0 | -- | 0 | Leah Hoffmann. Attaining the third dimension |
5 | -- | 6 | Andrew A. Chien. What do DDT and computing have in common? |
6 | -- | 0 | CACM Staff. Safety proposal points in same direction |
7 | -- | 0 | Vinton G. Cerf. Implications of the COVID-19 pandemic |
8 | -- | 9 | Terrence DeFranco, Jeremy Roschelle. Detecting/preventing infections, and moving instruction online |
10 | -- | 12 | Neil Savage. An animating spirit |
13 | -- | 14 | Chris Edwards. Leveraging unlabeled data |
15 | -- | 16 | Neil Savage. Seeing through walls |
17 | -- | 19 | Esther Shein. Hiring from the autism spectrum |
20 | -- | 24 | Connor Bolton, Kevin Fu, Josiah D. Hester, Jun Han. How to curtail oversensing in the home |
25 | -- | 26 | George V. Neville-Neil. Kode vicious plays in traffic |
27 | -- | 29 | Peter J. Denning, Ted G. Lewis. Technology adoption |
30 | -- | 34 | Janet Siegmund, Norman Peitek, André Brechmann, Chris Parnin, Sven Apel. Studying programming in the neuroage: just a crazy idea? |
35 | -- | 37 | Meredith Ringel Morris. AI and accessibility |
38 | -- | 41 | Jessie Frazelle. Commit to memory |
42 | -- | 44 | Thomas A. Limoncelli. Communicate using the numbers 1, 2, 3, and more |
46 | -- | 56 | Moritz Lipp, Michael Schwarz 0001, Daniel Gruss, Thomas Prescher 0002, Werner Haas, Jann Horn, Stefan Mangard, Paul Kocher, Daniel Genkin, Yuval Yarom, Mike Hamburg, Raoul Strackx. Meltdown: reading kernel memory from user space |
57 | -- | 64 | Alan Borning, Batya Friedman, Nick Logler. The 'invisible' materiality of information technology |
66 | -- | 74 | Noah A. Smith. Contextual word representations: putting words into computers |
75 | -- | 83 | Max Mühlhäuser, Christian Meurisch, Michael Stein, Jörg Daubert, Julius von Willich, Jan Riemann, Lin Wang. Street lamps as a platform |
86 | -- | 0 | Avrim Blum. Technical perspective: Algorithm selection as a learning problem |
87 | -- | 94 | Rishi Gupta, Tim Roughgarden. Data-driven algorithm design |