default search action
Communications of the ACM, Volume 55
Volume 55, Number 1, January 2012 (EE)
- Moshe Y. Vardi:
Artificial intelligence: past and future. 5
- Software engineering is engineering. 6-7
- Alain Chesnais:
ACM president's letter. 8 - Alain Chesnais:
ACM's annual report. 9-13
- Mark Guzdial, Bertrand Meyer:
Understanding CS1 students; defective software. 14-15
- Scott E. Delman:
eBooks will abound in the ACM Digital Library. 16
- Neil Savage:
Better medicine through machine learning. 17-19 - Gary Anthes:
Revamping storage performance. 20-22 - Samuel Greengard:
Law and disorder. 23-25 - Sarah Underwood:
Celebration time. 26 - Alex Wright:
Analyzing Apple products. 27 - Paul Hyman:
John McCarthy, 1927-2011. 28-29
- Randal C. Picker:
The yin and yang of copyright and technology. 30-32
- Phillip G. Armour:
The difference engine. 33-34
- Thomas Haigh:
The IBM PC: from beige box to industry standard. 35-37
- Kai A. Olsen, Alessio Malizia:
Interfaces for the ordinary user: can we hide too much? 38-40
- Philip L. Frana:
An interview with Stephen A. Cook. 41-46
- Matthew Flatt:
Creating languages in Racket. 48-56 - Jim Gettys, Kathleen M. Nichols:
Bufferbloat: dark buffers in the internet. 57-65 - Carl A. Waldspurger, Mendel Rosenblum:
I/O virtualization. 66-73
- Jason I. Hong:
The state of phishing attacks. 74-81 - Geoff Coulson, Barry Porter, Ioannis Chatzigiannakis, Christos Koninis, Stefan Fischer, Dennis Pfisterer, Daniel Bimschas, Torsten Braun, Philipp Hurni, Markus Anwander, Gerald Wagenknecht, Sándor P. Fekete, Alexander Kröller, Tobias Baumgartner:
Flexible experimentation in wireless sensor networks. 82-90 - Chi-Sung Laih, Shang-Ming Jen, Chia-Yu Lu:
Long-term confidentiality of PKI. 91-95
- Roberto Manduchi, James M. Coughlan:
(Computer) vision without sight. 96-104
- Frédo Durand:
Where do people draw lines?: technical perspective. 106 - Forrester Cole, Aleksey Golovinskiy, Alex Limpaecher, Heather Stoddart Barros, Adam Finkelstein, Thomas A. Funkhouser, Szymon Rusinkiewicz:
Where do people draw lines? 107-115 - Jim Kurose:
Content-centric networking: technical perspective. 116 - Van Jacobson, Diana K. Smetters, James D. Thornton, Michael F. Plass, Nick Briggs, Rebecca Braynard:
Networking named content. 117-124
- Daniel H. Wilson:
Future tense. 136-
Volume 55, Number 2, February 2012 (EE)
- Fabrizio Gagliardi:
Revisiting ACM Europe. 5
- Credit non-anonymous reviewers with a name. 6-7
- Michael Stonebraker, Jason I. Hong:
Researchers' big data crisis; understanding design and functionality. 10-11
- Gregory Goth:
The science of better science. 13-15 - Samuel Greengard:
The war against botnets. 16-18 - Alex Wright:
The social life of robots. 19-21 - ACM Fellows inducted. 23
- Gregory L. Rosston:
Incentive auctions. 24-26
- Beth Simon, Quintin I. Cutts:
Peer instruction: a teaching method to foster deep understanding. 27-29
- Donald A. Norman:
Yet another technology cusp: confusion, vendor wars, and opportunities. 30-32
- George V. Neville-Neil:
Wanton acts of debuggery. 33-34
- Rose McDermott:
Emotion and security. 35-37
- Marvin V. Zelkowitz:
What have we learned about software engineering? 38-39
- BufferBloat: what's wrong with the internet? 40-47
- Hans-Juergen Boehm, Sarita V. Adve:
You don't know jack about shared variables or memory models. 48-54 - Adam J. Oliner, Archana Ganapathi, Wei Xu:
Advances and challenges in log analysis. 55-61
