Journal: Communications of the ACM

Volume 55, Issue 3

5 -- 0Moshe Y. Vardi. What is an algorithm?
6 -- 7. From syntax to semantics for AI
10 -- 11Bertrand Meyer. Knowledgeable beginners
13 -- 15Neil Savage. Gaining wisdom from crowds
16 -- 18Gary Anthes. Computing with magnets
19 -- 21Samuel Greengard. Policing the future
22 -- 0Paul Hyman. Stanford schooling - gratis!
23 -- 0Jack Rosenberger. Computer science awards
24 -- 26Patrick Lin, Fritz Allhoff, Neil C. Rowe. War 2.0: cyberweapons and ethics
27 -- 29Pamela Samuelson. Do software copyrights protect what programs do?
30 -- 32Peter J. Denning. The idea idea
33 -- 35Vassilis Kostakos. Training users vs. training soldiers: experiences from the battlefield
36 -- 38Alessio Malizia, Andrea Bellucci. The artificiality of natural user interfaces
40 -- 44Patrice Godefroid, Michael Y. Levin, David A. Molnar. SAGE: whitebox fuzzing for security testing
45 -- 51Luigi Rizzo. Revisiting network I/O APIs: the netmap framework
52 -- 53Poul-Henning Kamp. The hyperdimensional tar pit
54 -- 65Youngki Lee, S. S. Iyengar, Chulhong Min, Younghyun Ju, Seungwoo Kang, Taiwoo Park, Jinwon Lee, Yunseok Rhee, Junehwa Song. MobiCon: a mobile context-monitoring platform
66 -- 73Seung-Hyun Kim, Qiu-Hong Wang, Johannes Ullrich. A comparative study of cyberattacks
74 -- 83S. Barry Cooper. Turing's Titanic machine?
84 -- 93J. Y. Huang, C. H. Tsai, S.-T. Huang. The next generation of GPS navigation systems
96 -- 0Steven D. Gribble. The benefits of capability-based protection: technical perspective
97 -- 104Robert N. M. Watson, Jonathan Anderson, Ben Laurie, Kris Kennaway. A taste of Capsicum: practical capabilities for UNIX
105 -- 0Michael L. Littman. A new way to search game trees: technical perspective
106 -- 113Sylvain Gelly, Levente Kocsis, Marc Schoenauer, Michèle Sebag, David Silver, Csaba Szepesvári, Olivier Teytaud. The grand challenge of computer Go: Monte Carlo tree search and extensions
118 -- 0Peter Winkler. Puzzled
120 -- 0Leah Hoffmann. Q&A