Unni Pillai:
The value of microprocessor designs. 31-32
- Ali Sunyaev, Stephan Schneider:
Cloud services certification. 33-36 - Anita Jones:
The explosive growth of postdocs in computer science. 37-39
- William R. Cheswick:
Rethinking passwords. 40-44 - Brendan Gregg:
Thinking methodically about performance. 45-51 - Robert N. M. Watson:
A decade of OS access-control extensibility. 52-63
- Ari Juels, Alina Oprea:
New approaches to security and availability for cloud data. 64-73 - Jeffrey Dean, Luiz André Barroso:
The tail at scale. 74-80
- Cristian Cadar, Koushik Sen:
Symbolic execution for software testing: three decades later. 82-90
- Pradip Bose:
Is dark silicon real?: technical perspective. 92 - Hadi Esmaeilzadeh, Emily R. Blem, Renée St. Amant, Karthikeyan Sankaralingam, Doug Burger:
Power challenges may end the multicore era. 93-102
- Peter Winkler:
Puzzled. 112
Volume 56, Number 3, March 2013
- Moshe Y. Vardi:
To boycott or not to boycott. 5
- Vinton G. Cerf:
A revolution in India. 7
- No place for old educational flaws in new online media. 8-9
- Jason I. Hong, Daniel Reed:
Passwords getting painful, computing still blissful. 10-11
- Neil Savage:
Decoding dementia. 13-15 - Gregory Mone:
Rise of the swarm. 16-17 - Paul Hyman:
Cybercrime: it's serious, but exactly how serious? 18-20 - ACM fellows inducted. 21
- Pamela Samuelson:
A copyright challenge to resales of digital music. 24-26
- Denice Ward Hood, Stafford Hood, Dominica McBride:
Academic careers workshop for underrepresented groups. 27-29
- Peter J. Denning:
Moods, wicked problems, and learning. 30-32
- Rachelle Hollander:
Ethics viewpoints efficacies. 33-34
- Jeff A. Johnson:
Can computer professionals and digital technology engineers help reduce gun violence? 35-37 - Mikkel Thorup:
Funding successful research. 38-39
- Arun Kumar, Feng Niu, Christopher Ré:
Hazy: making it easier to build and maintain big-data analytics. 40-49 - Brian Beckman, Erik Meijer:
The story of the teapot in DHTML. 50-55 - Kate Matsudaira:
Making the mobile web faster. 56-61
- Edwin Olson, Johannes H. Strom, Robert Goeddel, Ryan D. Morton, Pradeep Ranganathan, Andrew Richardson:
Exploration and mapping with autonomous robot teams. 62-70 - Nafaâ Jabeur, Sherali Zeadally, Biju Theruvil Sayed:
Mobile social networking applications. 71-79
- Fedor V. Fomin, Petteri Kaski:
Exact exponential algorithms. 80-88
- David Oran:
Video quality assessment in the age of internet video: technical perspective. 90 - Florin Dobrian, Asad Awan, Dilip Antony Joseph, Aditya Ganjam, Jibin Zhan, Vyas Sekar, Ion Stoica, Hui Zhang:
Understanding the impact of video quality on user engagement. 91-99
- Peter Winkler:
Puzzled. 102 - Leah Hoffmann:
Q&A. 104-
Volume 56, Number 4, April 2013
- Stephen R. Bourne, George V. Neville-Neil:
Developing tools and resources for those in practice. 5
- Vinton G. Cerf:
Open access. 7 - Scott E. Delman:
An open access partnership. 9
- A robot's roots. 10-11
- Mark Guzdial, Daniel Reed:
Securing the future of computer science; reconsidering analog computing. 12-13
- Nidhi Subbaraman:
Artificial connections. 15-17 - Gary Anthes:
Inexact design: beyond fault-tolerance. 18-20 - Leah Hoffmann:
Looking back at big data. 21-23
- Michael A. Cusumano:
Are the costs of 'free' too high in online education? 26-28
- Michael L. Best:
Peacebuilding in a networked world. 30-32
- George V. Neville-Neil:
Code abuse. 33-34
- Nir Kshetri:
Cyber-victimization and cybersecurity in China. 35-37 - Robert Rosenberger:
The problem with hands-free dashboard cellphones. 38-40
- Nicholas C. Zakas:
The evolution of web development for mobile devices. 42-48 - Patrick Meenan:
How fast is your website? 49-55 - David F. Bacon, Rodric M. Rabbah, Sunil Shukla:
FPGA programming for the masses. 56-63
- Zhengchuan Xu, Qing Hu, Chenghong Zhang:
Why computer talents become computer hackers. 64-74 - Nishant Thorat, Arvind Raghavendran, Nigel Groves:
Offline management in virtualized environments. 75-81
- Ronen Feldman:
Techniques and applications for sentiment analysis. 82-89
- David A. Forsyth:
Understanding pictures of rooms: technical perspective. 91 - Huayan Wang, Stephen Gould, Daphne Koller:
Discriminative learning with latent variables for cluttered indoor scene understanding. 92-99
- Paul Di Filippo:
Future tense. 104-
Volume 56, Number 5, May 2013
- Moshe Y. Vardi:
Fricative computing. 5
- Vinton G. Cerf:
ACM president's salary increased by 300%! 7 - Scott E. Delman:
A few good reasons to publish in Communications. 9
- Try old boys security network. 12-13
- Jeannette M. Wing, Mark Guzdial:
Encouraging IT usage in future healthcare, quality in CS education. 14-15
- Alex Wright:
Proving grounds. 17-19 - Samuel Greengard:
Vanishing electronics. 20-22 - Paul Hyman:
'Small data' enabled prediction of Obama's win, say economists. 23-25
- P. Bernt Hugenholtz:
Fair use in Europe. 26-28
- David Anderson:
Max Newman: forgotten man of early British computing. 29-31
- Mark Guzdial:
Human-centered computing: a new degree for Licklider's world. 32-34
- Peter J. Denning:
The science in computer science. 35-38 - Michael J. Flynn, Oskar Mencer, Veljko M. Milutinovic, Goran Rakocevic, Per Stenström, Roman Trobec, Mateo Valero:
Moving from petaflops to petadata. 39-42
- Latanya Sweeney:
Discrimination in online ad delivery. 44-54 - Peter Bailis, Ali Ghodsi:
Eventual consistency today: limitations, extensions, and beyond. 55-63 - Adam H. Leventhal:
A file system all its own. 64-67
- Mithun George Jacob, Yu-Ting Li, George A. Akingba, Juan P. Wachs:
Collaboration with a robotic scrub nurse. 68-75 - Chris F. Kemerer, Charles Zhechao Liu, Michael D. Smith:
Strategies for tomorrow's 'winners-take-some' digital goods markets. 76-82
- Iris A. Junglas, Jeanne Harris:
The promise of consumer technologies in emerging markets. 84-90
- Matt Pharr:
The ray-tracing engine that could: technical perspective. 92 - Steven G. Parker, Heiko Friedrich, David P. Luebke, R. Keith Morley, James Bigler, Jared Hoberock, David K. McAllister, Austin Robison, Andreas Dietrich, Greg Humphreys, Morgan McGuire, Martin Stich:
GPU ray tracing. 93-101
- Peter Winkler:
Puzzled. 104
Volume 56, Number 6, June 2013
- Erik R. Altman:
SGB fortifies global SIG community. 5
- Vinton G. Cerf:
Honoring our best. 7
- How to claim your fair share in academic publishing. 8-9
- Jason I. Hong, Judy Robertson:
Computer security needs refocus, and be nice about it. 10-11
- Gary Anthes:
Deep learning comes of age. 13-15 - Gregory Mone:
The future is flexible displays. 16-17 - Paul Hyman:
Augmented-reality glasses bring cloud security into sharp focus. 18-20 - Neil Savage:
Proofs probable. 22-24 - ACM honors computing innovators. 25
- Stas Filshtinskiy:
Cybercrime, cyberweapons, cyber wars: is there too much of it in the air? 28-30
- Phillip G. Armour:
What is a "good" estimate?: whether forecasting is valuable. 31-32
- George V. Neville-Neil:
Swamped by automation. 33-34
- Peter J. Denning:
Thumb numbers. 35-37
- Nancy G. Leveson:
Learning from the past to face the risks of today. 38-42
- Stephen B. Wicker, Stephanie M. Santoso:
Access to the internet is a human right. 43-46
- Dan Geer:
Resolved: the internet is no place for critical infrastructure. 48-53 - Bill Hsu, Marc Sosnick-Pérez:
Real-time GPU audio. 54-62 - Mark Cavage:
There is no getting around it: you are building a distributed system. 63-70
- Ognjen Scekic, Hong Linh Truong, Schahram Dustdar:
Incentives and rewarding in social computing. 72-82 - Nabil Adam, Randy Stiles, Andrew Zimdars, Ryan Timmons, Jackie Leung, Greg Stachnick, Jeff Merrick, Robert Coop, Vadim A. Slavin, Tanya Kruglikov, John Galmiche, Sharad Mehrotra:
Consequence analysis of complex events on critical U.S. infrastructure. 83-91
- Deepak Agarwal, Bee-Chung Chen, Pradheep Elango, Raghu Ramakrishnan:
Content recommendation on web portals. 92-101
- Yao-Wen Chang:
Circuit placement challenges: technical perspective. 104 - Myung-Chul Kim, Dongjin Lee, Igor L. Markov:
SimPL: an algorithm for placing VLSI circuits. 105-113
- Peter Winkler:
Puzzled answers. 117 - Leah Hoffmann:
Q&A. 120-
Volume 56, Number 7, July 2013
- Moshe Y. Vardi:
The great robotics debate. 5
- Vinton G. Cerf:
'But officer, I was only programming at 100 lines per hour!'. 7
- Plenty more hacker motivations. 8-9
- Jason I. Hong:
Ph.D. students must break away from undergraduate mentality. 10-11
- Esther Shein:
Keeping computers cool from the inside. 13-16 - Samuel Greengard:
All the items fit to print. 17-19 - Neil Savage:
Backing creativity. 20-21
- Pamela Samuelson:
Statutory damages as a threat to innovation. 24-26
- Christopher S. Tang, Joshua Zimmerman:
Information and communication technology for managing supply chain risks. 27-29
- Mari Sako:
The business of professionals. 30-32
- Ron Eglash, Juan E. Gilbert, Ellen Foster:
Toward culturally responsive computing education. 33-36
- Martin Ford:
Could artificial intelligence create an unemployment crisis? 37-39
- Paul E. McKenney:
Structured deferral: synchronization via procrastination. 40-49 - Samy Al-Bahra:
Nonblocking algorithms and scalable multicore programming. 50-61 - Mathieu Desnoyers:
Proving the correctness of nonblocking data structures. 62-69
- Yang Tang, Di Wang, Jing Bai, Xiaoyan Zhu, Ming Li:
Information distance between what I said and what it heard. 70-77 - Ariel D. Procaccia:
Cake cutting: not just child's play. 78-87
- Madhav V. Marathe, Anil Kumar S. Vullikanti:
Computational epidemiology. 88-96
- Peter Wonka:
A fresh approach to vector graphics: technical perspective. 100 - Alexandrina Orzan, Adrien Bousseau, Pascal Barla, Holger Winnemöller, Joëlle Thollot, David Salesin:
Diffusion curves: a vector representation for smooth-shaded images. 101-108
- Mark McClelland:
Future tense. 112-
Volume 56, Number 8, August 2013
- Moshe Y. Vardi, Victor Vianu:
What is a flagship publication? 5
- Vinton G. Cerf:
Computer science education - revisited. 7
- Is computing science? 9
- Philip J. Guo:
Teaching programming the way it works outside the classroom. 10-11
- Samuel Greengard:
A new approach to information storage. 13-15 - Alex Wright:
Patient, heal thyself. 16-18 - Paul Hyman:
Software aims to ensure fairness in crowdsourcing projects. 19-21
- Richard Heeks, Andrew Robinson:
Ultra-low-cost computing and developing countries. 22-24
- Chrysanthos Dellarocas, Marshall W. van Alstyne:
Money models for MOOCs. 25-28
- Eric Byres:
The air gap: SCADA's enduring security myth. 29-31
- George V. Neville-Neil:
Cherry-picking and the scientific method. 32-33
- Leo Porter, Mark Guzdial, Charlie McDowell, Beth Simon:
Success in introductory programming: what works? 34-36
- Jean-Loup Richet:
Overt censorship: a fatal mistake? 37-38
- Ariel Tseitlin:
The antifragile organization. 40-44 - Alex Nicolaou:
Best practices on the move: building web apps for mobile devices. 45-51 - Tammy Everts:
Rules for mobile performance optimization. 52-59
- Marc Lauritsen:
Are we free to code the law? 60-66 - Jacques Wainer, Michael Eckmann, Siome Goldenstein, Anderson Rocha:
How productivity and impact differ across computer science subareas. 67-73
- Josh C. Bongard:
Evolutionary robotics. 74-83
- Assaf Naor:
Every graph is essentially sparse. 86 - Joshua D. Batson, Daniel A. Spielman, Nikhil Srivastava, Shang-Hua Teng:
Spectral sparsification of graphs: theory and algorithms. 87-94
- Peter Winkler:
Puzzled. 96
Volume 56, Number 9, September 2013
- Moshe Y. Vardi:
Has the innovation cup run dry? 5
- Vinton G. Cerf:
Freedom and the social contract. 7
- For privacy and security, use public keys everywhere. 8-9
- Michael Stonebraker, Judy Robertson:
Big data is 'buzzword du jour;' CS academics 'have the best job'. 10-11
- Chris Edwards:
Magnetic diversion for electronic switches. 13-15 - Keith Kirkpatrick:
Software-defined networking. 16-19 - Esther Shein:
Ephemeral data. 20-22 - Laura DiDio:
Remembering Douglas Engelbart. 24-25
- James Grimmelmann:
What to do about Google? 28-30
- Thomas Haigh:
Software and souls; programs and packages. 31-34
- Peter J. Denning:
The other side of language. 35-37
- Zeljko Obrenovic:
Research and practice: the curious case of 'small' researchers-practitioners. 38-40
- Lawrence Snyder:
An interview with Hadi Partovi. 41-45
- Maged M. Michael:
The balancing act of choosing nonblocking features. 46-53 - Sean Hull:
20 obstacles to scalability. 54-59 - Christoph Lameter:
An overview of non-uniform memory access. 59-54
- Steve Benford, Chris Greenhalgh, Gabriella Giannachi, Brendan Walker, Joe Marshall, Tom Rodden:
Uncomfortable user experience. 66-73 - Mark Braverman:
Computing with real numbers, from Archimedes to Turing and beyond. 74-83
- Michael Fisher, Louise A. Dennis, Matthew P. Webster:
Verifying autonomous systems. 84-93
- Pietro Perona:
Progress in visual categorization: technical perspective. 96 - Pedro F. Felzenszwalb, Ross B. Girshick, David A. McAllester, Deva Ramanan:
Visual object detection with deformable part models. 97-105
- Peter Winkler:
Puzzled. 110 - Leah Hoffmann:
Q&A. 112-
Volume 56, Number 10, October 2013
- John White:
On the future of ACM. 5
- Vinton G. Cerf:
Revisiting the tragedy of the commons. 7
- Deep accountability, beyond even liability. 8-9
- Philip J. Guo:
Helping scientists, engineers to work up to 100 times faster. 12-13
- Alex Wright:
Tuning in to graphene. 15-17 - Tom Geller:
Making the internet safe for gadgets. 18-20 - Paul Hyman:
Software helps linguists reconstruct, decipher ancient languages. 21-23 - Sarah Underwood:
The Alan Turing Year leaves a rich legacy. 24-25
- Michael A. Cusumano:
Evaluating a startup venture. 26-29
- Phillip G. Armour:
When faster is slower. 30-32
- George V. Neville-Neil:
The naming of hosts is a difficult matter. 33-34
- Kevin Fu, James Blum:
Controlling for cybersecurity risks of medical device software. 35-37
- David H. Ackley:
Beyond efficiency. 38-40
- Jacob Loveless:
Barbarians at the gateways. 42-49 - Jacob Loveless, Sasha Stoikov, Rolf Waeber:
Online algorithms in high-frequency trading. 50-56 - Stephen D. Strowes:
Passively measuring TCP round-trip times. 57-64
- Floris Bex, John Lawrence, Mark Snaith, Chris Reed:
Implementing the argument web. 66-73 - Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki:
Trends in computer science research. 74-83
- Rodney Van Meter, Clare Horsman:
A blueprint for building a quantum computer. 84-93
- Rajeev Alur:
Can we verify cyber-physical systems?: technical perspective. 96 - Matthias Althoff, Akshay Rajhans, Bruce H. Krogh, Soner Yaldiz, Xin Li, Larry T. Pileggi:
Formal verification of phase-locked loops using reachability analysis and continuization. 97-104
- Brian Clegg:
Future tense. 112-
Volume 56, Number 11, November 2013
- Moshe Y. Vardi:
The end of the American network. 5
- Vinton G. Cerf:
Heidelberg Laureate Forum. 7
- Microprocessor architectures follow markets and silicon. 8-9
- Jason I. Hong:
Considering privacy issues in the context of Google glass. 10-11
- Gregory Mone:
Future-proof encryption. 12-14 - Neil Savage:
More than a mouse. 15-16 - Keith Kirkpatrick:
Legal issues with robots. 17-19
- Deirdre K. Mulligan, Kenneth A. Bamberger:
What regulators can do to advance privacy through design. 20-22
- Pamela Samuelson:
Is software patentable? 23-25
- Katina Michael, Michael G. Michael:
No limits to watching? 26-28
- Marshall W. Van Alstyne:
Why not immortality? 29-31
- Cameron Wilson:
Making computer science count. 32-33
- Tobias Langlotz, Jens Grubert, Raphaël Grasset:
Augmented reality browsers: essential products or only gadgets? 34-36
- James Roche:
Adopting DevOps practices in quality assurance. 38-43 - Neil Mitchell:
Leaking space. 44-52 - Ivar Jacobson, Ian Spence, Pan Wei Ng:
Agile and SEMAT: perfect partners. 53-59
- Neil A. M. Maiden, Sonali D'Souza, Sara Jones, Lars Müller, Lucia Pannese, Kristine Pitts, Michael Prilla, Kevin Pudney, Malcolm Rose, Ian Turner, Konstantinos Zachos:
Computing technologies for reflective, creative care of people with dementia. 60-67 - Evgeny A. Kaganer, Gabriel A. Giordano, Sebastien Brion, Marco Tortoriello:
Media tablets for mobile learning. 68-75
- Philip C. Treleaven, Michal Galas, Vidhi Lalchand:
Algorithmic trading review. 76-85 - Mamadou Tourad Diallo, Hassnaa Moustafa, Hossam Afifi, Nicolas Maréchal:
Adaptation of audiovisual contents and their delivery means. 86-93
- Shekhar Borkar:
Centip3De demonstrates more than Moore...: technical perspective. 96 - Ronald G. Dreslinski, David Fick, Bharan Giridhar, Gyouho Kim, Sangwon Seo, Matthew Fojtik, Sudhir Satpathy, Yoonmyung Lee, Daeyeon Kim, Nurrachman Liu, Michael Wieckowski, Gregory K. Chen, Dennis Sylvester, David T. Blaauw, Trevor N. Mudge:
Centip3De: a many-core prototype exploring 3D integration and near-threshold computing. 97-104
- Peter Winkler:
Puzzled: Coin flipping. 120
Volume 56, Number 12, December 2013
- M. Tamer Özsu:
ACM books to launch. 5
- Vinton G. Cerf:
Software at scale. 7
- Free the digital natives. 8-9
- Mark Guzdial, Valerie Barr:
The lure of live coding; the attraction of small data. 10-11
- Chris Edwards:
Life points the way to a new template for chipmaking. 13-15 - Samuel Greengard:
Seeing the big picture. 16-18 - Karen A. Frenkel:
CS enrollments rise ... at the expense of the humanities? 19-21
- Richard Heeks:
Information technology impact sourcing. 22-25
- David Anderson:
Patrick Blackett: providing 'white heat' to the British computing revolution. 26-28
- Peter J. Denning:
Design thinking. 29-31
- George V. Neville-Neil:
A lesson in resource management. 32-33
- Wendy M. DuBow, Ruthe Farmer, Zhen Wu, Malia Fredrickson:
Bringing young women into computing through the NCWIT Aspirations in Computing program. 34-37
- Armando Fox:
From MOOCs to SPOCs. 38-40
- Ilya Grigorik:
Making the web faster with HTTP 2.0. 42-49 - David Chisnall:
The challenge of cross-language interoperability. 50-56 - Fred Chow:
Intermediate representation. 57-62
- Vasant Dhar:
Data science and prediction. 64-73 - Jonathan Lazar, Harry Hochheiser:
Legal aspects of interface accessibility in the U.S. 74-80
- Doug Terry:
Replicated data consistency explained through baseball. 82-89 - Gareth Tyson, Nishanth Sastry, Rubén Cuevas, Ivica Rimac, Andreas Mauthe:
A survey of mobility in information-centric networks. 90-98
- J. Eliot B. Moss:
The cleanest garbage collection: technical perspective. 100 - David F. Bacon, Perry Cheng, Sunil Shukla:
And then there were none: a stall-free real-time garbage collector for reconfigurable hardware. 101-109
- Peter Winkler:
Puzzled: Solutions and sources. 126 - Leah Hoffmann:
Q&A: Securing the Risk. 128-
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.