- Nicholas E. Evangelopoulos, Lucian L. Visinescu:
Text-mining the voice of the people. 62-69 - Holger H. Hoos:
Programming by optimization. 70-80 - Bryce Allen, John Bresnahan, Lisa Childers, Ian T. Foster, Gopi Kandaswamy, Rajkumar Kettimuthu, Jack Kordas, Mike Link, Stuart Martin, Karl Pickett, Steven Tuecke:
Software as a service for data scientists. 81-88
- Miad Faezipour, Mehrdad Nourani, Adnan Saeed, Sateesh Addepalli:
Progress and challenges in intelligent vehicle area networks. 90-100
- Rastislav Bodík:
Compiling what to how: technical perspective. 102 - Viktor Kuncak, Mikaël Mayer, Ruzica Piskac, Philippe Suter:
Software synthesis procedures. 103-111 - Santosh S. Vempala:
Modeling high-dimensional data: technical perspective. 112 - Adam Tauman Kalai, Ankur Moitra, Gregory Valiant:
Disentangling Gaussians. 113-120
- Peter Winkler:
Puzzled. 128
Volume 55, Number 3, March 2012 (EE)
- Moshe Y. Vardi:
What is an algorithm? 5
- From syntax to semantics for AI. 6-7
- Bertrand Meyer:
Knowledgeable beginners. 10-11
- Neil Savage:
Gaining wisdom from crowds. 13-15 - Gary Anthes:
Computing with magnets. 16-18 - Samuel Greengard:
Policing the future. 19-21 - Paul Hyman:
Stanford schooling - gratis! 22 - Jack Rosenberger:
Computer science awards. 23
- Patrick Lin, Fritz Allhoff, Neil C. Rowe:
War 2.0: cyberweapons and ethics. 24-26
- Pamela Samuelson:
Do software copyrights protect what programs do? 27-29
- Peter J. Denning:
The idea idea. 30-32
- Vassilis Kostakos:
Training users vs. training soldiers: experiences from the battlefield. 33-35 - Alessio Malizia, Andrea Bellucci:
The artificiality of natural user interfaces. 36-38
- Patrice Godefroid, Michael Y. Levin, David A. Molnar:
SAGE: whitebox fuzzing for security testing. 40-44 - Luigi Rizzo:
Revisiting network I/O APIs: the netmap framework. 45-51 - Poul-Henning Kamp:
The hyperdimensional tar pit. 52-53
- Youngki Lee, S. S. Iyengar, Chulhong Min, Younghyun Ju, Seungwoo Kang, Taiwoo Park, Jinwon Lee, Yunseok Rhee, Junehwa Song:
MobiCon: a mobile context-monitoring platform. 54-65 - Seung-Hyun Kim, Qiu-Hong Wang, Johannes Ullrich:
A comparative study of cyberattacks. 66-73
- S. Barry Cooper:
Turing's Titanic machine? 74-83 - J. Y. Huang, C. H. Tsai, Shing-Tsaan Huang:
The next generation of GPS navigation systems. 84-93
- Steven D. Gribble:
The benefits of capability-based protection: technical perspective. 96 - Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway:
A taste of Capsicum: practical capabilities for UNIX. 97-104 - Michael L. Littman:
A new way to search game trees: technical perspective. 105 - Sylvain Gelly, Levente Kocsis, Marc Schoenauer, Michèle Sebag, David Silver, Csaba Szepesvári, Olivier Teytaud:
The grand challenge of computer Go: Monte Carlo tree search and extensions. 106-113
- Peter Winkler:
Puzzled. 118 - Leah Hoffmann:
Q&A. 120-
Volume 55, Number 4, April 2012 (EE)
- Yunhao Liu, Vincent Y. Shen:
ACM China Council. 5
- The beauty of simplicity. 6-7
- Daniel Reed, Mark Guzdial:
The power of computing; design guidelines in CS education. 8-9
- Gregory Goth:
Preserving digital data. 11-13 - Tom Geller:
Talking to machines. 14-16 - Leah Hoffmann:
Open for business. 17-19
- Michael A. Cusumano:
Can services and platform thinking help the U.S. Postal Service? 21-23
- Richard Heeks:
Information technology and gross national happiness. 24-26
