Journal: Communications of the ACM

Volume 60, Issue 5

5 -- 0Moshe Y. Vardi. Cyber insecurity and cyber libertarianism
7 -- 0Vinton G. Cerf. Can liberty survive the digital age?
8 -- 9Bertrand Meyer. Ending null pointer crashes
10 -- 12Esther Shein. Combating cancer with data
13 -- 15Samuel Greengard. Making chips smarter
16 -- 17Keith Kirkpatrick. Bionics in competition
18 -- 19. The internet of things
22 -- 24Woodrow Hartzog. The anonymization debate should be about risk, not perfection
25 -- 27Leo Porter, Cynthia Bailey Lee, Beth Simon, Mark Guzdial. Preparing tomorrow's faculty to address challenges in teaching computer science
28 -- 34Wendell Wallach. Toward a ban on lethal autonomous weapons: surmounting the obstacles
36 -- 42Erik Meijer. Making money using math
43 -- 47Robert Guo. MongoDB's JavaScript fuzzer
48 -- 51Peter Bailis, Arvind Narayanan, Andrew Miller, Song Han. Research for practice: cryptocurrencies, blockchains, and smart contracts; hardware for deep learning
52 -- 61Catherine C. Marshall, Frank M. Shipman III. Who owns the social web?
62 -- 68Marina Jirotka, Barbara Grimpe, Bernd Carsten Stahl, Grace Eden, Mark Hartswood. Responsible research and innovation in the digital age
70 -- 80Milan Vojnovic. Contest theory
82 -- 0Guy E. Blelloch. Technical Perspective: Functional compilers
83 -- 91Geoffrey Mainland, Roman Leshchinskiy, Simon L. Peyton Jones. Exploiting vector instructions with generalized stream fusion
92 -- 0Alon Y. Halevy. Technical Perspective: Building knowledge bases from messy data
93 -- 102Ce Zhang, Christopher RĂ©, Michael J. Cafarella, Jaeho Shin 0001, Feiran Wang, Sen Wu 0002. DeepDive: declarative knowledge base construction
104 -- 0David Allen Batchelor. Beyond 'Star Trek'
105 -- 111Bo Brinkman, Catherine Flick, Don Gotterbarn, Keith W. Miller, Marty J. Wolf. Listening to professional voices: draft 2 of the ACM code of ethics and professional conduct