![](https://dblp.dagstuhl.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Communications of the ACM, Volume 61
Volume 61, Number 1, January 2018
- Vinton G. Cerf:
The role of archives in digital preservation. 7
- Moshe Y. Vardi:
Computer professionals for social responsibility. 9
- A leap from artificial to intelligence. 10-11
- Mark R. Nelson:
The big IDEA and the PD pipeline. 12-13
- Gregory Mone:
Feeling sounds, hearing sights. 15-17 - Alex Wright:
Smartphone science. 18-20 - Marina Krakovsky:
The new jobs. 21-23
- Michael A. Cusumano:
The sharing economy meets reality. 26-28
- Christopher T. Marsden
:
How law and computer science can work together to improve the information society. 29-31
- Thomas Haigh:
Defining American greatness: IBM from Watson to Trump. 32-37
- Henry C. Lucas Jr.:
Technology and the failure of the university. 38-41 - Chitta Baral, Shih-Fu Chang, Brian Curless, Partha Dasgupta, Julia Hirschberg, Anita Jones:
Ask not what your postdoc can do for you ... 42-44
- Antony Alappatt:
Network applications are interactive. 46-53 - Peter Alvaro
, Severine Tymon:
Abstracting the geniuses away from failure testing. 54-61 - Jacob Loveless:
Cache me if you can. 62-68
- Michele Coscia:
Popularity spikes hurt future chances for viral propagation of protomemes. 70-77 - Hemang Subramanian:
Decentralized blockchain-based electronic marketplaces. 78-84
- Wojciech Mazurczyk
, Steffen Wendzel
:
Information hiding: Challenges for forensic experts. 86-94
- David C. Parkes:
Technical perspective: Moving spectrum. 96 - Neil Newman, Alexandre Fréchette, Kevin Leyton-Brown:
Deep optimization for spectrum repacking. 97-104 - Manuel M. T. Chakravarty:
Technical perspective: Can high performance be portable? 105 - Jonathan Ragan-Kelley, Andrew Adams, Dillon Sharlet, Connelly Barnes, Sylvain Paris, Marc Levoy, Saman P. Amarasinghe
, Frédo Durand:
Halide: decoupling algorithms from schedules for high-performance image processing. 106-115
- Dennis E. Shasha:
Polychromatic choreography. 120
- Don Gotterbarn
, Amy S. Bruckman, Catherine Flick
, Keith W. Miller
, Marty J. Wolf:
ACM code of ethics: a guide for positive action. 121-128
Volume 61, Number 2, February 2018
- Jodi L. Tims:
Achieving gender equity: ACM-W can't do it alone. 5
- Vinton G. Cerf:
A comprehensive self-driving car test. 7
- Toward an equation that anticipates AI risks. 8-9
- John Arquilla, Mark Guzdial
:
Protecting the power grid, and finding bias in student evaluations. 10-11
- Chris Edwards:
Quantum technology forgoes unconditional security to extend its reach. 12-14 - Neil Savage:
Going serverless. 15-16 - Logan Kugler:
The war over the value of personal data. 17-19
- Kevin Fu, Wenyuan Xu:
Risks of trusting the physics of sensors. 20-23
- Sarah J. Wille, Daphne Sajous-Brady:
The inclusive and accessible workplace. 24-26
- George V. Neville-Neil
:
Reducing the attack surface. 27-28
- Jennifer Keating, Illah R. Nourbakhsh:
Teaching artificial intelligence and humanity. 29-32 - Shane Greenstein:
Innovation from the edges. 33-36
- Andrew Leung, Andrew Spyker, Tim Bozarth:
Titus: introducing containers to the Netflix cloud. 38-45 - Albert Kwon, James R. Wilcox, Peter Bailis:
Research for practice: private online communication; highlights in systems verification. 46-49 - Kate Matsudaira:
Views from the top. 50-52
- John Zysman, Martin Kenney:
The next phase in the digital revolution: intelligent tools, platforms, growth, employment. 54-63 - Vlasta Stavova, Lenka Dedkova
, Martin Ukrop
, Vashek Matyas:
A large-scale comparative study of beta testers and regular users. 64-71
- Othon Michail, Paul G. Spirakis:
Elements of the theory of dynamic networks. 72
- Steve Zdancewic:
Technical perspective: Building bug-free compilers. 83 - Nuno P. Lopes
