5 | -- | 0 | Moshe Y. Vardi. The moral hazard of complexity-theoretic assumptions |
7 | -- | 0 | Vinton G. Cerf. Apps and the web |
8 | -- | 9 | . Expect 'ungoverned actors' to use AI-supported weapons, too |
12 | -- | 13 | Mark Guzdial. Drumming up support for AP CS principles |
15 | -- | 17 | Chris Edwards. Self-repair techniques point to robots that design themselves |
18 | -- | 20 | Logan Kugler. How a supervillain (or a hacker in his basement) could destroy the internet |
21 | -- | 23 | Tom Geller. In privacy law, it's the U.S. vs. the world |
24 | -- | 0 | . ACM inducts fellows |
26 | -- | 28 | Peter C. Evans, Rahul C. Basole. Revealing the API ecosystem and enterprise strategy via visual analytics |
29 | -- | 31 | Carl E. Landwehr. Privacy research directions |
32 | -- | 34 | Rick Adrion, Renee Fall, Barbara Ericson, Mark Guzdial. Broadening access to computing education state by state |
35 | -- | 36 | George V. Neville-Neil. Code hoarding |
37 | -- | 39 | Satish Chandra, Suresh Thummalapenta, Saurabh Sinha. Lessons from the tech transfer trenches |
40 | -- | 42 | Herbert Lin. Having a conversation about bulk surveillance |
44 | -- | 51 | Ramanathan V. Guha, Dan Brickley, Steve Macbeth. Schema.org: evolution of structured data on the web |
52 | -- | 55 | Caitie McCaffrey. The verification of a distributed system |
56 | -- | 62 | Nicholas Diakopoulos. Accountability in algorithmic decision making |
64 | -- | 73 | Bart Thomee, David A. Shamma, Gerald Friedland, Benjamin Elizalde, Karl Ni, Douglas Poland, Damian Borth, Li-Jia Li. YFCC100M: the new data in multimedia research |
74 | -- | 83 | Michael Stonebraker. The land sharks are on the squawk box |
84 | -- | 90 | J. P. Shim, J. Koh, S. Fister, H. Y. Seo. Phonetic analytics technology and big data: real-world cases |
92 | -- | 99 | Daniel Abadi, Rakesh Agrawal, Anastasia Ailamaki, Magdalena Balazinska, Philip A. Bernstein, Michael J. Carey, Surajit Chaudhuri, Jeffrey Dean, AnHai Doan, Michael J. Franklin, Johannes Gehrke, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, H. V. Jagadish, Donald Kossmann, Samuel Madden, Sharad Mehrotra, Tova Milo, Jeffrey F. Naughton, Raghu Ramakrishnan, Volker Markl, Christopher Olston, Beng Chin Ooi, Christopher RĂ©, Dan Suciu, Michael Stonebraker, Todd Walter, Jennifer Widom. The Beckman report on database research |
102 | -- | 0 | Michael Mitzenmacher, Justin Thaler. Technical Perspective: Catching lies (and mistakes) in offloaded computation |
103 | -- | 112 | Bryan Parno, Jon Howell, Craig Gentry, Mariana Raykova 0001. Pinocchio: nearly practical verifiable computation |
113 | -- | 0 | Sumit Gulwani. Technical Perspective: Program synthesis using stochastic techniques |
114 | -- | 122 | Eric Schkufza, Rahul Sharma 0001, Alex Aiken. Stochastic program optimization |
128 | -- | 0 | Ken MacLeod. Future Tense: Chatterbox |