Journal: Communications of the ACM

Volume 57, Issue 3

5 -- 0Moshe Y. Vardi. Boolean satisfiability: theory and engineering
7 -- 0Vinton G. Cerf. What if it's us?
9 -- 0. Develop research culture in the Arab Middle East
10 -- 11Kate Matsudaira. Capturing and structuring data mined from the web
12 -- 14Erica Klarreich. Reading brains
15 -- 17Keith Kirkpatrick. World without wires
18 -- 19Neil Savage. Playing at health
20 -- 22Pamela Samuelson. Mass digitization as fair use
23 -- 25Arvind Narayanan, Shannon Vallor. Why software engineering courses should include ethics coverage
26 -- 29Peter J. Denning. 'Surfing toward the future'
30 -- 32Richard E. Ladner. The impact of the United Nations convention on the rights of persons with disabilities
33 -- 36David Patterson. How to build a bad research center
38 -- 44Wojciech M. Golab, Muntasir Raihan Rahman, Alvin AuYoung, Kimberly Keeton, Xiaozhou (Steve) Li. Eventually consistent: not what you were expecting?
45 -- 51Robert F. Sproull, Jim Waldo. The API performance contract
52 -- 56Andi Kleen. Scaling existing lock-based applications with lock elision
58 -- 69Junfeng Yang, Heming Cui, Jingyue Wu, Yang Tang, Gang Hu. Making parallel programs reliable with stable multithreading
70 -- 77Christine Alvarado, Eugene Judson. Using targeted conferences to recruit women into computer science
78 -- 85Gang-hoon Kim, Silvana Trimi, Ji-Hyong Chung. Big-data applications in the government sector
86 -- 95Elzbieta Zielinska, Wojciech Mazurczyk, Krzysztof Szczypiorski. Trends in steganography
98 -- 0Dan Wallach. Smartphone security 'taint' what it used to be: technical perspective
99 -- 106William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, Anmol Sheth. TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones
109 -- 0Peter Winkler. Puzzled: Solutions and sources
112 -- 0Leah Hoffmann. Q&A: RISC and reward