, David Menendez, Santosh Nagarakatte
, John Regehr:
Practical verification of peephole optimizations with Alive. 84-91 - Vincent Conitzer:
Technical perspective: Designing algorithms and the fairness criteria they should satisfy. 92 - Kobi Gal
, Ariel D. Procaccia, Moshe Mash, Yair Zick
:
Which is the fairest (rent division) of them all? 93-100
- David Allen Batchelor:
Welcome to the singularity. 104-
Volume 61, Number 3, March 2018
- Andrew A. Chien:
Here comes everybody...to Communications. 5
- Vinton G. Cerf:
Unintended consequences. 7
- Moshe Y. Vardi:
A declaration of the dependence of cyberspace. 9
- Keep the ACM code of ethics as it is. 10-11
- Mark Guzdial
, Bertrand Meyer:
The costs and pleasures of a computer science teacher. 12-13
- Samuel Greengard:
In pursuit of virtual life. 15-17 - Keith Kirkpatrick:
The construction industry in the 21st century. 18-20 - Esther Shein:
The state of fakery. 21-23
- Ross Anderson:
Making security sustainable. 24-26
- Pamela Samuelson:
Will the Supreme Court nix reviews of bad patents? 27-29
- Simon Rogerson
:
Ethics omission increases gases emission. 30-32
- Peter J. Denning:
The computing profession. 33-35
- Fred B. Schneider:
Impediments with policy interventions to foster cybersecurity. 36-38 - M. Six Silberman, Bill Tomlinson
, R. LaPlante, Joel Ross, Lilly Irani
, Andrew Zaldivar:
Responsible research with crowds: pay crowdworkers at least minimum wage. 39-41 - Hanna M. Wallach:
Computational social science ≠ computer science + social data. 42-44
- Yonatan Sompolinsky, Aviv Zohar:
Bitcoin's underlying incentives. 46-53 - Thomas A. Limoncelli:
Operational excellence in April Fools' pranks. 54-57 - Theo Schlossnagle:
Monitoring in a DevOps world. 58-61
- Matthias Felleisen, Robert Bruce Findler, Matthew Flatt, Shriram Krishnamurthi
, Eli Barzilay, Jay A. McCarthy, Sam Tobin-Hochstadt
:
A programmable programming language. 62-71 - Bran Knowles
, Vicki L. Hanson:
The wisdom of older technology (non)users. 72-77 - Tony Gorschek:
Evolution toward soft(er) products. 78-84
- Benjamin Kuipers:
How can we trust a robot? 86-95
- Nicole Immorlica:
Technical perspective: A graph-theoretic framework traces task planning. 98 - Jon M. Kleinberg, Sigal Oren:
Time-inconsistent planning: a computational problem in behavioral economics. 99-107 - Kenny Paterson:
Technical perspective: On heartbleed: a hard beginnyng makth a good endyng. 108 - Liang Zhang, David R. Choffnes, Tudor Dumitras, Dave Levin, Alan Mislove, Aaron Schulman, Christo Wilson:
Analysis of SSL certificate reissues and revocations in the wake of heartbleed. 109-116
- Leah Hoffmann:
Q&A: The network effect. 120-
Volume 61, Number 4, April 2018
- Andrew A. Chien:
Go big! 5 - Vinton G. Cerf:
The sound of programming. 6
- Moshe Y. Vardi:
Open access and ACM. 7
- CACM Staff:
Predicting failure of the university. 8-9
- Jodi L. Tims, Daniel A. Reed:
Fostering inclusion, keeping the net neutral. 10-11
- Neil Savage:
Always out of balance. 12-14 - Don Monroe:
Chips for artificial intelligence. 15-17 - Marina Krakovsky:
Artificial (emotional) intelligence. 18-19
- Mari Sako:
Business ecosystems: how do they matter for innovation? 20-22
- George V. Neville-Neil
:
Popping kernels. 23-24
- Sheldon H. Jacobson:
Push versus pull. 25-27 - Stephen B. Wicker:
Smartphones, contents of the mind, and the fifth amendment. 28-31
- Nicole Forsgren:
DevOps delivers. 32-33 - Jez Humble:
Continuous delivery sounds great, but will it work here? 34-39 - Bridget Kromhout:
Containers will not fix your broken culture (and other hard truths). 40-43 - Nicole Forsgren, Mik Kersten:
DevOps metrics. 44-48
- Mila Gascó-Hernández:
Building a smart city: lessons from Barcelona. 50-57 - Caitlin Sadowski, Edward Aftandilian, Alex Eagle, Liam Miller-Cushon, Ciera Jaspan:
Lessons from building static analysis tools at Google. 58-66 - Francine Berman, Rob A. Rutenbar
, Brent Hailpern, Henrik I. Christensen
, Susan B. Davidson, Deborah Estrin, Michael J. Franklin, Margaret Martonosi, Padma Raghavan, Victoria Stodden, Alexander S. Szalay:
Realizing the potential of data science. 67-72
- Mordechai Guri, Yuval Elovici:
Bridgeware: the air-gap malware. 74-82
- David M. Blei:
Technical perspective: Expressive probabilistic models and scalable method of moments. 84 - Sanjeev Arora, Rong Ge, Yoni Halpern, David M. Mimno, Ankur Moitra, David A. Sontag, Yichen Wu, Michael Zhu:
Learning topic models - provably and efficiently. 85-93
- Dennis E. Shasha:
Finding October. 96-95
Volume 61, Number 5, May 2018
- Vinton G. Cerf:
Turing test 2. 5
- Jack W. Davidson, Joseph A. Konstan
, Andrew A. Chien, Scott E. Delman:
Toward sustainable access: where are we now? 6-7
- Moshe Y. Vardi:
How we lost the women in computing. 9
- CACM Staff:
Get ACM (and Communications) out of politics. 20-11
- CACM Staff:
ACM's 2018 general election: please take this opportunity to vote. 13-21
- Edwin Torres, Walid S. Saba:
Commenting on code, considering data's bottleneck. 24-25
- Gregory Mone:
Shrinking machines, cellular computers. 26-28 - Neil Savage:
Using functions for easier programming. 29-30 - Samuel Greengard:
Finding a healthier approach to managing medical data. 31-33
- Ryan Calo:
Is the law ready for driverless cars? 34-36
- Fred B. Schneider:
Putting trust in security engineering. 37-39
- Alexander Repenning:
Scale or fail. 40-42
- Harold "Bud" Lawson:
The march into the black hole of complexity. 43-45 - Margaret Martonosi:
Science, policy, and service. 46-48
- Malte Schwarzkopf, Peter Bailis:
Research for practice: cluster scheduling for datacenters. 50-53 - Stepán Davidovic, Betsy Beyer:
Canary analysis service. 54-62 - Kate Matsudaira:
How is your week going so far? 63-64
- Josh Tenenberg, Wolff-Michael Roth, Donald Chinn, Alfredo Jornet
, David Socha, Skip Walter:
More than the code: learning rules of rejection in writing programs. 66-71 - Richard R. Brooks
, Lu Yu, Yu Fu, Oluwakemi Hambolu, John Gaynard, Julie Owono, Archippe Yepmou, Felix Blanc:
Internet freedom in West Africa: technical support for journalists and democracy advocates. 72-82 - Xiaonan Wang:
Data acquisition in vehicular ad hoc networks. 83-88
- Björn W. Schuller
:
Speech emotion recognition: two decades in a nutshell, benchmarks, and ongoing trends. 90-99
- Oren Etzioni:
Technical perspective: Breaking the mold of machine learning. 102 - Tom M. Mitchell, William W. Cohen, Estevam R. Hruschka Jr.
, Partha P. Talukdar, Bo Yang, Justin Betteridge, Andrew Carlson, Bhavana Dalvi Mishra, Matt Gardner, Bryan Kisiel, Jayant Krishnamurthy, Ni Lao, Kathryn Mazaitis, Thahir Mohamed, Ndapandula Nakashole
, Emmanouil A. Platanios, Alan Ritter, Mehdi Samadi, Burr Settles, Richard C. Wang, Derry Wijaya
, Abhinav Gupta, Xinlei Chen, Abulhair Saparov, Malcolm Greaves, Joel Welling:
Never-ending learning. 103-115
- Ken MacLeod:
Free press. 120-
Volume 61, Number 6, June 2018
- Vinton G. Cerf:
Celebrating excellence. 5
- CACM Staff:
When to hold 'em. 6-7
- Mark Guzdial
, Susan Landau:
Programming programming languages, and analyzing Facebook's failure. 8-9
- Neil Savage:
Rewarded for RISC. 10-12 - Chris Edwards:
Deep learning hunts for signals among the noise. 13-14 - Keith Kirkpatrick:
3D sensors provide security, better games. 15-17 - Logan Kugler:
Getting hooked on tech. 18-19
- Nicholas Weaver:
Risks of cryptocurrencies. 20-24
- Peter J. Denning:
An interview with Dave Parnas. 25-27
- George V. Neville-Neil
:
Watchdogs vs. snowflakes. 28-29