default search action
Communications of the ACM, Volume 59
Volume 59, Number 1, January 2016
- Mark R. Nelson:
Focusing on teacher needs in K-12 CS education. 5 - Vinton G. Cerf:
On the road in Latin America. 7
- Let the liable pay. 8-9
- Vinton G. Cerf:
ACM's 2016 general election. 10 - Alexander L. Wolf:
ACM's annual report for FY15. 11-16
- John Arquilla, Joel C. Adams:
Controlling cyber arms, and creating new LEGOs. 18-19
- Neil Savage:
Seeing more clearly. 20-22 - Samuel Greengard:
Better memory. 23-25 - Esther Shein:
Preserving the internet. 26-28 - Gene Amdahl, 1922-2015. 29
- Jonathan T. Weinberg:
Biometric identity. 30-32
- Michael A. Cusumano, David B. Yoffie:
Extrapolating from Moore's law. 33-35
- Phillip G. Armour:
The chaos machine. 36-38
- Thomas Haigh, Mark Priestley:
Where code comes from: architectures of automatic control from Babbage to Algol. 39-44
- Gio Wiederhold:
Unbalanced data leads to obsolete economic advice. 45-46 - Yoav Shoham:
Why knowledge representation matters. 47-49
- George V. Neville-Neil:
Time is an illusion lunchtime doubly so. 50-55 - Pat Helland:
Immutability changes everything. 64-70
- Shashi Shekhar, Steven K. Feiner, Walid G. Aref:
Spatial computing. 72-81 - Esteve Almirall, Jonathan Wareham:
Open data and civic apps: first-generation failures, second-generation improvements. 82-89 - Juliana Sutanto:
The building blocks of a cloud strategy: evidence from three SaaS providers. 90-97
- Ioannis Koutis, Ryan Williams:
Algebraic fingerprints for faster algorithms. 98-105
- Steve Hand:
Technical Perspective: High-performance virtualization: are we done? 107 - Nadav Amit, Abel Gordon, Nadav Har'El, Muli Ben-Yehuda, Alex Landau, Assaf Schuster, Dan Tsafrir:
Bare-metal performance for virtual machines with exitless interrupts. 108-116 - Tova Milo:
Technical Perspective: Enlisting the power of the crowd. 117 - Beth Trushkowsky, Tim Kraska, Michael J. Franklin, Purnamrita Sarkar:
Answering enumeration queries with the crowd. 118-127
- Dennis E. Shasha:
Upstart Puzzles: Ice Trap. 136
Volume 59, Number 2, February 2016
- Moshe Y. Vardi:
The moral hazard of complexity-theoretic assumptions. 5 - Vinton G. Cerf:
Apps and the web. 7
- Expect 'ungoverned actors' to use AI-supported weapons, too. 8-9
- Mark Guzdial:
Drumming up support for AP CS principles. 12-13
- Chris Edwards:
Self-repair techniques point to robots that design themselves. 15-17 - Logan Kugler:
How a supervillain (or a hacker in his basement) could destroy the internet. 18-20 - Tom Geller:
In privacy law, it's the U.S. vs. the world. 21-23 - ACM inducts fellows. 24
- Peter C. Evans, Rahul C. Basole:
Revealing the API ecosystem and enterprise strategy via visual analytics. 26-28
- Carl E. Landwehr:
Privacy research directions. 29-31
- Rick Adrion, Renee Fall, Barbara Ericson, Mark Guzdial:
Broadening access to computing education state by state. 32-34
- George V. Neville-Neil:
Code hoarding. 35-36
- Satish Chandra, Suresh Thummalapenta, Saurabh Sinha:
Lessons from the tech transfer trenches. 37-39 - Herbert Lin:
Having a conversation about bulk surveillance. 40-42
- Ramanathan V. Guha, Dan Brickley, Steve Macbeth:
Schema.org: evolution of structured data on the web. 44-51 - Caitie McCaffrey:
The verification of a distributed system. 52-55 - Nicholas Diakopoulos:
Accountability in algorithmic decision making. 56-62
- Bart Thomee, David A. Shamma, Gerald Friedland, Benjamin Elizalde, Karl Ni, Douglas Poland, Damian Borth, Li-Jia Li:
YFCC100M: the new data in multimedia research. 64-73
- Michael Stonebraker:
The land sharks are on the squawk box. 74-83
- J. P. Shim, Joon Koh, Steven Fister, H. Y. Seo:
Phonetic analytics technology and big data: real-world cases. 84-90
- Daniel Abadi, Rakesh Agrawal, Anastasia Ailamaki, Magdalena Balazinska, Philip A. Bernstein, Michael J. Carey, Surajit Chaudhuri, Jeffrey Dean, AnHai Doan, Michael J. Franklin, Johannes Gehrke, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, H. V. Jagadish, Donald Kossmann, Samuel Madden, Sharad Mehrotra, Tova Milo, Jeffrey F. Naughton, Raghu Ramakrishnan, Volker Markl, Christopher Olston, Beng Chin Ooi, Christopher Ré, Dan Suciu, Michael Stonebraker, Todd Walter, Jennifer Widom:
The Beckman report on database research. 92-99
- Michael Mitzenmacher, Justin Thaler:
Technical Perspective: Catching lies (and mistakes) in offloaded computation. 102 - Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova:
Pinocchio: nearly practical verifiable computation. 103-112 - Sumit Gulwani:
Technical Perspective: Program synthesis using stochastic techniques. 113 - Eric Schkufza, Rahul Sharma, Alex Aiken:
Stochastic program optimization. 114-122
- Ken MacLeod:
Future Tense: Chatterbox. 128-
Volume 59, Number 3, March 2016
- Eugene H. Spafford:
The strength of encryption. 5 - Vinton G. Cerf:
Computer science in the curriculum. 7
- ACM moral imperatives vs. lethal autonomous weapons. 8-9
- Valerie Barr:
The value of Ada. 10-11
- Gregory Goth:
Deep or shallow, NLP is breaking out. 13-16 - Tom Geller:
Rich data, poor fields. 17-18 - Neil Savage:
When computers stand in the schoolhouse door. 19-21 - Peter Naur: 1928-2016. 22-23
- Pamela Samuelson:
New exemptions to anti-circumvention rules. 24-26
- Jeffrey Johnson:
The question of information justice. 27-29
- Peter J. Denning:
Fifty years of operating systems. 30-32
- Tiffany Barnes, George K. Thiruvathukal:
The need for research in broadening participation. 33-34
- Maja Vukovic, Jim Laredo, Vinod Muthusamy, Aleksander Slominski, Roman Vaculín, Wei Tan, Vijay K. Naik, Ignacio Silva-Lepe, Arun Kumar, Biplav Srivastava, Joel W. Branch:
Riding and thriving on the API hype cycle. 35-37 - H. V. Jagadish:
Paper presentation at conferences: time for a reset. 38-39
- David A. Patterson:
An interview with Stanford University president John Hennessy. 40-45
- A purpose-built global network: Google's move to SDN. 46-54
- Kate Matsudaira:
The paradox of autonomy and recognition. 55-57 - Tom Limoncelli:
Automation should be like Iron Man, not Ultron. 58-61
- Christian S. Collberg, Todd A. Proebsting:
Repeatability in computer systems research. 62-69 - Andrew S. Tanenbaum:
Lessons learned from 30 years of MINIX. 70-78 - Antonio De Nicola, Michele Missikoff:
A lightweight methodology for rapid ontology engineering. 79-86
- Boaz Barak:
Hopes, fears, and software obfuscation. 88-96
- John Regehr:
STACKing up undefined behaviors: technical perspective. 98 - Xi Wang, Nickolai Zeldovich, M. Frans Kaashoek, Armando Solar-Lezama:
A differential approach to undefined behavior detection. 99-106 - David A. Forsyth:
Taming the name game: technical perspective. 107 - Vicente Ordonez, Wei Liu, Jia Deng, Yejin Choi, Alexander C. Berg, Tamara L. Berg:
Learning to name objects. 108-115
- Leah Hoffmann:
Q&A. 120-
Volume 59, Number 4, April 2016
- Moshe Y. Vardi:
Are we headed toward another global tech bust? 5 - Vinton G. Cerf, Maggie Johnson:
Enrollments explode! but diversity students are leaving... 7
- Chaos is no catastrophe. 8-9
- Mark Guzdial, John Arquilla:
Sampling bias in CS education, and where's the cyber strategy? 10-11
