Journal: Communications of the ACM

Volume 57, Issue 2

5 -- 0Andrew D. McGettrick. Education, always
7 -- 0Vinton G. Cerf. Cognitive implants
9 -- 0. Contribute more than algorithmic speculation
10 -- 11Philip Guo. Clarifying human-computer interaction
13 -- 15Don Monroe. A new type of mathematics?
16 -- 18Esther Shein. everybody learn to code?
19 -- 21Samuel Greengard. Computational photography comes into focus
22 -- 0. ACM fellows inducted
24 -- 27Diana L. Burley, Jon Eisenberg, Seymour E. Goodman. Would cybersecurity professionalization help address the cybersecurity crisis?
28 -- 30Tim Bell. Establishing a nationwide CS curriculum in New Zealand high schools
31 -- 35William Young, Nancy G. Leveson. An integrated approach to safety and security based on systems theory
36 -- 37George V. Neville-Neil. Bugs and bragging rights
38 -- 39Marco Ceccagnoli, Chris Forman, Peng Huang, D. J. Wu. Digital platforms: when is participation valuable?
40 -- 42Stephen J. Andriole. Ready technology
44 -- 51Kiran Prasad, Kelly Norton, Terry Coatta. Node at LinkedIn: the pursuit of thinner, lighter, faster
52 -- 54Poul-Henning Kamp. Center wheel for success
55 -- 62Zachary Hensley, Jibonananda Sanyal, Joshua R. New. Provenance in sensor data management
64 -- 73Gerard J. Holzmann. Mars code
74 -- 84Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley. Automatic exploit generation
85 -- 93Silvio Micali, Michael O. Rabin. Cryptography miracles, secure auctions, matching problem verification
94 -- 103Reinhard Wilhelm, Daniel Grund. Computation takes time, but how much?
106 -- 0Michael W. Mahoney. A new spin on an old algorithm: technical perspective
107 -- 114Grey Ballard, James Demmel, Olga Holtz, Oded Schwartz. Communication costs of Strassen's matrix multiplication
120 -- 0Peter Winkler. Puzzled: Lowest Number Wins