Journal: Communications of the ACM

Volume 57, Issue 5

5 -- 0Moshe Y. Vardi. Moore's law and the sand-heap paradox
7 -- 0Vinton G. Cerf. Sometimes it takes some time!
8 -- 0. Know your steganographic enemy
9 -- 17. ACM's 2014 general election: please take this opportunity to vote
18 -- 19Judy Robertson. Rethinking how to teach programming to newcomers
21 -- 23Samuel Greengard. How computers are changing biology
24 -- 26Tom Geller. The forever disc
27 -- 29Keith Kirkpatrick. Technology confounds the courts
30 -- 32Marshall W. van Alstyne. Why Bitcoin has value
33 -- 34Ben Depoorter. What happened to video game piracy?
35 -- 38David Anderson. Tom Kilburn: a tale of five computers
39 -- 41Steve Cooper, Shuchi Grover, Beth Simon. Building a virtual community of practice for K-12 CS teachers
42 -- 43Ruzena Bajcsy. Robots are coming
44 -- 51Bob Toxen. The NSA and Snowden: securing the all-seeing eye
52 -- 60Lucian Carata, Sherif Akoush, Nikilesh Balakrishnan, Thomas Bytheway, Ripduman Sohan, Margo Selter, Andy Hopper. A primer on provenance
61 -- 68Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, David G. Andersen. Don't settle for eventual consistency
70 -- 79Mihir Nanavati, Patrick Colp, Bill Aiello, Andrew Warfield. Cloud security: a gathering storm
80 -- 87Shimeon Pass, Boaz Ronen. Reducing the software value gap
88 -- 96Manlu Liu, Sean Hansen, Qiang Tu. The community source approach to software development and the Kuali experience
98 -- 107Kevin Leyton-Brown, Holger H. Hoos, Frank Hutter, Lin Xu. NP-complete problems
109 -- 0Ari Juels, Bonnie Wong. The interplay of neuroscience and cryptography: technical perspective
110 -- 118Hristo Bojinov, Daniel Sanchez, Paul J. Reber, Dan Boneh, Patrick Lincoln. Neuroscience meets cryptography: crypto primitives secure against rubber hose attacks
120 -- 0Peter Winkler. Puzzled: A Sort, of Sorts