default search action
Communications of the ACM, Volume 63
Volume 63, Number 1, January 2020
- Andrew A. Chien:
Cracks in open collaboration in universities. 5
- Moshe Y. Vardi:
Publish and perish. 7
- Bertrand Meyer:
In search of the shortest possible schedule. 8-9
- Erica Klarreich:
Multiplication hits the speed limit. 11-13 - Logan Kugler:
How the internet spans the globe. 14-16 - Samuel Greengard:
Will deepfakes do deep damage? 17-19
- Elizabeth E. Joh:
Increasing automation in policing. 20-22
- Michael A. Cusumano:
'Platformizing' a bad business does not make it a good business. 23-25
- Thomas Haigh, Mark Priestley:
von Neumann thought Turing's universal machine was 'simple and neat.': but that didn't tell him how to design a computer. 26-32
- Johannes Himmelreich:
Ethics of technology needs more political philosophy. 33-35 - James W. Davis, Jeff Hachtel:
A* search: what's in a name? 36-37
- Sanjay Sha:
The reliability of enterprise applications. 38-45 - Scott Ruoti, Ben Kaiser, Arkady Yerukhimovich, Jeremy Clark, Robert K. Cunningham:
Blockchain technology: what is it good for? 46-53 - Pat Helland:
Space time discontinuum. 54-56
- Saurabh Bagchi, Muhammad-Bilal Siddiqui, Paul Wood, Heng Zhang:
Dependability in edge computing. 58-66
- Mengnan Du, Ninghao Liu, Xia Hu:
Techniques for interpretable machine learning. 68-77 - Sergio Rajsbaum, Michel Raynal:
Mastering concurrent computing through sequential thinking. 78-87
- Mark Guzdial:
Technical perspective: Is there a geek gene? 90 - Elizabeth Patitsas, Jesse Berlin, Michelle Craig, Steve Easterbrook:
Evidence that computer science grades are not bimodal. 91-98
- Dennis E. Shasha:
Feedback for foxes.
Volume 63, Number 2, February 2020
- Cherri M. Pancake:
Start small, then achieve big impact. 5
- Vinton G. Cerf:
On durability. 7
- Mark Guzdial:
Sizing the U.S. student cohort for computer science. 10-11
- Chris Edwards:
Learning to trust quantum computers. 13-15 - Paul Marks:
Dark web's doppelgängers aim to dupe antifraud systems. 16-18 - Keith Kirkpatrick:
Tracking shoppers. 19-21
- Carlos Iglesias, Dhanaraj Thakur, Michael L. Best:
Are we losing momentum? 22-24
- Nancy Leveson:
Are you sure your software will not kill anyone? 25-28
- George V. Neville-Neil:
Numbers are for computers, strings are for humans. 29-30
- Yen-Chia Hsu, Illah R. Nourbakhsh:
When human-computer interaction meets community citizen science. 31-34 - Clif Kussmaul:
Guiding students to develop essential skills. 35-37
- Jessie Frazelle:
Opening up the baseboard management controller. 38-40 - Matt Godbolt:
Optimizations in C++ compilers. 41-49
- Ricardo Bianchini, Marcus Fontoura, Eli Cortez, Anand Bonde, Alexandre Muzio, Ana-Maria Constantin, Thomas Moscibroda, Gabriel Magalhães, Girish Bablani, Mark Russinovich:
Toward ML-centric cloud platforms. 50-59 - Thomas Olsson, Jukka Huhtamäki, Hannu Kärkkäinen:
Directions for professional social matching systems. 60-69
- Patrice Godefroid:
Fuzzing: hack, art, and science. 70-76
- Marco Gruteser:
Lighting the way to visual privacy: technical perspective. 80 - Shilin Zhu, Chi Zhang, Xinyu Zhang:
Automating visual privacy protection using a smart LED. 81-89
- Leah Hoffmann:
'Everything fails all the time'.
