default search action
Communications of the ACM, Volume 59
Volume 59, Number 1, January 2016
- Mark R. Nelson:
Focusing on teacher needs in K-12 CS education. 5 - Vinton G. Cerf:
On the road in Latin America. 7
- Let the liable pay. 8-9
- Vinton G. Cerf:
ACM's 2016 general election. 10 - Alexander L. Wolf:
ACM's annual report for FY15. 11-16
- John Arquilla, Joel C. Adams:
Controlling cyber arms, and creating new LEGOs. 18-19
- Neil Savage:
Seeing more clearly. 20-22 - Samuel Greengard:
Better memory. 23-25 - Esther Shein:
Preserving the internet. 26-28 - Gene Amdahl, 1922-2015. 29
- Jonathan T. Weinberg:
Biometric identity. 30-32
- Michael A. Cusumano, David B. Yoffie:
Extrapolating from Moore's law. 33-35
- Phillip G. Armour:
The chaos machine. 36-38
- Thomas Haigh, Mark Priestley:
Where code comes from: architectures of automatic control from Babbage to Algol. 39-44
- Gio Wiederhold:
Unbalanced data leads to obsolete economic advice. 45-46 - Yoav Shoham:
Why knowledge representation matters. 47-49
- George V. Neville-Neil:
Time is an illusion lunchtime doubly so. 50-55 - Pat Helland:
Immutability changes everything. 64-70
- Shashi Shekhar, Steven K. Feiner, Walid G. Aref:
Spatial computing. 72-81 - Esteve Almirall, Jonathan Wareham:
Open data and civic apps: first-generation failures, second-generation improvements. 82-89 - Juliana Sutanto:
The building blocks of a cloud strategy: evidence from three SaaS providers. 90-97
- Ioannis Koutis, Ryan Williams:
Algebraic fingerprints for faster algorithms. 98-105
- Steve Hand:
Technical Perspective: High-performance virtualization: are we done? 107 - Nadav Amit, Abel Gordon, Nadav Har'El, Muli Ben-Yehuda, Alex Landau, Assaf Schuster, Dan Tsafrir:
Bare-metal performance for virtual machines with exitless interrupts. 108-116 - Tova Milo:
Technical Perspective: Enlisting the power of the crowd. 117 - Beth Trushkowsky, Tim Kraska, Michael J. Franklin, Purnamrita Sarkar:
Answering enumeration queries with the crowd. 118-127
- Dennis E. Shasha:
Upstart Puzzles: Ice Trap. 136
Volume 59, Number 2, February 2016
- Moshe Y. Vardi:
The moral hazard of complexity-theoretic assumptions. 5 - Vinton G. Cerf:
Apps and the web. 7
- Expect 'ungoverned actors' to use AI-supported weapons, too. 8-9
- Mark Guzdial:
Drumming up support for AP CS principles. 12-13
- Chris Edwards:
Self-repair techniques point to robots that design themselves. 15-17 - Logan Kugler:
How a supervillain (or a hacker in his basement) could destroy the internet. 18-20 - Tom Geller:
In privacy law, it's the U.S. vs. the world. 21-23 - ACM inducts fellows. 24
- Peter C. Evans, Rahul C. Basole:
Revealing the API ecosystem and enterprise strategy via visual analytics. 26-28
- Carl E. Landwehr:
Privacy research directions. 29-31
- Rick Adrion, Renee Fall, Barbara Ericson, Mark Guzdial:
Broadening access to computing education state by state. 32-34
- George V. Neville-Neil:
Code hoarding. 35-36
- Satish Chandra, Suresh Thummalapenta, Saurabh Sinha:
Lessons from the tech transfer trenches. 37-39 - Herbert Lin:
Having a conversation about bulk surveillance. 40-42
- Ramanathan V. Guha, Dan Brickley, Steve Macbeth:
Schema.org: evolution of structured data on the web. 44-51 - Caitie McCaffrey:
The verification of a distributed system. 52-55 - Nicholas Diakopoulos:
Accountability in algorithmic decision making. 56-62
- Bart Thomee, David A. Shamma, Gerald Friedland, Benjamin Elizalde, Karl Ni, Douglas Poland, Damian Borth, Li-Jia Li:
YFCC100M: the new data in multimedia research. 64-73
- Michael Stonebraker:
The land sharks are on the squawk box. 74-83
