Journal: Communications of the ACM

Volume 54, Issue 12

5 -- 0Moshe Y. Vardi. Computing for humans
7 -- 0. To boost presentation quality, ask questions
8 -- 9John Langford, Judy Robertson. Conferences and video lectures; scientific educational games
10 -- 0. Nominees for elections and report of the ACM Nominating Committee
11 -- 13Kirk L. Kroeker. The rise of molecular machines
14 -- 16Gregory Goth. Brave NUI world
17 -- 19Dennis McCafferty. Activism vs. slacktivism
20 -- 0Samuel Greengard. CSEdWeek takes hold
21 -- 0Paul Hyman. Dennis Ritchie, 1941-2011
22 -- 23Jaron Lanier. The most ancient marketing
24 -- 25Genevieve Bell. Life, death, and the iPad: cultural symbols and Steve Jobs
26 -- 28Michael A. Cusumano. The legacy of Steve Jobs
29 -- 31Kentaro Toyama. On turbocharged, heat-seeking, robotic fishing poles
32 -- 33George V. Neville-Neil. Debugging on live systems
34 -- 37Valerie E. Taylor, Richard E. Ladner. Data trends on minorities and people with disabilities in computing
38 -- 40Peter J. Denning. The grounding practice
41 -- 43Andrew P. Bernat, Eric Grimson. Doctoral program rankings for U.S. computing programs: the national research council strikes out
44 -- 51David Pacheco. Postmortem debugging in dynamic environments
52 -- 56G. Bruce Berriman, Steven L. Groom. How will astronomy archives survive the data tsunami?
57 -- 63Robert Green, Henry Ledgard. Coding guidelines: finding the art in the science
64 -- 73Brian E. Moore, Saad Ali, Ramin Mehran, Mubarak Shah. Visual crowd surveillance through a hydrodynamics lens
74 -- 81Manuel Sojer, Joachim Henkel. License risks from ad hoc reuse of code from the internet
82 -- 91Ganesh Gopalakrishnan, Robert M. Kirby, Stephen F. Siegel, Rajeev Thakur, William Gropp, Ewing L. Lusk, Bronis R. de Supinski, Martin Schulz, Greg Bronevetsky. Formal analysis of MPI-based parallel programs
92 -- 103Gerhard Brewka, Thomas Eiter, Miroslaw Truszczynski. Answer set programming at a glance
122 -- 0Xavier Leroy. Safety first!: technical perspective
123 -- 131Jean Yang, Chris Hawblitzel. Safe to the last instruction: automated verification of a type-safe operating system
132 -- 0Vitaly Shmatikov. Anonymity is not privacy: technical perspective
133 -- 141Lars Backstrom, Cynthia Dwork, Jon M. Kleinberg. Wherefore art thou R3579X?: anonymized social networks, hidden patterns, and structural steganography
142 -- 0Peter Winkler. Puzzled
144 -- 0Leah Hoffmann. Q&A