Journal: Communications of the ACM

Volume 55, Issue 6

5 -- 0Eugene H. Spafford. USACM and U.S. legislation
6 -- 7. The halting problem in the clear light of probability
10 -- 11Jason Hong, Greg Linden. Protecting against data breaches; living with mistakes
12 -- 0Scott E. Delman. Don't throw the baby out with the bathwater
13 -- 15Gregory Goth. Analyzing medical data
16 -- 18Gary Anthes. Smarter photography
19 -- 21Leah Hoffmann. Data mining meets city hall
22 -- 23Neil Savage. Game changer
24 -- 0Paul Hyman. An influential theoretician
26 -- 28Phillip G. Armour. A measure of control
29 -- 32Simson L. Garfinkel. The cybersecurity risk
33 -- 34George V. Neville-Neil. Scale failure
35 -- 37Chris Hall. Security of the internet and the known unknowns
38 -- 40Peter J. Denning, Nicholas Dew. The myth of the elevator pitch
41 -- 43Herbert Lin. Why computer scientists should care about cyber conflict and U.S. national security policy
44 -- 51Dennis Abts, Bob Felderman. A guided tour of data-center networking
52 -- 60David J. Crandall, Noah Snavely. Modeling people and places with internet photo collections
61 -- 69Kari Pulli, Anatoly Baksheev, Kirill Kornyakov, Victor Eruhimov. Real-time computer vision with OpenCV
70 -- 75Benjamin Doerr, Mahmoud Fouz, Tobias Friedrich. Why rumors spread so quickly in social networks
76 -- 85Bryan Parno. Trust extension for commodity computers
86 -- 97Michael J. Carey, Nicola Onose, Michalis Petropoulos. Data services
98 -- 107Ketan Mulmuley. NP problem
110 -- 0Pablo A. Parrilo. Reconstructing the unknown, balancing structure and uncertainty: technical perspective
111 -- 119Emmanuel J. Candès, Benjamin Recht. Exact matrix completion via convex optimization
120 -- 0Peter Lee 0001. The fox and the hedgehog: technical perspective
121 -- 130Tiark Rompf, Martin Odersky. Lightweight modular staging: a pragmatic approach to runtime code generation and compiled DSLs
133 -- 0Peter Winkler. Puzzled
136 -- 0Leah Hoffmann. Q&A