Volume 63, Number 3, March 2020
- Moshe Y. Vardi:
Advancing computing as a science and profession: but to what end? 5
- CACM Staff:
Conferences and carbon impact. 6-7
- Robin K. Hill:
Coding for voting. 8-9
- Samuel Greengard:
Can nanosheet transistors keep Moore's law alive? 10-12 - Don Monroe:
Algorithms to harvest the wind. 13-14 - Keith Kirkpatrick:
Across the language barrier. 15-17
- Michael Lachney, Aman Yadav:
Computing and community in formal education. 18-21
- Peter J. Denning, Dorothy E. Denning:
Dilemmas of artificial intelligence. 22-24
- Omer Reingold:
Through the lens of a passionate theoretician. 25-27 - Kieron O'Hara, Wendy Hall:
Four internets. 28-30 - Marc C. Canellas, Rachel A. Haga:
Unsafe at any level. 31-34 - Benjamin C. Pierce, Michael Hicks, Cristina V. Lopes, Jens Palsberg:
Conferences in an era of expensive carbon. 35-37
- Jessie Frazelle:
Securing the boot process. 38-42 - Richard I. Cook:
Above the line, below the line. 43-46
- Edmond Awad, Sohan Dsouza, Jean-François Bonnefon, Azim Shariff, Iyad Rahwan:
Crowdsourcing moral machines. 48-55 - Darja Smite, Nils Brede Moe, Marcin Floryan, Georgiana Levinta, Panagiota Chatzipetrou:
Spotify guilds. 56-61 - Jonny Austin, Howard Baker, Thomas Ball, James Devine, Joe Finney, Peli de Halleux, Steve Hodges, Michal Moskal, Gareth Stockdale:
The BBC micro: bit: from the U.K. to the world. 62-69
- Ohad Fried, Jennifer Jacobs, Adam Finkelstein, Maneesh Agrawala:
Editing self-image. 70-79 - Jörg Kienzle, Gunter Mussbacher, Benoît Combemale, Lucy Bastin, Nelly Bencomo, Jean-Michel Bruel, Christoph Becker, Stefanie Betz, Ruzanna Chitchyan, Betty H. C. Cheng, Sonja Klingert, Richard F. Paige, Birgit Penzenstadler, Norbert Seyff, Eugene Syriani, Colin C. Venters:
Toward model-driven sustainability evaluation. 80-91
- Rebecca Isaacs:
Technical perspective: A perspective on pivot tracing. 93 - Jonathan Mace, Ryan Roelke, Rodrigo Fonseca:
Pivot tracing: dynamic causal monitoring for distributed systems. 94-102
- Dennis E. Shasha:
Stopping tyranny.
Volume 63, Number 4, April 2020
Last byte
- Leah Hoffmann:
Reinventing virtual machines. - Cherri M. Pancake:
New ways to think about CS education. 5
- Vinton G. Cerf:
Multisensory adventures. 7
- CACM Staff:
Adding more color to patch picture. 9 - Mark Guzdial:
Teaching teachers to offer STEM to undergrads. 10-11
- Gary Anthes:
Dead languages come to life. 13-15 - Gregory Mone:
Machine learning, meet whiskey. 16-17 - Esther Shein:
How universities deploy student data. 18-20
- Alan Rubel, Kyle M. L. Jones:
The temptation of data-enabled surveillance. 22-24
- Mari Sako:
Artificial intelligence and the future of professional work. 25-27
- George V. Neville-Neil:
Master of tickets. 28-29
- Gaurav Banga:
Why is cybersecurity not a human-scale problem anymore? 30-34 - Audrey Girouard, Jon E. Froehlich, Regan L. Mandryk, Mark Hancock:
Organizing family support services at ACM conferences. 35-38 - Jerrold M. Grochow:
A taxonomy of automated assistants. 39-41
- Sue Moon, Ann E. Nicholson, Abhik Roychoudhury:
Welcome. 44-46
- Ken-ichi Kawarabayashi:
The NII Shonan meeting in Japan. 48-49 - Sally Jo Cunningham, Fariz Darari, Adila Krisnadhi, Annika Hinze:
Capturing cultural heritage in East Asia and Oceania. 50-52 - Carsten Rudolph, Sadie Creese, Sameer Sharma:
Cybersecurity in Pacific Island nations. 53-54 - Karen Teh, Vivy Suhendra, Soon Chia Lim, Abhik Roychoudhury:
Singapore's cybersecurity ecosystem. 55-57 - Thomas Ho Chee Tat, George Loh Chee Ping:
Innovating services and digital economy in Singapore. 58-59
- Sintia Teddy-Ang, Abigail Toh:
AI Singapore: empowering a smart nation. 60-63 - Lam Kwok Yan, Campbell Wilson:
Developing AI for law enforcement in Singapore and Australia. 62 - Chris Bain, Abraham Oshni Alvandi:
Digital healthcare across Oceania. 64-67 - Meeyoung Cha, Wei Gao, Cheng-Te Li:
Detecting fake news in social media: an Asia-Pacific perspective. 68-71 - Gernot Heiser, Gerwin Klein, June Andronick:
seL4 in Australia: from research to real-world trustworthy systems. 72-75 - Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. 76-81 - Dong Ku Kim, Hyeonwoo Lee, Seong-Choon Lee, Sunwoo Lee:
5G commercialization and trials in Korea. 82-85 - Sang Kil Cha, Zhenkai Liang:
Asia's surging interest in binary analysis. 86-88
- Laura M. D. Maguire:
Managing the hidden costs of coordination. 90-96 - Marisa R. Grayson:
Cognitive work of hypothesis exploration during anomaly response. 97-103
- Daniel W. Woods, Tyler Moore:
Cyber warranties: market fix or marketing trick? 104-107
- Herbert E. Bruderer:
The Antikythera mechanism. 108-115
- Ariel D. Procaccia:
An answer to fair division's most enigmatic question: technical perspective. 118 - Haris Aziz, Simon Mackenzie:
A bounded and envy-free cake cutting algorithm. 119-126
Volume 63, Number 5, May 2020
- Cherri M. Pancake:
How ACM is adapting in this period of global uncertainties. 5
- Jodi L. Tims:
Partnerships can help drive gender equality. 7 - Moshe Y. Vardi:
Efficiency vs. resilience: what COVID-19 teaches computing. 9
- Gerald Segal:
ACM's 2020 general election. 11-21
- Andrew A. Chien:
Launching a new feature in Communications. 22 - Arquimedes Canedo:
Automating automation: CS at the heart of the manufacturing economy. 23
- Mark Guzdial, Jiajie Zhang:
Teaching CS humbly, and watching the AI revolution. 24-25
- Don Monroe:
A proof from 'the book'. 27-29 - Samuel Greengard:
Will RISC-V revolutionize computing? 30-32 - Keith Kirkpatrick:
Deceiving the masses on social media. 33-35
- C. Scott Hemphill:
What role for antitrust in regulating platforms? 36-38
- Adam Shostack, Mary Ellen Zurko:
Secure development tools and techniques need more research that will increase their impact and effectiveness in practice. 39-41
- Mike Tissenbaum, Anne T. Ottenbreit-Leftwich:
A vision of K - : 12 computer science education for 2030. 42-44
- Aaron Hertzmann:
Computers do not make art, people do. 45-48 - Calvin C. Newport:
When technology goes awry. 49-52
- Jack W. Davidson, Joseph A. Konstan, Scott E. Delman:
ACM publications finances. 53-57
- J. Paul Reed:
Beyond the 'fix-it' treadmill. 58-63 - David D. Woods, John Allspaw:
Revealing the critical role of human performance in software. 64-67
- Stephen B. Wicker, Dipayan P. Ghosh:
Reading in the panopticon - : your kindle may be spying on you, but you can't be sure. 68-73 - Sandra Mattauch, Katja Lohmann, Frank Hannig, Daniel Lohmann, Jürgen Teich:
A bibliometric approach for detecting the gender gap in computer science. 74-80
- Alexandra Chouldechova, Aaron Roth:
A snapshot of the frontiers of fairness in machine learning. 82-89 - Hagit Attiya, Sergio Rajsbaum:
Indistinguishability. 90-99
- Geoffrey M. Voelker:
Technical perspective: Fake 'likes' and targeting collusion networks. 102 - Shehroze Farooqi, Fareed Zaffar, Nektarios Leontiadis, Zubair Shafiq:
Measuring and mitigating OAuth access token abuse by collusion networks. 103-111
- Dennis E. Shasha:
Optimal chimes. 112
Volume 63, Number 6, June 2020
- Andrew A. Chien:
What do DDT and computing have in common? 5-6
- CACM Staff:
Safety proposal points in same direction. 6
- Vinton G. Cerf:
Implications of the COVID-19 pandemic. 7
- Terrence DeFranco, Jeremy Roschelle:
Detecting/preventing infections, and moving instruction online. 8-9
- Neil Savage:
An animating spirit. 10-12 - Chris Edwards:
Leveraging unlabeled data. 13-14 - Neil Savage:
Seeing through walls. 15-16 - Esther Shein:
Hiring from the autism spectrum. 17-19
- Connor Bolton, Kevin Fu, Josiah D. Hester, Jun Han:
How to curtail oversensing in the home. 20-24
- George V. Neville-Neil:
Kode vicious plays in traffic. 25-26
- Peter J. Denning, Ted G. Lewis:
Technology adoption. 27-29
- Janet Siegmund, Norman Peitek, André Brechmann, Chris Parnin, Sven Apel:
Studying programming in the neuroage: just a crazy idea? 30-34 - Meredith Ringel Morris:
AI and accessibility. 35-37
- Jessie Frazelle:
Commit to memory. 38-41 - Thomas A. Limoncelli:
Communicate using the numbers 1, 2, 3, and more. 42-44
- Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Raoul Strackx:
Meltdown: reading kernel memory from user space. 46-56 - Alan Borning, Batya Friedman, Nick Logler:
The 'invisible' materiality of information technology. 57-64
- Noah A. Smith:
Contextual word representations: putting words into computers. 66-74 - Max Mühlhäuser, Christian Meurisch, Michael Stein, Jörg Daubert, Julius von Willich, Jan Riemann, Lin Wang:
Street lamps as a platform. 75-83
- Avrim Blum:
Technical perspective: Algorithm selection as a learning problem. 86 - Rishi Gupta, Tim Roughgarden:
Data-driven algorithm design. 87-94
- Leah Hoffmann:
Attaining the third dimension.