- Chris Edwards:
Automating proofs. 13-15 - Keith Kirkpatrick:
Existing technologies can assist the disabled. 16-18 - Gary Anthes:
Search engine agendas. 19-21 - Lawrence M. Fisher:
Marvin Minsky: 1927-2016. 22-24 - Lawrence M. Fisher:
A decade of ACM efforts contribute to computer science for all. 25-27
- Kentaro Toyama:
The internet and inequality. 28-30
- George V. Neville-Neil:
GNL is not Linux. 31-32
- Mari Sako:
The need for corporate diplomacy. 33-35
- Manuel Cebrián, Iyad Rahwan, Alex Pentland:
Beyond viral. 36-39
- Poul-Henning Kamp:
More encryption means less privacy. 40-42 - Carlos Baquero, Nuno M. Preguiça:
Why logical clocks are easy. 43-47 - Thomas A. Limoncelli:
How SysAdmins devalue themselves. 48-49
- Palash Bera:
How colors in business dashboards affect users' decision making. 50-57 - Mikhail I. Gofman, Sinjini Mitra:
Multimodal biometrics for enhanced mobile device security. 58-65
- Alberto Apostolico, Maxime Crochemore, Martin Farach-Colton, Zvi Galil, S. Muthukrishnan:
40 years of suffix trees. 66-73
- David A. Wagner:
Fairness and the coin flip: technical perspective. 75 - Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek:
Secure multiparty computations on Bitcoin. 76-84 - Emin Gün Sirer:
The state (and security) of the Bitcoin economy: technical perspective. 85 - Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, Stefan Savage:
A fistful of Bitcoins: characterizing payments among men with no names. 86-93
- Dennis E. Shasha:
Upstart puzzles. 96
Volume 59, Number 5, May 2016
- Moshe Y. Vardi:
The moral imperative of artificial intelligence. 5 - Vinton G. Cerf:
The IANA transition. 7
- Why All Writs is a trojan horse. 8-9
- ACM's 2016 general election: please take this opportunity to vote. 11-22
- Mark Guzdial:
Bringing computer science to U.S. schools, state by state. 24-25
- Don Monroe:
Silicon photonics: ready to go the distance? 26-28 - Samuel Greengard:
Cybersecurity gets smart. 29-31 - Keith Kirkpatrick:
Coding as sport. 32-33
- Jason Schultz:
The internet of things we don't own? 36-38
- R. Benjamin Shapiro, Matthew P. Ahrens:
Beyond blocks: syntax and semantics. 39-41
- Wen Wen, Chris Forman:
Do patent commons and standards-setting organizations help navigate patent thickets? 42-43
- David P. Anderson:
Preserving hybrid objects. 44-46
- Steffen Wendzel:
How to increase the security of smart buildings? 47-49
- Brendan Burns, Brian Grant, David Oppenheimer, Eric A. Brewer, John Wilkes:
Borg, Omega, and Kubernetes. 50-57 - Kate Matsudaira:
Delegation as art. 58-60 - Ivar Jacobson:
Use-case 2.0. 61-69
- Stephen M. Casner, Edwin L. Hutchins, Don Norman:
The challenges of partially automated driving. 70-77 - Andrew Lenharth, Donald Nguyen, Keshav Pingali:
Parallel graph analytics. 78-87 - Hanan Samet, Sarana Nutanong, Brendan C. Fruin:
Static presentation consistency issues in smartphone mapping apps. 88-98
- Mason Bretan, Gil Weinberg:
A survey of robotic musicianship. 100-109
- Boaz Barak:
A breakthrough in software obfuscation: technical perspective. 112 - Sanjam Garg, Craig Gentry, Shai Halevi, Mariana Raykova, Amit Sahai, Brent Waters:
Hiding secrets in software: a cryptographic approach to program obfuscation. 113-120 - Gail C. Murphy:
Software is natural: technical perspective. 121 - Abram Hindle, Earl T. Barr, Mark Gabel, Zhendong Su, Premkumar T. Devanbu:
On the naturalness of software. 122-131
- Louis Friedman:
Future tense. 136-
Volume 59, Number 6, June 2016
- Alexander L. Wolf:
Moving forward. 5 - Vinton G. Cerf:
Celebrations! 7