


default search action
Communications of the ACM, Volume 63
Volume 63, Number 1, January 2020
- Andrew A. Chien:
Cracks in open collaboration in universities. 5
- Moshe Y. Vardi:
Publish and perish. 7
- Bertrand Meyer:
In search of the shortest possible schedule. 8-9
- Erica Klarreich:
Multiplication hits the speed limit. 11-13 - Logan Kugler:
How the internet spans the globe. 14-16 - Samuel Greengard:
Will deepfakes do deep damage? 17-19
- Elizabeth E. Joh
:
Increasing automation in policing. 20-22
- Michael A. Cusumano:
'Platformizing' a bad business does not make it a good business. 23-25
- Thomas Haigh, Mark Priestley
:
von Neumann thought Turing's universal machine was 'simple and neat.': but that didn't tell him how to design a computer. 26-32
- Johannes Himmelreich
:
Ethics of technology needs more political philosophy. 33-35 - James W. Davis, Jeff Hachtel:
A* search: what's in a name? 36-37
- Sanjay Sha:
The reliability of enterprise applications. 38-45 - Scott Ruoti
, Ben Kaiser, Arkady Yerukhimovich, Jeremy Clark, Robert K. Cunningham:
Blockchain technology: what is it good for? 46-53 - Pat Helland:
Space time discontinuum. 54-56
- Saurabh Bagchi, Muhammad-Bilal Siddiqui, Paul Wood, Heng Zhang:
Dependability in edge computing. 58-66
- Mengnan Du, Ninghao Liu, Xia Hu:
Techniques for interpretable machine learning. 68-77 - Sergio Rajsbaum, Michel Raynal:
Mastering concurrent computing through sequential thinking. 78-87
- Mark Guzdial
:
Technical perspective: Is there a geek gene? 90 - Elizabeth Patitsas, Jesse Berlin, Michelle Craig, Steve Easterbrook:
Evidence that computer science grades are not bimodal. 91-98
- Dennis E. Shasha:
Feedback for foxes.
Volume 63, Number 2, February 2020
- Cherri M. Pancake:
Start small, then achieve big impact. 5
- Vinton G. Cerf:
On durability. 7
- Mark Guzdial
:
Sizing the U.S. student cohort for computer science. 10-11
- Chris Edwards:
Learning to trust quantum computers. 13-15 - Paul Marks:
Dark web's doppelgängers aim to dupe antifraud systems. 16-18 - Keith Kirkpatrick:
Tracking shoppers. 19-21
- Carlos Iglesias, Dhanaraj Thakur, Michael L. Best:
Are we losing momentum? 22-24
- Nancy Leveson:
Are you sure your software will not kill anyone? 25-28
- George V. Neville-Neil
:
Numbers are for computers, strings are for humans. 29-30
- Yen-Chia Hsu
, Illah R. Nourbakhsh:
When human-computer interaction meets community citizen science. 31-34 - Clif Kussmaul:
Guiding students to develop essential skills. 35-37
- Jessie Frazelle:
Opening up the baseboard management controller. 38-40 - Matt Godbolt:
Optimizations in C++ compilers. 41-49
- Ricardo Bianchini, Marcus Fontoura, Eli Cortez, Anand Bonde, Alexandre Muzio, Ana-Maria Constantin, Thomas Moscibroda, Gabriel Magalhães, Girish Bablani, Mark Russinovich:
Toward ML-centric cloud platforms. 50-59 - Thomas Olsson
, Jukka Huhtamäki
, Hannu Kärkkäinen:
Directions for professional social matching systems. 60-69
- Patrice Godefroid:
Fuzzing: hack, art, and science. 70-76
- Marco Gruteser:
Lighting the way to visual privacy: technical perspective. 80 - Shilin Zhu, Chi Zhang, Xinyu Zhang:
Automating visual privacy protection using a smart LED. 81-89
- Leah Hoffmann:
'Everything fails all the time'.