Volume 63, Number 7, July 2020
- Moshe Y. Vardi:
A computational lens on economics. 5 - Yosuke Ozawa:
Challenge yourself by reaching for the highest bar. 7
- CACM Staff:
Computing's role in climate warming. 9
- John Arquilla, Mark Guzdial:
Transitioning to distance learning and virtual conferencing. 10-11
- Gregory Mone:
The quantum threat. 12-14 - Neil Savage:
Your wish is my CMD. 15-16 - Keith Kirkpatrick:
Reducing and eliminating e-waste. 17-19
- Pamela Samuelson:
AI authorship? 20-22
- Marshall W. Van Alstyne:
Proposal: a market for truth to address false ads on social media. 23-25
- Kathleen H. Pine, Margaret M. Hinrichs, Jieshu Wang, Dana M. Lewis, Erik Johnston:
For impactful community engagement: check your role. 26-28
- Allison Stanger:
Consumers vs. citizens in democracy's public sphere. 29-31 - Brian Subirana:
Call for a wake standard for artificial intelligence. 32-35
- Pat Helland:
The best place to build a subway. 36-39 - Jeremy Clark, Didem Demirag, Seyedehmahsa Moosavi:
Demystifying stablecoins. 40-46
- William J. Dally, Yatish Turakhia, Song Han:
Domain-specific hardware accelerators. 48-57 - Victoria Stodden:
The data science life cycle: a disciplined approach to advancing data science as a science. 58-66 - Norman P. Jouppi, Doe Hyun Yoon, George Kurian, Sheng Li, Nishant Patil, James Laudon, Cliff Young, David A. Patterson:
A domain-specific supercomputer for training deep neural networks. 67-78
- Christian Catalini, Joshua S. Gans:
Some simple economics of the blockchain. 80-90
- Mark D. Hill:
Technical perspective: Why 'correct' computers can leak your information. 92 - Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz Lipp, Stefan Mangard, Thomas Prescher, Michael Schwarz, Yuval Yarom:
Spectre attacks: exploiting speculative execution. 93-101 - Parthasarathy Ranganathan:
Technical perspective: ASIC clouds: specializing the datacenter. 102 - Michael Bedford Taylor, Luis Vega, Moein Khazraee, Ikuo Magaki, Scott Davidson, Dustin Richmond:
ASIC clouds: specializing the datacenter for planet-scale applications. 103-109
- Dennis E. Shasha:
Strategic paddling.
Volume 63, Number 8, August 2020
- Vinton G. Cerf:
On the internet of medical things. 5
- John Arquilla, Jeremy Roschelle:
How WWII was won, and why CS students feel unappreciated. 6-7
- Samuel Greengard:
Neuromorphic chips take shape. 9-11 - Don Monroe:
Digital humans on the big screen. 12-14 - Logan Kugler:
Are we addicted to technology? 15-16
- Jannie Fernandez, JeffriAnne Wilder:
TECHNOLOchicas: a critical intersectional approach shaping the color of our future. 18-21
- George V. Neville-Neil:
Broken hearts and coffee mugs. 22-23
- Shriram Krishnamurthi, Kathi Fisler:
Data-centricity: a challenge and opportunity for computing education. 24-26
- Zvi Galil:
OMSCS: the revolution will be digitized. 27-29 - Michael Scroggins, Irene V. Pasquetto, R. Stuart Geiger, Bernadette M. Boscoe, Peter T. Darch, Charlotte Cabasse-Mazel, Cheryl A. Thompson, Milena S. Golshan, Christine L. Borgman:
Thorny problems in data (-intensive) science. 30-32
- CACM Staff:
To catch a failure: the record-and-replay approach to debugging. 34-40 - Jessie Frazelle:
Power to the people. 41-45
- Neil A. M. Maiden, Konstantinos Zachos, Amanda Brown, Dimitris Apostolou, Balder Holm, Lars Nyre, Aleksander Nygård Tonheim, Arend van den Beld:
Digital creativity support for original journalism. 46-53 - Randy W. Connolly:
Why computing belongs within the social sciences. 54-59 - Fay Cobb Payton, Alexa Busch:
Examining undergraduate computer science participation in North Carolina. 60-68
- Andy Cockburn, Pierre Dragicevic, Lonni Besançon, Carl Gutwin:
Threats of a replication crisis in empirical computer science. 70-79
- Wang-Chiew Tan:
Technical perspective: Entity matching with Magellan. 82 - AnHai Doan, Pradap Konda, Paul Suganthan G. C., Yash Govind, Derek Paulsen, Kaushik Chandrasekhar, Philip Martinkus, Matthew Christie:
Magellan: toward building ecosystems of entity matching solutions. 83-91 - Yannis Papakonstantinou:
Technical perspective: Supporting linear algebra operations in SQL. 92 - Shangyu Luo, Zekai J. Gao, Michael N. Gubanov, Luis Leopoldo Perez, Dimitrije Jankov, Christopher M. Jermaine:
Scalable linear algebra on a relational database system. 93-101
- Leah Hoffmann:
Seeing light at the end of the cybersecurity tunnel.