- George V. Neville-Neil:
The network protocol battle. 27-28
- Jill Ross, Elizabeth Litzler, Joanne McGrath Cohoon, Lucy Sanders:
Improving gender composition in computing. 29-31
- Selma Tekir:
Reading CS classics. 32-34 - Daniel S. Soper:
Is human mobility tracking a good idea? 35-37
- Brian Beckman:
Why LINQ matters: cloud composability guaranteed. 38-44 - Jeffrey Heer, Ben Shneiderman:
Interactive dynamics for visual analysis. 45-54 - Andrew Danowitz, Kyle Kelley, James Mao, John P. Stevenson, Mark Horowitz:
CPU DB: recording microprocessor history. 55-63
- Martin Schmettow:
Sample size in usability studies. 64-70 - Laurie A. Williams:
What agile teams think of agile principles. 71-76
- David M. Blei:
Probabilistic topic models. 77-84 - Sarvapali D. Ramchurn, Perukrishnen Vytelingum, Alex Rogers, Nicholas R. Jennings:
Putting the 'smarts' into the smart grid: a grand challenge for artificial intelligence. 86-97
- Dinesh Manocha:
Building robust dynamical simulation systems: technical perspective. 101 - David Harmon, Etienne Vouga, Breannan Smith, Rasmus Tamstorf, Eitan Grinspun:
Asynchronous contact mechanics. 102-109 - Ed H. Chi:
Who knows?: searching for expertise on the social web: technical perspective. 110 - Damon Horowitz, Sepandar D. Kamvar:
Searching the village: models and methods for social search. 111-118
- Brian Clegg:
Future tense. 120-
Volume 55, Number 5, May 2012 (EE)
- Moshe Y. Vardi:
Fair access. 5
- Judy Robertson:
Likert-type scales, statistical methods, and effect sizes. 6-7
- Neil Savage:
Automating scientific discovery. 9-11 - Alex Wright:
Robots like us. 12-13 - Samuel Greengard:
Digitally possessed. 14-16 - Paul Hyman:
A workshop revival. 17
- Gerald Segal:
ACM's 2012 general election. 19-29
- Peter S. Menell:
Design for symbiosis. 30-32
- David Anderson:
The future of the past. 33-34
- Joel Waldfogel:
Digitization and copyright: some recent evidence from music. 35-37
- Alexander Repenning:
Programming goes back to school. 38-40
- Abraham Bernstein, Mark Klein, Thomas W. Malone:
Programming the global brain. 41-43 - Armando Fox, David A. Patterson:
Crossing the software education chasm. 44-49
- Eric Allman:
Managing technical debt. 50-55 - Pat Helland:
Idempotence is not a medical condition. 56-65 - Erik Meijer:
Your mouse is a database. 66-73
- Alok N. Choudhary, William Hendrix, Kathy Lee, Diana Palsetia, Wei-keng Liao:
Social media evolution of the Egyptian revolution. 74-80 - Daniel S. Soper, Ofir Turel:
An n-gram analysis of Communications 2000-2010. 81-87
- Nir Atias, Roded Sharan:
Comparative analysis of protein networks: hard problems, practical solutions. 88-97
- William Gropp:
Best algorithms + best computers = powerful match. 100 - Ilya Lashuk, Aparna Chandramowlishwaran, Harper Langston, Tuan-Anh Nguyen, Rahul S. Sampath, Aashay Shringarpure, Richard W. Vuduc, Lexing Ying, Denis Zorin, George Biros:
A massively parallel adaptive fast multipole method on heterogeneous architectures. 101-109 - Steven Hand:
An experiment in determinism. 110 - Amittai Aviram, Shu-Chun Weng, Sen Hu, Bryan Ford:
Efficient system-enforced deterministic parallelism. 111-119
- Peter Winkler:
Puzzled. 120
Volume 55, Number 6, June 2012 (EE)
- Eugene H. Spafford:
USACM and U.S. legislation. 5
- The halting problem in the clear light of probability. 6-7
- Jason I. Hong, Greg Linden:
Protecting against data breaches; living with mistakes. 10-11