Volume 63, Number 3, March 2020
- Moshe Y. Vardi:
Advancing computing as a science and profession: but to what end? 5
- CACM Staff:
Conferences and carbon impact. 6-7
- Robin K. Hill:
Coding for voting. 8-9
- Samuel Greengard:
Can nanosheet transistors keep Moore's law alive? 10-12 - Don Monroe:
Algorithms to harvest the wind. 13-14 - Keith Kirkpatrick:
Across the language barrier. 15-17
- Michael Lachney, Aman Yadav
:
Computing and community in formal education. 18-21
- Peter J. Denning, Dorothy E. Denning:
Dilemmas of artificial intelligence. 22-24
- Omer Reingold:
Through the lens of a passionate theoretician. 25-27 - Kieron O'Hara
, Wendy Hall
:
Four internets. 28-30 - Marc C. Canellas, Rachel A. Haga:
Unsafe at any level. 31-34 - Benjamin C. Pierce, Michael Hicks, Cristina V. Lopes, Jens Palsberg:
Conferences in an era of expensive carbon. 35-37
- Jessie Frazelle:
Securing the boot process. 38-42 - Richard I. Cook:
Above the line, below the line. 43-46
- Edmond Awad, Sohan Dsouza, Jean-François Bonnefon, Azim Shariff, Iyad Rahwan:
Crowdsourcing moral machines. 48-55 - Darja Smite, Nils Brede Moe, Marcin Floryan
, Georgiana Levinta, Panagiota Chatzipetrou:
Spotify guilds. 56-61 - Jonny Austin, Howard Baker, Thomas Ball, James Devine
, Joe Finney
, Peli de Halleux, Steve Hodges, Michal Moskal
, Gareth Stockdale:
The BBC micro: bit: from the U.K. to the world. 62-69
- Ohad Fried
, Jennifer Jacobs
, Adam Finkelstein, Maneesh Agrawala
:
Editing self-image. 70-79 - Jörg Kienzle, Gunter Mussbacher, Benoît Combemale, Lucy Bastin
, Nelly Bencomo, Jean-Michel Bruel, Christoph Becker, Stefanie Betz, Ruzanna Chitchyan
, Betty H. C. Cheng
, Sonja Klingert
, Richard F. Paige, Birgit Penzenstadler, Norbert Seyff, Eugene Syriani, Colin C. Venters:
Toward model-driven sustainability evaluation. 80-91
- Rebecca Isaacs:
Technical perspective: A perspective on pivot tracing. 93 - Jonathan Mace, Ryan Roelke, Rodrigo Fonseca:
Pivot tracing: dynamic causal monitoring for distributed systems. 94-102
- Dennis E. Shasha:
Stopping tyranny.
Volume 63, Number 4, April 2020
Last byte
- Leah Hoffmann:
Reinventing virtual machines. - Cherri M. Pancake:
New ways to think about CS education. 5
- Vinton G. Cerf:
Multisensory adventures. 7
- CACM Staff:
Adding more color to patch picture. 9 - Mark Guzdial
:
Teaching teachers to offer STEM to undergrads. 10-11
- Gary Anthes:
Dead languages come to life. 13-15 - Gregory Mone:
Machine learning, meet whiskey. 16-17 - Esther Shein:
How universities deploy student data. 18-20
- Alan Rubel, Kyle M. L. Jones:
The temptation of data-enabled surveillance. 22-24
- Mari Sako:
Artificial intelligence and the future of professional work. 25-27
- George V. Neville-Neil:
Master of tickets. 28-29
- Gaurav Banga:
Why is cybersecurity not a human-scale problem anymore? 30-34 - Audrey Girouard, Jon E. Froehlich, Regan L. Mandryk, Mark Hancock
:
Organizing family support services at ACM conferences. 35-38 - Jerrold M. Grochow:
A taxonomy of automated assistants. 39-41
- Sue Moon, Ann E. Nicholson, Abhik Roychoudhury:
Welcome. 44-46
- Ken-ichi Kawarabayashi:
The NII Shonan meeting in Japan. 48-49 - Sally Jo Cunningham, Fariz Darari, Adila Krisnadhi
, Annika Hinze:
Capturing cultural heritage in East Asia and Oceania. 50-52 - Carsten Rudolph
, Sadie Creese, Sameer Sharma:
Cybersecurity in Pacific Island nations. 53-54 - Karen Teh, Vivy Suhendra, Soon Chia Lim, Abhik Roychoudhury:
Singapore's cybersecurity ecosystem. 55-57 - Thomas Ho Chee Tat, George Loh Chee Ping:
Innovating services and digital economy in Singapore. 58-59
- Sintia Teddy-Ang, Abigail Toh:
AI Singapore: empowering a smart nation. 60-63 - Lam Kwok Yan, Campbell Wilson:
Developing AI for law enforcement in Singapore and Australia. 62 - Chris Bain, Abraham Oshni Alvandi:
Digital healthcare across Oceania. 64-67 - Meeyoung Cha
, Wei Gao, Cheng-Te Li:
Detecting fake news in social media: an Asia-Pacific perspective. 68-71 - Gernot Heiser, Gerwin Klein, June Andronick:
seL4 in Australia: from research to real-world trustworthy systems. 72-75 - Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith
, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan
, Josef Pieprzyk
, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou
:
Advances in security research in the Asiacrypt region. 76-81 - Dong Ku Kim, Hyeonwoo Lee, Seong-Choon Lee, Sunwoo Lee:
5G commercialization and trials in Korea. 82-85 - Sang Kil Cha, Zhenkai Liang:
Asia's surging interest in binary analysis. 86-88
- Laura M. D. Maguire:
Managing the hidden costs of coordination. 90-96 - Marisa R. Grayson:
Cognitive work of hypothesis exploration during anomaly response. 97-103
- Daniel W. Woods
, Tyler Moore
:
Cyber warranties: market fix or marketing trick? 104-107
- Herbert E. Bruderer:
The Antikythera mechanism. 108-115
- Ariel D. Procaccia:
An answer to fair division's most enigmatic question: technical perspective. 118 - Haris Aziz
, Simon Mackenzie:
A bounded and envy-free cake cutting algorithm. 119-126
Volume 63, Number 5, May 2020
- Cherri M. Pancake:
How ACM is adapting in this period of global uncertainties. 5
- Jodi L. Tims:
Partnerships can help drive gender equality. 7 - Moshe Y. Vardi:
Efficiency vs. resilience: what COVID-19 teaches computing. 9
- Gerald Segal:
ACM's 2020 general election. 11-21
- Andrew A. Chien:
Launching a new feature in Communications. 22 - Arquimedes Canedo:
Automating automation: CS at the heart of the manufacturing economy. 23
- Mark Guzdial
, Jiajie Zhang:
Teaching CS humbly, and watching the AI revolution. 24-25
- Don Monroe:
A proof from 'the book'. 27-29 - Samuel Greengard:
Will RISC-V revolutionize computing? 30-32 - Keith Kirkpatrick:
Deceiving the masses on social media. 33-35
- C. Scott Hemphill:
What role for antitrust in regulating platforms? 36-38
- Adam Shostack, Mary Ellen Zurko:
Secure development tools and techniques need more research that will increase their impact and effectiveness in practice. 39-41
- Mike Tissenbaum, Anne T. Ottenbreit-Leftwich:
A vision of K - : 12 computer science education for 2030. 42-44
- Aaron Hertzmann:
Computers do not make art, people do. 45-48 - Calvin C. Newport:
When technology goes awry. 49-52
- Jack W. Davidson, Joseph A. Konstan
, Scott E. Delman:
ACM publications finances. 53-57
- J. Paul Reed:
Beyond the 'fix-it' treadmill. 58-63 - David D. Woods, John Allspaw
:
Revealing the critical role of human performance in software. 64-67
- Stephen B. Wicker, Dipayan P. Ghosh:
Reading in the panopticon - : your kindle may be spying on you, but you can't be sure. 68-73 - Sandra Mattauch, Katja Lohmann, Frank Hannig, Daniel Lohmann
, Jürgen Teich:
A bibliometric approach for detecting the gender gap in computer science. 74-80
- Alexandra Chouldechova, Aaron Roth
:
A snapshot of the frontiers of fairness in machine learning. 82-89 - Hagit Attiya, Sergio Rajsbaum:
Indistinguishability. 90-99
- Geoffrey M. Voelker:
Technical perspective: Fake 'likes' and targeting collusion networks. 102 - Shehroze Farooqi, Fareed Zaffar, Nektarios Leontiadis, Zubair Shafiq:
Measuring and mitigating OAuth access token abuse by collusion networks. 103-111
- Dennis E. Shasha:
Optimal chimes. 112
Volume 63, Number 6, June 2020
- Andrew A. Chien:
What do DDT and computing have in common? 5-6
- CACM Staff:
Safety proposal points in same direction. 6
- Vinton G. Cerf:
Implications of the COVID-19 pandemic. 7
- Terrence DeFranco, Jeremy Roschelle
:
Detecting/preventing infections, and moving instruction online. 8-9
- Neil Savage:
An animating spirit. 10-12 - Chris Edwards:
Leveraging unlabeled data. 13-14 - Neil Savage:
Seeing through walls. 15-16 - Esther Shein:
Hiring from the autism spectrum. 17-19
- Connor Bolton, Kevin Fu, Josiah D. Hester, Jun Han:
How to curtail oversensing in the home. 20-24
- George V. Neville-Neil
:
Kode vicious plays in traffic. 25-26
- Peter J. Denning, Ted G. Lewis:
Technology adoption. 27-29