Volume 63, Number 9, September 2020
- Moshe Y. Vardi:
Where have all the domestic graduate students gone? 5
- CACM Staff:
Lost in translation. 9-10
- Orit Hazzan:
Teaching CS undergrads online to work with others effectively. 12-13
- Gregory Mone:
It's alive! 15-17 - Samuel Greengard:
AI on edge. 18-20 - Paul Marks:
Virtual collaboration in the age of the coronavirus. 21-23
- Margot E. Kaminski:
A recent renaissance in privacy law. 24-27
- Jaynarayan H. Lala, Carl E. Landwehr, John F. Meyer:
Autonomous vehicle safety: lessons from aviation. 28-31
- Peter J. Denning:
Avalanches make us all innovators. 32-34
- Guido Schryen:
Integrating management science into the HPC research ecosystem. 35-37 - Amy S. Bruckman:
'Have you thought about...': talking about ethical implications of research. 38-40
- Arvind Narayanan, Arunesh Mathur, Marshini Chetty, Mihir Kshirsagar:
Dark patterns: past, present, and future. 42-47 - Terence Kelly:
Is persistent memory persistent? 48-54
- Quinn Burke, Cinamon Sunrise Bailey:
Becoming an 'adaptive' expert. 56-64 - Andrew Burton-Jones, Alicia Kate Gilchrist, Peter Green, Michael Draheim:
Improving social alignment during digital transformation. 65-71
- Joseph M. Hellerstein, Peter Alvaro:
Keeping CALM: when distributed consistency is easy. 72-81
- Cyrus Shahabi:
Technical perspective: Computing the value of location data. 84 - Heba Aly, John Krumm, Gireeja Ranade, Eric Horvitz:
Computing value of spatiotemporal information. 85-92 - Shashi Shekhar:
Technical perspective: Progress in spatial computing for flood prediction. 93 - Aaron Lowe, Pankaj K. Agarwal, Mathias Rav:
Flood-risk analysis on terrains. 94-102
- Brian Clegg:
Little green message: a different kind of first-contact scenario.
Volume 63, Number 10, October 2020
- Vinton G. Cerf:
On digital diplomacy. 5
- Robin K. Hill:
Protecting computers and people from viruses. 8
- Don Monroe:
Bouncing balls and quantum computing. 10-12 - Chris Edwards:
Thwarting side-channel attacks. 13-14 - Keith Kirkpatrick:
Who has access to your smartphone data? 15-17 - Simson L. Garfinkel, Eugene H. Spafford:
Fran Allen: 1932-2020. 18-19
- Michael A. Cusumano:
Self-driving vehicle technology: progress and promises. 20-22
- Peter G. Neumann:
A holistic view of future risks. 23-27
- George V. Neville-Neil:
Sanity vs. invisible markings. 28-29
- Richard T. Snodgrass, Marianne Winslett:
We need to automate the declaration of conflicts of interest. 30-32 - John MacCormick:
Using computer programs and search problems for teaching theory of computation. 33-35
- Oskar Mencer, Dennis Allison, Elad Blatt, Mark Cummings, Michael J. Flynn, Jerry Harris, Carl Hewitt, Quinn Jacobson, Maysam Lavasani, Mohsen Moazami, Hal Murray, Masoud Nikravesh, Andreas Nowatzyk, Mark Shand, Shahram Shirazi:
The history, status, and future of FPGAs. 36-39 - Charisma Chan, Beth Cooper:
Debugging incidents in Google's distributed systems. 40-46
- Stuart D. Galup, Ronald Dattero, Jing Quan:
What do agile, lean, and ITIL mean to DevOps? 48-53 - Reinhard Wilhelm:
Real time spent on real time. 54-60
- Rainer Böhme, Lisa Eckey, Tyler Moore, Neha Narula, Tim Ruffing, Aviv Zohar:
Responsible vulnerability disclosure in cryptocurrencies. 62-71 - Stefano Cresci:
A decade of social bot detection. 72-83
- Benjamin Livshits:
Technical perspective: Analyzing smart contracts with MadMax. 86 - Neville Grech, Michael Kong, Anton Jurisevic, Lexi Brent, Bernhard Scholz, Yannis Smaragdakis:
MadMax: analyzing the out-of-gas world of smart contracts. 87-95 - Paul Beame:
Technical perspective: Two for the price of one. 96 - Alireza Farhadi, Mohammad Taghi Hajiaghayi, Kasper Green Larsen, Elaine Shi:
Lower bounds for external memory integer sorting via network coding. 97-105
- Dennis E. Shasha:
Privacy-preserving polling.