- J. P. Shim, Joon Koh, Steven Fister, H. Y. Seo:
Phonetic analytics technology and big data: real-world cases. 84-90
- Daniel Abadi, Rakesh Agrawal, Anastasia Ailamaki, Magdalena Balazinska, Philip A. Bernstein, Michael J. Carey, Surajit Chaudhuri, Jeffrey Dean, AnHai Doan, Michael J. Franklin, Johannes Gehrke, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, H. V. Jagadish, Donald Kossmann, Samuel Madden, Sharad Mehrotra, Tova Milo, Jeffrey F. Naughton, Raghu Ramakrishnan, Volker Markl, Christopher Olston, Beng Chin Ooi, Christopher Ré, Dan Suciu, Michael Stonebraker, Todd Walter, Jennifer Widom:
The Beckman report on database research. 92-99
- Michael Mitzenmacher, Justin Thaler:
Technical Perspective: Catching lies (and mistakes) in offloaded computation. 102 - Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova:
Pinocchio: nearly practical verifiable computation. 103-112 - Sumit Gulwani:
Technical Perspective: Program synthesis using stochastic techniques. 113 - Eric Schkufza, Rahul Sharma, Alex Aiken:
Stochastic program optimization. 114-122
- Ken MacLeod:
Future Tense: Chatterbox. 128-
Volume 59, Number 3, March 2016
- Eugene H. Spafford:
The strength of encryption. 5 - Vinton G. Cerf:
Computer science in the curriculum. 7
- ACM moral imperatives vs. lethal autonomous weapons. 8-9
- Valerie Barr:
The value of Ada. 10-11
- Gregory Goth:
Deep or shallow, NLP is breaking out. 13-16 - Tom Geller:
Rich data, poor fields. 17-18 - Neil Savage:
When computers stand in the schoolhouse door. 19-21 - Peter Naur: 1928-2016. 22-23
- Pamela Samuelson:
New exemptions to anti-circumvention rules. 24-26
- Jeffrey Johnson:
The question of information justice. 27-29
- Peter J. Denning:
Fifty years of operating systems. 30-32
- Tiffany Barnes, George K. Thiruvathukal:
The need for research in broadening participation. 33-34
- Maja Vukovic, Jim Laredo, Vinod Muthusamy, Aleksander Slominski, Roman Vaculín, Wei Tan, Vijay K. Naik, Ignacio Silva-Lepe, Arun Kumar, Biplav Srivastava, Joel W. Branch:
Riding and thriving on the API hype cycle. 35-37 - H. V. Jagadish:
Paper presentation at conferences: time for a reset. 38-39
- David A. Patterson:
An interview with Stanford University president John Hennessy. 40-45
- A purpose-built global network: Google's move to SDN. 46-54
- Kate Matsudaira:
The paradox of autonomy and recognition. 55-57 - Tom Limoncelli:
Automation should be like Iron Man, not Ultron. 58-61
- Christian S. Collberg, Todd A. Proebsting:
Repeatability in computer systems research. 62-69 - Andrew S. Tanenbaum:
Lessons learned from 30 years of MINIX. 70-78 - Antonio De Nicola, Michele Missikoff:
A lightweight methodology for rapid ontology engineering. 79-86
- Boaz Barak:
Hopes, fears, and software obfuscation. 88-96
- John Regehr:
STACKing up undefined behaviors: technical perspective. 98 - Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama:
A differential approach to undefined behavior detection. 99-106 - David A. Forsyth:
Taming the name game: technical perspective. 107 - Vicente Ordonez, Wei Liu, Jia Deng, Yejin Choi, Alexander C. Berg, Tamara L. Berg:
Learning to name objects. 108-115
- Leah Hoffmann:
Q&A. 120-
Volume 59, Number 4, April 2016
- Moshe Y. Vardi:
Are we headed toward another global tech bust? 5 - Vinton G. Cerf, Maggie Johnson:
Enrollments explode! but diversity students are leaving... 7
- Chaos is no catastrophe. 8-9
- Mark Guzdial, John Arquilla:
Sampling bias in CS education, and where's the cyber strategy? 10-11
- Chris Edwards:
Automating proofs. 13-15 - Keith Kirkpatrick:
Existing technologies can assist the disabled. 16-18 - Gary Anthes:
Search engine agendas. 19-21 - Lawrence M. Fisher:
Marvin Minsky: 1927-2016. 22-24 - Lawrence M. Fisher:
A decade of ACM efforts contribute to computer science for all. 25-27
- Kentaro Toyama:
The internet and inequality. 28-30
- George V. Neville-Neil:
GNL is not Linux. 31-32
- Mari Sako:
The need for corporate diplomacy. 33-35
- Manuel Cebrián, Iyad Rahwan, Alex Pentland:
Beyond viral. 36-39
- Poul-Henning Kamp:
More encryption means less privacy. 40-42 - Carlos Baquero, Nuno M. Preguiça:
Why logical clocks are easy. 43-47 - Thomas A. Limoncelli:
How SysAdmins devalue themselves. 48-49
- Palash Bera:
How colors in business dashboards affect users' decision making. 50-57 - Mikhail I. Gofman, Sinjini Mitra:
Multimodal biometrics for enhanced mobile device security. 58-65
- Alberto Apostolico, Maxime Crochemore, Martin Farach-Colton, Zvi Galil, S. Muthukrishnan:
40 years of suffix trees. 66-73
- David A. Wagner:
Fairness and the coin flip: technical perspective. 75 - Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek:
Secure multiparty computations on Bitcoin. 76-84 - Emin Gün Sirer:
The state (and security) of the Bitcoin economy: technical perspective. 85 - Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of Bitcoins: characterizing payments among men with no names. 86-93
- Dennis E. Shasha:
Upstart puzzles. 96
Volume 59, Number 5, May 2016
- Moshe Y. Vardi:
The moral imperative of artificial intelligence. 5 - Vinton G. Cerf:
The IANA transition. 7
- Why All Writs is a trojan horse. 8-9
- ACM's 2016 general election: please take this opportunity to vote. 11-22
- Mark Guzdial:
Bringing computer science to U.S. schools, state by state. 24-25
- Don Monroe:
Silicon photonics: ready to go the distance? 26-28 - Samuel Greengard:
Cybersecurity gets smart. 29-31 - Keith Kirkpatrick:
Coding as sport. 32-33
- Jason Schultz:
The internet of things we don't own? 36-38
- R. Benjamin Shapiro, Matthew P. Ahrens:
Beyond blocks: syntax and semantics. 39-41
- Wen Wen, Chris Forman:
Do patent commons and standards-setting organizations help navigate patent thickets? 42-43
- David P. Anderson:
Preserving hybrid objects. 44-46
- Steffen Wendzel:
How to increase the security of smart buildings? 47-49
- Brendan Burns, Brian Grant, David Oppenheimer, Eric A. Brewer, John Wilkes:
Borg, Omega, and Kubernetes. 50-57 - Kate Matsudaira:
Delegation as art. 58-60 - Ivar Jacobson:
Use-case 2.0. 61-69
- Stephen M. Casner, Edwin L. Hutchins, Don Norman:
The challenges of partially automated driving. 70-77 - Andrew Lenharth, Donald Nguyen, Keshav Pingali:
Parallel graph analytics. 78-87 - Hanan Samet, Sarana Nutanong, Brendan C. Fruin:
Static presentation consistency issues in smartphone mapping apps. 88-98
- Mason Bretan, Gil Weinberg:
A survey of robotic musicianship. 100-109
- Boaz Barak:
A breakthrough in software obfuscation: technical perspective. 112 - Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Hiding secrets in software: a cryptographic approach to program obfuscation. 113-120 - Gail C. Murphy:
Software is natural: technical perspective. 121 - Abram Hindle, Earl T. Barr, Mark Gabel, Zhendong Su, Premkumar T. Devanbu:
On the naturalness of software. 122-131
- Louis Friedman:
Future tense. 136-
Volume 59, Number 6, June 2016
- Alexander L. Wolf:
Moving forward. 5 - Vinton G. Cerf:
Celebrations! 7
- No backdoor required or expected. 8-9
- John Langford, Mark Guzdial:
The solution to AI, what real researchers do, and expectations for CS classrooms. 10-11
- Neil Savage:
The key to privacy. 12-14 - Logan Kugler:
What happens when big data blunders? 15-16 - Alex Wright:
Reimagining search. 17-19 - Gregory Mone:
What's next for digital humanities? 20-21
- Rebecca T. Mercuri, Peter G. Neumann:
The risks of self-auditing systems. 22-25
- George V. Neville-Neil:
What are you trying to pull? 26-27
- Peter J. Denning:
How to produce innovations. 28-30
- Derek Chiou:
An interview with Yale Patt. 31-36
- Boaz Barak:
Computer science should stay young. 37-38 - Jean-Pierre Hubaux, Ari Juels:
Privacy is dead, long live privacy. 39-41 - Ankita Mitra:
A byte is all we need. 42-44
- Kate Matsudaira:
Nine things I didn't know I would learn being an engineer manager. 45-47 - Brendan Gregg:
The flame graph. 48-57 - Pat Helland:
Standing on distributed shoulders of giants. 58-61
- Brad A. Myers, Jeffrey Stylos:
Improving API usability. 62-69 - Daniel Genkin, Lev Pachmanov, Itamar Pipman, Adi Shamir, Eran Tromer:
Physical key extraction attacks on PCs. 70-79
- Petros Drineas, Michael W. Mahoney:
RandNLA: randomized numerical linear algebra. 80-90
- Koushik Sen:
Technical Perspective: Veritesting tackles path-explosion problem. 92 - Thanassis Avgerinos, Alexandre Rebert, Sang Kil Cha, David Brumley:
Enhancing symbolic execution with veritesting. 93-100 - Siddharth Suri:
Technical Perspective: Computing with the crowd. 101 - Daniel W. Barowy, Charlie Curtsinger, Emery D. Berger, Andrew McGregor:
AutoMan: a platform for integrating human-based and digital computation. 102-109
- Leah Hoffmann:
Q&A: Finding New Directions in Cryptography. 112-
Volume 59, Number 7, July 2016
- Moshe Y. Vardi:
The ritual of academic-unit review. 5 - Vinton G. Cerf:
The power of big ideas. 7
- Rethinking computational thinking. 8
- Jeannette M. Wing, Dan Stanzione:
Progress in computational thinking, and expanding the HPC community. 10-11
- Neil Savage:
Graph matching in theory and practice. 12-14 - Marina Krakovsky:
Accelerating search. 15-16 - Lawrence M. Fisher:
Booming enrollments. 17-18 - Keith Kirkpatrick:
Legal advice on the smartphone. 19-21
- Pamela Samuelson:
Apple v. Samsung and the upcoming design patent wars? 22-24
- Thomas Haigh:
How Charles Bachman invented the DBMS, a foundation of our digital world. 25-30
- Jacob Metcalf:
Big data analytics and revision of the common rule. 31-33
- Toby Walsh:
Turing's red flag. 34-37 - Yuri Gurevich, Jeannette M. Wing:
Inverse privacy. 38-42
- Sachin Date:
Should you upload or ship big data to the cloud? 44-51 - Thomas A. Limoncelli:
The small batches principle. 52-57 - Heinrich Hartmann:
Statistics for engineers. 58-66
- Abhik Roychoudhury, Satish Chandra:
Formula-based software debugging. 68-77 - Josh Levenberg:
Why Google stores billions of lines of code in a single repository. 78-87 - Gill Barequet, Günter Rote, Mira Shalah:
λ > 4: an improved lower bound on the growth constant of polyominoes. 88-95
- Emilio Ferrara, Onur Varol, Clayton A. Davis, Filippo Menczer, Alessandro Flammini:
The rise of social bots. 96-104
- Henry A. Kautz, Parag Singla:
Technical Perspective: Combining logic and probability. 106 - Vibhav Gogate, Pedro M. Domingos:
Probabilistic theorem proving. 107-115 - Sam Madden:
Technical Perspective: Mesa takes data warehousing to new heights. 116 - Ashish Gupta, Fan Yang, Jason Govig, Adam Kirsch, Kelvin Chan, Kevin Lai, Shuo Wu, Sandeep Govind Dhoot, Abhilash Rajesh Kumar, Ankur Agiwal, Sanjay Bhansali, Mingsheng Hong, Jamie Cameron, Masood Siddiqi, David Jones, Jeff Shute, Andrey Gubarev, Shivakumar Venkataraman, Divyakant Agrawal:
Mesa: a geo-replicated online data warehouse for Google's advertising system. 117-125
- Dennis E. Shasha:
Upstart Puzzles: Chair Games. 128
Volume 59, Number 8, August 2016
- Vicki L. Hanson:
From the new ACM president. 5 - Vinton G. Cerf:
Star struck in Lindau. 7
- Future cyberdefenses will defeat cyberattacks on PCs. 8-9
- Jason I. Hong:
Inside the great wall. 10-11
- Marina Krakovsky:
Reinforcement renaissance. 12-14 - Gary Anthes:
Open source software no longer optional. 15-17 - Logan Kugler:
Smartphone apps for social good. 18-20
- Paul Kocher:
Computer security is broken: can better hardware help fix it? 22-25
- Yasmin B. Kafai:
From computational thinking to computational participation in K-12 education. 26-27
- George V. Neville-Neil:
Chilling the messenger. 28-29
- Ben Shneiderman:
Teamwork in computing research. 30-31
- Ivan Beschastnikh, Patty Wang, Yuriy Brun, Michael D. Ernst:
Debugging distributed systems. 32-37 - Pat Helland:
The singular success of SQL. 38-41 - Tom Killalea:
The hidden dividends of microservices. 42-45
- Rida Khatoun, Sherali Zeadally:
Smart cities: concepts, architectures, research opportunities. 46-57 - Stephanie Forrest, Melanie Mitchell:
Adaptive computation: the multidisciplinary legacy of John H. Holland. 58-63 - Leon A. Kappelman, Mary C. Jones, Vess Johnson, Ephraim R. McLean:
Skills for success at different stages of an IT professional's career. 64-70
- Bonnie Berger, Noah M. Daniels:
Computational biology in the 21st century: scaling with compressive algorithms. 72-80
- Todd D. Millstein:
Technical Perspective: Toward reliable programming for unreliable hardware. 82 - Michael Carbin, Sasa Misailovic, Martin C. Rinard:
Verifying quantitative reliability for programs that execute on unreliable hardware. 83-91 - Philip Wadler:
Technical Perspective: Why didn't I think of that? 92 - Adam Chlipala:
Ur/Web: a simple model for programming the web. 93-100
- Ken MacLeod:
Future Tense: Gut Feelings. 104-
Volume 59, Number 9, September 2016
- Moshe Y. Vardi:
Academic rankings considered harmful! 5 - Vinton G. Cerf:
Keeping the internet open. 7
- Election auditing and verifiability. 8-9
- Chris Edwards:
Reconciling quantum physics with math. 11-13 - Samuel Greengard:
GPUs reshape computing. 14-16 - Gregory Mone:
The edge of the uncanny. 17-19
- Felix Wu:
No easy answers in the fight over iPhone decryption. 20-22
- Peter J. Denning:
Software quality. 23-25
- Richard E. Ladner, Maya Israel:
"For all" in "computer science for all". 26-28
- Amitai Etzioni, Oren Etzioni:
Designing AI systems that obey our laws and values. 29-31 - Ethan Katz-Bassett, Justine Sherry, Te-Yuan Huang, Maria A. Kazandjieva, Craig Partridge, Fahad R. Dogar:
Helping conference attendees better understand research presentations. 32-34 - Abraham Bernstein, James A. Hendler, Natalya Fridman Noy:
A new look at the semantic web. 35-37
- Peter Bailis, Simon Peter, Justine Sherry:
Introducing research for practice. 38-41 - Kate Matsudaira:
Bad software architecture is a people problem. 42-43 - Thomas A. Limoncelli:
10 optimizations on linear search. 44-48
- Peter Buneman, Susan B. Davidson, James Frew:
Why data citation is a computational problem. 50-57 - Hanan Samet, Sarana Nutanong, Brendan C. Fruin:
Dynamic presentation consistency issues in smartphone mapping apps. 58-67
- Percy Liang:
Learning executable semantic parsers for natural language understanding. 68-76
- Kyros Kutulakos:
Technical Perspective: The dawn of computational light transport. 78 - Andreas Velten, Di Wu, Belén Masiá, Adrián Jarabo, Christopher Barsi, Chinmaya Joshi, Everett Lawson, Moungi Bawendi, Diego Gutierrez, Ramesh Raskar:
Imaging the propagation of light through scenes at picosecond resolution. 79-86 - Andrew W. Moore:
Technical Perspective: Jupiter rising. 87 - Arjun Singh, Joon Ong, Amit Agarwal, Glen Anderson, Ashby Armistead, Roy Bannon, Seb Boving, Gaurav Desai, Bob Felderman, Paulie Germano, Anand Kanagala, Hong Liu, Jeff Provost, Jason Simmons, Eiichi Tanda, Jim Wanderer, Urs Hölzle, Stephen Stuart, Amin Vahdat:
Jupiter rising: a decade of clos topologies and centralized control in Google's datacenter network. 88-97
- Leah Hoffmann:
Q&A: Hello, Underworld. 104-
Volume 59, Number 10, October 2016
- Ronald F. Boisvert:
Incentivizing reproducibility. 5 - Vinton G. Cerf:
'We're going backward!'. 7
- Perry R. Cook:
Adding art to STEM. 8-9
- Don Monroe:
Optical fibers getting full. 10-12 - Marina Krakovsky:
Bringing holography to light. 13-15 - Keith Kirkpatrick:
Battling algorithmic bias: how do we ensure algorithms treat us fairly? 16-17
- Michael A. Cusumano:
The puzzle of Japanese innovation and entrepreneurship. 18-20
- Michael L. Best:
Mobile computing and political transformation. 21-23
- George V. Neville-Neil:
Cloud calipers. 24-25
- Peter G. Neumann:
Risks of automation: a cautionary total-system perspective of our cyberfuture. 26-30
- Kathrin Conrad, Nysret Musliu, Reinhard Pichler, Hannes Werthner:
Universities and computer science in the European crisis of refugees. 31-33
- Ulan Degenbaev, Jochen Eisinger, Manfred Ernst, Ross McIlroy, Hannes Payer:
Idle-time garbage-collection scheduling. 34-39 - Kate Matsudaira:
Fresh starts. 40-41 - André Medeiros:
Dynamics of change: why reactivity matters. 42-46
- Robert Lychev, Michael Schapira, Sharon Goldberg:
Rethinking security for internet routing. 48-57 - Craig Partridge, Mark Allman:
Ethical considerations in network measurement papers. 58-64
- A. J. Burns, M. Eric Johnson, Peter Honeyman:
A brief chronology of medical device security. 66-72
- Johannes Gehrke:
Technical Perspective: Naiad. 74 - Derek Gordon Murray, Frank McSherry, Michael Isard, Rebecca Isaacs, Paul Barham, Martín Abadi:
Incremental, iterative data processing with timely dataflow. 75-83 - James R. Larus:
Technical Perspective: The power of parallelizing computations. 84 - Saeed Maleki, Madanlal Musuvathi, Todd Mytkowicz:
Efficient parallelization using rank convergence in dynamic programming algorithms. 85-92
- Dennis E. Shasha:
Find me quickly. 96
Volume 59, Number 11, November 2016
- Moshe Y. Vardi:
Globalization, computing, and their political impact. 5 - Vinton G. Cerf:
Heidelberg anew. 7
- Learn to live with academic rankings. 8-9
- Valerie Barr, Mark Guzdial:
Introducing CS to newcomers, and JES as a teaching tool. 10-11
- Erica Klarreich:
Learning securely. 12-14 - Sarah Underwood:
Blockchain beyond bitcoin. 15-17 - Tom Geller:
Farm automation gets smarter. 18-19
- Roger R. Schell:
Cyber defense triad for where security matters. 20-23
- Pamela Samuelson:
Fair use prevails in Oracle v. Google. 24-28
- Bala Iyer, Rahul C. Basole:
Visualization to understand ecosystems. 27-30
- Mark Guzdial, Briana B. Morrison:
Growing computer science education into a STEM education discipline. 31-33
- B. Jack Copeland, Eli Dresner, Diane Proudfoot, Oron Shagrir:
Time to reinspect the foundations? 34-38 - Jonathan Grudin:
Technology and academic lives. 37-39
- Pat Helland:
The power of babble. 40-43 - Adam Morrison:
Scaling synchronization in multicore programs. 44-51 - Peter Bailis, Joy Arulraj, Andrew Pavlo:
Research for practice: distributed consensus and implications of NVM on database management systems. 52-55
- Matei Zaharia, Reynold S. Xin, Patrick Wendell, Tathagata Das, Michael Armbrust, Ankur Dave, Xiangrui Meng, Josh Rosen, Shivaram Venkataraman, Michael J. Franklin, Ali Ghodsi, Joseph Gonzalez, Scott Shenker, Ion Stoica:
Apache Spark: a unified engine for big data processing. 56-65 - Dinei Florêncio, Cormac Herley, Paul C. van Oorschot:
Pushing on string: the 'don't care' region of password strength. 66-74 - Enrico Bozzo, Massimo Franceschet:
A theory on power in networks. 75-83
- Adi Livnat, Christos H. Papadimitriou:
Sex as an algorithm: the theory of evolution under the lens of computation. 84-93 - Dietmar Jannach, Paul Resnick, Alexander Tuzhilin, Markus Zanker:
Recommender systems - : beyond matrix completion. 94-102
- Kurt Keutzer:
If I could only design one circuit ...: technical perspective. 104 - Yunji Chen, Tianshi Chen, Zhiwei Xu, Ninghui Sun, Olivier Temam:
DianNao family: energy-efficient hardware accelerators for machine learning. 105-112 - James C. Hoe:
FPGA compute acceleration is first about energy efficiency: technical perspective. 113 - Andrew Putnam, Adrian M. Caulfield, Eric S. Chung, Derek Chiou, Kypros Constantinides, John Demme, Hadi Esmaeilzadeh, Jeremy Fowers, Gopi Prashanth Gopal, Jan Gray, Michael Haselman, Scott Hauck, Stephen Heil, Amir Hormati, Joo-Young Kim, Sitaram Lanka, James R. Larus, Eric Peterson, Simon Pope, Aaron Smith, Jason Thong, Phillip Yi Xiao, Doug Burger:
A reconfigurable fabric for accelerating large-scale datacenter services. 114-122
- Brian Clegg:
The candidate. 136-
Volume 59, Number 12, December 2016
- Marty J. Wolf:
The ACM code of ethics: a call to action. 6 - Bo Brinkman, Don Gotterbarn, Keith W. Miller, Marty J. Wolf:
Making a positive impact: updating the ACM code of ethics. 7-13 - Vinton G. Cerf:
When email isn't private. 15
- Reclaim the lost promise of the semantic web. 17
- Mark Guzdial, Daniel Reed:
ICER 2016, and Star Trek at 50. 18-19
- Samuel Greengard:
Cracking the code on biology. 21-23 - Chris Edwards:
Containers push toward the mayfly server. 24-26 - Keith Kirkpatrick:
Can we trust autonomous weapons? 27-29
- Peter J. Denning, Gloria Flores:
Learning to learn. 32-36
- David P. Anderson:
Nailing smoke. 37-39
- Yan Chen:
Mentoring female assistant professors enhances their success. 40-42
- Orit Hazzan, Jeff Kramer:
Assessing abstraction skills. 43-45 - Jesper Larsson Träff:
(Mis)managing parallel computing research through EU project funding. 46-48
- Marius Eriksen:
Functional at scale. 50-55 - React: Facebook's functional turn on writing Javascript. 56-62
- Ivar Jacobson, Ian Spence, Ed Seidewitz:
Industrial-scale agile: from craft to engineering. 63-71
- Anders Ynnerman, Thomas Rydell, Daniel Antoine, David Hughes, Anders Persson, Patric Ljung:
Interactive visualization of 3d scanned mummies at public venues. 72-81 - Mark Sagar, Mike Seymour, Annette Henderson:
Creating connection with autonomous facial animation. 82-91
- Katie Shilton, Jeffrey A. Burke, Kimberly C. Claffy, Lixia Zhang:
Anticipating policy and social implications of named data networking. 92-101 - Yiling Chen, Arpita Ghosh, Michael J. Kearns, Tim Roughgarden, Jennifer Wortman Vaughan:
Mathematical foundations for social computing. 102-108
- Srinivasan Keshav:
Technical Perspective: The chemistry of software-defined batteries. 110 - Anirudh Badam, Ranveer Chandra, Jon Dutra, Anthony Ferrese, Steve Hodges, Pan Hu, Julia Meinershagen, Thomas Moscibroda, Bodhi Priyantha, Evangelia D. Skiani:
Software-defined batteries. 111-119 - Takeo Igarashi:
Technical Perspective: 3D image editing made easy. 120 - Tao Chen, Zhe Zhu, Shi-Min Hu, Daniel Cohen-Or, Ariel Shamir:
Extracting 3D objects from photographs using 3-sweep. 121-129
- Leah Hoffmann:
A view to the future. 144, 143
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.