Journal: Communications of the ACM

Volume 54, Issue 8

5 -- 0Sorel Reisman, Alain Chesnais. From the presidents of the IEEE Computer Society and ACM
10 -- 11Michael Stonebraker. Stonebraker on NoSQL and enterprises
12 -- 0Scott E. Delman. Why you should be happy to sign in!
13 -- 15Kirk L. Kroeker. A new benchmark for artificial intelligence
16 -- 18Tom Geller. Supercomputing s exaflop target
19 -- 21Samuel Greengard. Life, translated
24 -- 26Jonathon N. Cummings. Geography is alive and well in virtual teams
27 -- 29Betsy James DiSalvo, Amy Bruckman. From interests to values
30 -- 33Steven M. Bellovin, S. O. Bradner, Whitfield Diffie, Susan Landau, Jennifer Rexford. As simple as possible - but not more so
34 -- 35George V. Neville-Neil. Storage strife
36 -- 38Joseph Y. Halpern, David C. Parkes. Journals for certification, conferences for rapid dissemination
40 -- 45Eric Allman. The robustness principle reconsidered
46 -- 54Satnam Singh. Computing without processors
62 -- 71Dharmendra S. Modha, Rajagopal Ananthanarayanan, Steven K. Esser, Anthony Ndirango, Anthony Sherbondy, Raghavendra Singh. Cognitive computing
72 -- 80J. McGrath Cohoon, Sergey Nigai, Joseph Kaye. Gender and computing conference papers
81 -- 87Luca de Alfaro, Ashutosh Kulshreshtha, Ian Pye, B. Thomas Adler. Reputation systems for open collaboration
88 -- 98Surajit Chaudhuri, Umeshwar Dayal, Vivek R. Narasayya. An overview of business intelligence technology
100 -- 0Peter J. Haas. Sketches get sketchier
101 -- 109Ping Li, Arnd Christian König. Theory and applications of ::::b::::-bit minwise hashing
110 -- 0Scott R. Klemmer. Skintroducing the future
111 -- 118Chris Harrison, Desney S. Tan, Dan Morris. Skinput: appropriating the skin as an interactive canvas
120 -- 0Peter Winkler. Puzzled
121 -- 131David Wright. Should privacy impact assessments be mandatory?
132 -- 140Sanjay Goel. Cyberwarfare: connecting the dots in cyber intelligence