Volume 63, Number 11, November 2020
- Moshe Y. Vardi:
What should be done about social media? 5
- Celeste M. Rohlfing:
A career unfolds in phases. 7
- CACM Staff:
Weighing grad school payback. 8-9
- David Patterson, Yegor Bugayenko:
Bringing industry back to conferences, and paying for results. 12-13
- Don Monroe:
Seeking artificial common sense. 14-16 - Keith Kirkpatrick:
Natural language misunderstanding. 17-18 - Samuel Greengard:
Terahertz networks move closer to reality. 19-21
- Lorrie Faith Cranor:
Digital contact tracing may protect privacy, but it is unlikely to stop the pandemic. 22-24
- Pamela Samuelson:
Copyright's online service providers safe harbors under siege. 25-27
- Marshall W. Van Alstyne, Alisa Lenart:
Using data and respecting users. 28-30
- Amy J. Ko, Alannah Oleson, Neil Ryan, Yim Register, Benjamin Xie, Mina Tari, Matthew J. Davidson, Stefania Druga, Dastyni Loksa:
It is time for more critical CS education. 31-33
- Boaz Ronen, Alex Coman:
Where should your IT constraint be?: The case of the financial services industry. 34-37 - Jacky Visser, John Lawrence, Chris Reed:
Reason-checking fake news. 38-40
- Virgílio A. F. Almeida, Gonzalo Navarro, Sergio Rajsbaum:
Welcome. 42-44
- Rosiane de Freitas, João M. B. Cavalcanti, Sergio Cleger, Niro Higuchi, Carlos Henrique Souza Celes, Adriano Jose Nogueira Lima:
Estimating Amazon carbon stock using AI-based remote sensing. 46-48 - Alejandro Hevia, Camilo Gómez:
Why me?: shedding light on random processes via randomness beacons. 49-50 - Fabio Kon, Kelly Rosa Braghetto, Eduardo Felipe Zambom Santana, Roberto Speicys Cardoso, Jorge Guerra Guerra:
Toward smart and sustainable cities. 51-52 - Gastón Milano, Diego Vallespir, Alfredo Viola:
A technological and innovative approach to COVID-19 in Uruguay. 53-55 - Wagner Meira Jr., Antônio Luiz P. Ribeiro, Derick M. de Oliveira, Antônio H. Ribeiro:
Contextualized interpretable machine learning for medical diagnosis. 56-58 - Carlos A. Arce-Lopera, Gerardo M. Sarria M.:
Understanding salsa: how computing is defining latin music. 59-60 - Barbara Poblete, Jorge Pérez:
Minding the AI gap in LATAM. 61-63 - Diego Arroyuelo, José Fuentes-Sepúlveda, Diego Seco:
Three success stories about compact data structures. 64-65
- Isidoro Gitler, Antônio Tadeu A. Gomes, Sergio Nesmachnow:
The Latin American supercomputing ecosystem for science. 66-71 - Monica Tentori, Artur Ziviani, Débora C. Muchaluat-Saade, Jesús Favela:
Digital healthcare in Latin America: the case of Brazil and Mexico. 72-77 - Marcelo Arenas, Pablo Barceló:
Chile's new interdisciplinary institute for foundational research on data. 78-83 - Gerardo Torres Zelaya:
A panorama of computing in central America and the Caribbean. 84-89 - Claudio Delrieux, Virginia Laura Ballarin, Cristian García Bauza, Mario Alberto López:
Imaging sciences R&D laboratories in Argentina. 90-95 - Elias P. Duarte Jr., Raimundo José de Araújo Macêdo, Eliane Martins, Sergio Rajsbaum:
A tour of dependable computing research in Latin America. 96-101 - Marcos Kiwi, Yoshiharu Kohayakawa, Sergio Rajsbaum, Francisco Rodríguez-Henríquez, Jayme Luiz Szwarcfiter, Alfredo Viola:
A perspective on theoretical computer science in Latin America. 102-107
- Thomas A. Limoncelli:
Five nonobvious remote work techniques. 108-110 - Pat Helland:
Data on the outside versus data on the inside. 111-118
- Mitchel Resnick, Natalie Rusk:
Coding at a crossroads. 120-127
- Martin Grohe, Pascal Schweitzer:
The graph isomorphism problem. 128-134
- Alexei A. Efros, Aaron Hertzmann:
Technical perspective: When the adversary is your friend. 138 - Ian J. Goodfellow, Jean Pouget-Abadie, Mehdi Mirza, Bing Xu, David Warde-Farley, Sherjil Ozair, Aaron C. Courville, Yoshua Bengio:
Generative adversarial networks. 139-144 - Harry Xu:
Technical perspective: BLeak: semantics-aware leak detection in the web. 145 - John Vilk, Emery D. Berger:
BLeak: automatically debugging memory leaks in web applications. 146-153
- Leah Hoffmann:
Tackling the challenges of CS education.
Volume 63, Number 12, December 2020
- Vinton G. Cerf:
Repairability redux. 5
- Monroe M. Newborn:
Pitting computers against each other ... in chess. 6-7
- Neil Savage:
Tracking COVID, discreetly. 9-11 - Esther Shein:
Softening up robots. 12-14 - Logan Kugler:
Technologies for the visually impaired. 15-17
- Cansu Canca:
Operationalizing AI ethics principles. 18-21
- W. Richards Adrion, Sarah T. Dunton, Barbara Ericson, Renee Fall, Carol L. Fletcher, Mark Guzdial:
U.S. states must broaden participation while expanding access to computer science education. 22-25
- Peter J. Denning:
Navigating in real-time environments. 26-28
- George V. Neville-Neil:
Removing kode. 29
- Margaret O'Mara:
Silicon politics. 30-32 - Yong Cheng, Yang Liu, Tianjian Chen, Qiang Yang:
Federated learning for privacy-preserving AI. 33-36
- Jessie Frazelle:
The life of a data byte. 38-45 - Roger Piqueras Jover:
Security analysis of SMS as a second factor of authentication. 46-52
- Roy Schwartz, Jesse Dodge, Noah A. Smith, Oren Etzioni:
Green AI. 54-63 - Michele Maasberg, Craig Van Slyke, Selwyn Ellis, Nicole Beebe:
The dark triad and insider threats in cyber security. 64-80
- Nick Feamster, Jason Livingood:
Measuring internet speed: current challenges and future recommendations. 72-80
- David Alexander Forsyth:
Technical perspective: XNOR-networks-powerful but tricky. 82 - Mohammad Rastegari, Vicente Ordonez, Joseph Redmon, Ali Farhadi:
Enabling AI at the edge with XNOR-networks. 83-90 - Joseph A. Paradiso:
Technical perspective: The future of large-scale embedded sensing. 91 - Nivedita Arora, Thad Starner, Gregory D. Abowd:
SATURN: an introduction to the internet of materials. 92-99
- William Sims Bainbridge:
Walden Three.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.